Articoli di riviste sul tema "Security attacks detection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security attacks detection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n. 1 (12 aprile 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Testo completoJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n. 1 (12 aprile 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Testo completoKumavat, Kavita S., e Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 4 (4 maggio 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Testo completoKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood e Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier". Bulletin of Electrical Engineering and Informatics 12, n. 6 (1 dicembre 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Testo completoDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou e Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method". Transactions of the Institute of Measurement and Control 41, n. 6 (8 gennaio 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Testo completoKumar, Sunil, e Maninder Singh. "Detection and Isolation of Zombie Attack under Cloud Environment". Oriental journal of computer science and technology 10, n. 2 (12 aprile 2017): 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Testo completoFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi e Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning". World Journal of Advanced Engineering Technology and Sciences 12, n. 1 (30 maggio 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Testo completoAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz e Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions". Electronics 12, n. 6 (11 marzo 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Testo completoAlamsyah, Hendri, Riska e Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System". JOINTECS (Journal of Information Technology and Computer Science) 5, n. 1 (25 gennaio 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Testo completoSalih, Azar Abid, e Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection". Indonesian Journal of Electrical Engineering and Computer Science 31, n. 3 (1 settembre 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Testo completoNeelaveni, Dr R., Abhinav . e Sahas . "Analysis of Efficient Intrusion Detection System using Ensemble Learning". International Journal for Research in Applied Science and Engineering Technology 11, n. 5 (31 maggio 2023): 1521–30. http://dx.doi.org/10.22214/ijraset.2023.51858.
Testo completoSheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh e Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)". Sensors 23, n. 12 (9 giugno 2023): 5459. http://dx.doi.org/10.3390/s23125459.
Testo completoSoe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto e Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture". Sensors 20, n. 16 (5 agosto 2020): 4372. http://dx.doi.org/10.3390/s20164372.
Testo completoQiu, Ling, e Cai Ming Liu. "An Intelligent Detection Method for Network Security". Applied Mechanics and Materials 530-531 (febbraio 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.
Testo completoRohit Khedkar et al. "Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms". Proceeding International Conference on Science and Engineering 11, n. 1 (18 febbraio 2023): 241–52. http://dx.doi.org/10.52783/cienceng.v11i1.120.
Testo completoGavrić, Nikola, e Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat". Sensors 22, n. 20 (14 ottobre 2022): 7791. http://dx.doi.org/10.3390/s22207791.
Testo completoCho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms". Electronics 8, n. 11 (13 novembre 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.
Testo completoPanduardi, Farizqi, Herman Yuliandoko e Agus Priyo Utomo. "Network Security Using Honeypot and Attack Detection with Android Application". Indonesian Journal of Engineering Research 2, n. 2 (27 novembre 2021): 53–60. http://dx.doi.org/10.11594/10.11594/ijer.02.02.04.
Testo completoSachdev, Rithik, Shreya Mishra e Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection". International Journal for Research in Applied Science and Engineering Technology 10, n. 8 (31 agosto 2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Testo completoVinod Kumar, Boddupally, K. Pranaya Vardhan, Kurceti Subba Rao e Thipparthy Navya Sree. "IDENTIFICATION OF UNSATURATED ATTACKS IN VIRTUALIZED INFRASTRUCTURES WITH BIG DATA ANALYTICS IN CLOUD COMPUTING". Journal of Nonlinear Analysis and Optimization 14, n. 02 (2023): 286–92. http://dx.doi.org/10.36893/jnao.2023.v14i2.286-292.
Testo completoGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi e Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System". Journal of Computer Networks and Communications 2019 (6 gennaio 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Testo completoPatil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina e Ketan Kotecha. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning". Algorithms 14, n. 10 (15 ottobre 2021): 297. http://dx.doi.org/10.3390/a14100297.
Testo completoGupta, Punit, e Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, n. 6 (30 agosto 2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Testo completoRajan, Del. "Entropic DDoS Detection for Quantum Networks". Quantum Reports 4, n. 4 (13 dicembre 2022): 604–15. http://dx.doi.org/10.3390/quantum4040044.
Testo completoAl-Zewairi, Malek, Sufyan Almajali e Moussa Ayyash. "Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers". Electronics 9, n. 12 (26 novembre 2020): 2006. http://dx.doi.org/10.3390/electronics9122006.
Testo completoFang, Xing, Wenhui Zhang, Jiming Lin e Yuming Liu. "Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection". Security and Communication Networks 2022 (13 agosto 2022): 1–14. http://dx.doi.org/10.1155/2022/1957497.
Testo completoSilva, Rui Filipe, Raul Barbosa e Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks". International Journal of Information Security and Privacy 14, n. 2 (aprile 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Testo completoMuhammad, Hafsat, Olumide B. Longe, Abimbola Baale, e U.-O. Ekpo Antai. "Towards the Development of a Machine Learning Enhanceed Framework for Honeypot and CAPTCHA Intrusion Detection Systems". Advances in Multidisciplinary and scientific Research Journal Publication 34 (30 dicembre 2022): 43–50. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p4.
Testo completoO, Belej, Spas N, Artyshchuk I e Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models". Artificial Intelligence 26, jai2021.26(1) (30 giugno 2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Testo completoHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut e Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques". Electronics 12, n. 3 (23 gennaio 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Testo completoHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail e Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey". Sensors 23, n. 15 (1 agosto 2023): 6850. http://dx.doi.org/10.3390/s23156850.
Testo completoTolіupa, Serhii, Oleksandr Pliushch e Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES". Cybersecurity: Education, Science, Technique 2, n. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Testo completoBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam e Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review". International Journal of Electrical and Computer Engineering (IJECE) 11, n. 6 (1 dicembre 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Testo completoAbuabid, Ali, e Abdulrahman Aldeij. "Cyber Security Incident Response". Journal of Information Security and Cybercrimes Research 7, n. 1 (2 giugno 2024): 29–50. http://dx.doi.org/10.26735/pnob5534.
Testo completoLin, Hsiao-Chung, Ping Wang e Wen-Hui Lin. "Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks". Computers 8, n. 4 (4 dicembre 2019): 88. http://dx.doi.org/10.3390/computers8040088.
Testo completoGara, Fatma, Leila Ben Saad e Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility". International Journal on Semantic Web and Information Systems 13, n. 3 (luglio 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Testo completoYan, Guanghua, Qiang Li, Dong Guo e Bing Li. "AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats". Sensors 19, n. 14 (19 luglio 2019): 3180. http://dx.doi.org/10.3390/s19143180.
Testo completoXuan, Cho Do, Duc Duong e Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic". Journal of Intelligent & Fuzzy Systems 40, n. 6 (21 giugno 2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Testo completoAlashhab, Abdussalam Ahmed, Mohd Soperi Mohd Zahid, Mohamed A. Azim, Muhammad Yunis Daha, Babangida Isyaku e Shimhaz Ali. "A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks". Symmetry 14, n. 8 (29 luglio 2022): 1563. http://dx.doi.org/10.3390/sym14081563.
Testo completoShang, Fute, Buhong Wang, Fuhu Yan e Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems". Security and Communication Networks 2019 (3 marzo 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Testo completoVermani, Kunal, Amandeep Noliya, Sunil Kumar e Kamlesh Dutta. "Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs". Journal of Information Systems Engineering and Business Intelligence 9, n. 2 (1 novembre 2023): 136–46. http://dx.doi.org/10.20473/jisebi.9.2.136-146.
Testo completoLiu, Likun, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq e Mengmeng Ge. "An Efficient Security System for Mobile Data Monitoring". Wireless Communications and Mobile Computing 2018 (11 giugno 2018): 1–10. http://dx.doi.org/10.1155/2018/9809345.
Testo completoDesai, Vinod, e Dinesha Hagare Annappaiah. "Reputation-based Security model for detecting biased attacks in BigData". Indonesian Journal of Electrical Engineering and Computer Science 29, n. 3 (1 marzo 2023): 1567. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1567-1576.
Testo completoALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model". Journal of Applied Engineering and Technological Science (JAETS) 5, n. 1 (10 dicembre 2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.
Testo completoDasari, Kishore Babu, e Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms". Ingénierie des systèmes d information 26, n. 5 (31 ottobre 2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Testo completoAl-Rajeh, Noura S., e Amal A. Al-Shargabi. "Dual Spectral Attention Model for Iris Presentation Attack Detection". International Journal of Interactive Mobile Technologies (iJIM) 18, n. 10 (22 maggio 2024): 71–89. http://dx.doi.org/10.3991/ijim.v18i10.46981.
Testo completoXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks". Applied Mechanics and Materials 484-485 (gennaio 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Testo completoSkaruz, Jarosław. "Database security: combining neural networks and classification approach". Studia Informatica, n. 23 (22 dicembre 2020): 95–115. http://dx.doi.org/10.34739/si.2019.23.06.
Testo completoKhan, Zulfiqar Ali, e Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, n. 23 (24 novembre 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Testo completoBarabanov, Alexander, Denis Dergunov, Denis Makrushin e Aleksey Teplov. "AUTOMATIC DETECTION OF ACCESS CONTROL VULNERABILITIES VIA API SPECIFICATION PROCESSING". Voprosy kiberbezopasnosti, n. 1(47) (2022): 49–65. http://dx.doi.org/10.21681/2311-3456-2022-1-49-65.
Testo completo