Artykuły w czasopismach na temat „Attacks detection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Attacks detection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
BALIGA, SANDEEP, ETHAN BUENO DE MESQUITA i ALEXANDER WOLITZKY. "Deterrence with Imperfect Attribution". American Political Science Review 114, nr 4 (3.08.2020): 1155–78. http://dx.doi.org/10.1017/s0003055420000362.
Pełny tekst źródłaKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood i Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier". Bulletin of Electrical Engineering and Informatics 12, nr 6 (1.12.2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Pełny tekst źródłaO, Belej, Spas N, Artyshchuk I i Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models". Artificial Intelligence 26, jai2021.26(1) (30.06.2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Pełny tekst źródłaSambangi, Swathi, i Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression". Proceedings 63, nr 1 (25.12.2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Pełny tekst źródłaXuan, Cho Do, Duc Duong i Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic". Journal of Intelligent & Fuzzy Systems 40, nr 6 (21.06.2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Pełny tekst źródłaHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail i Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey". Sensors 23, nr 15 (1.08.2023): 6850. http://dx.doi.org/10.3390/s23156850.
Pełny tekst źródłaZhou, Qing Lei, Yan Ke Zhao i Wei Jun Zhu. "Intrusion Detection for Universal Attack Mode Based on Projection Temporal Logic". Applied Mechanics and Materials 556-562 (maj 2014): 2821–24. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2821.
Pełny tekst źródłaSravanthi, P. "Machine Learning Methods for Attack Detection in Smart Grid". International Journal for Research in Applied Science and Engineering Technology 12, nr 3 (31.03.2024): 2257–61. http://dx.doi.org/10.22214/ijraset.2024.59222.
Pełny tekst źródłaGupta, Punit, i Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 6 (30.08.2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Pełny tekst źródłaQiao, Peng Zhe, Yi Ran Wang i Yan Ke Zhao. "Intrusion Detection for Universal Attack Mode Based on Linear Temporal Logic with Past Construct". Applied Mechanics and Materials 680 (październik 2014): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.680.433.
Pełny tekst źródłaLi, Yong Liang, Wei Jun Zhu i Qing Lei Zhou. "Intrusion Detection for Universal Attack Mode Based on Interval Temporal Logic with Past Construct". Advanced Materials Research 1006-1007 (sierpień 2014): 1047–50. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.1047.
Pełny tekst źródłaSachdev, Rithik, Shreya Mishra i Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection". International Journal for Research in Applied Science and Engineering Technology 10, nr 8 (31.08.2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Pełny tekst źródłaZaini, Nur Sholihah, Deris Stiawan, Mohd Faizal Ab Razak, Ahmad Firdaus, Wan Isni Sofiah Wan Din, Shahreen Kasim i Tole Sutikno. "Phishing detection system using nachine learning classifiers". Indonesian Journal of Electrical Engineering and Computer Science 17, nr 3 (1.03.2020): 1165. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Pełny tekst źródłaDeng, Wenping, Ziyu Yang, Peng Xun, Peidong Zhu i Baosheng Wang. "Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems". Electronics 8, nr 9 (26.08.2019): 941. http://dx.doi.org/10.3390/electronics8090941.
Pełny tekst źródłaShang, Fute, Buhong Wang, Fuhu Yan i Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems". Security and Communication Networks 2019 (3.03.2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Pełny tekst źródłaJaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi i A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Pełny tekst źródłaKumavat, Kavita S., i Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 4 (4.05.2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Pełny tekst źródłaLi, Feng, i Hai Ying Wang. "Design on DDoS Attack Detection and Prevention Systems". Applied Mechanics and Materials 530-531 (luty 2014): 798–801. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.798.
Pełny tekst źródłaFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi i Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning". World Journal of Advanced Engineering Technology and Sciences 12, nr 1 (30.05.2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Pełny tekst źródłaMiller, David, Yujia Wang i George Kesidis. "When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time". Neural Computation 31, nr 8 (sierpień 2019): 1624–70. http://dx.doi.org/10.1162/neco_a_01209.
Pełny tekst źródłaHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai i Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning". Sustainability 13, nr 22 (12.11.2021): 12514. http://dx.doi.org/10.3390/su132212514.
Pełny tekst źródłaAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications". International Journal of Handheld Computing Research 8, nr 4 (październik 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Pełny tekst źródłaGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi i Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System". Journal of Computer Networks and Communications 2019 (6.01.2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Pełny tekst źródłaGara, Fatma, Leila Ben Saad i Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility". International Journal on Semantic Web and Information Systems 13, nr 3 (lipiec 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Pełny tekst źródłaDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou i Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method". Transactions of the Institute of Measurement and Control 41, nr 6 (8.01.2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Pełny tekst źródłaShchetinin, Eugeny Yu, i Tatyana R. Velieva. "Detection of cyber-attacks on the power smart grids using semi-supervised deep learning models". Discrete and Continuous Models and Applied Computational Science 30, nr 3 (5.10.2022): 258–68. http://dx.doi.org/10.22363/2658-4670-2022-30-3-258-268.
Pełny tekst źródłaWang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network". Applied Mechanics and Materials 644-650 (wrzesień 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Pełny tekst źródłaAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz i Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions". Electronics 12, nr 6 (11.03.2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Pełny tekst źródłaLiu, Bo, Hongyu Wu, Qihui Yang i Hang Zhang. "Random-Enabled Hidden Moving Target Defense against False Data Injection Alert Attackers". Processes 11, nr 2 (21.01.2023): 348. http://dx.doi.org/10.3390/pr11020348.
Pełny tekst źródłaD., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques". Scientific Bulletin of Naval Academy XXII, nr 1 (15.07.2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Pełny tekst źródłaSoe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto i Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture". Sensors 20, nr 16 (5.08.2020): 4372. http://dx.doi.org/10.3390/s20164372.
Pełny tekst źródłaFadlil, Abdul, Imam Riadi i Sukma Aji. "Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics". Bulletin of Electrical Engineering and Informatics 6, nr 2 (1.06.2017): 140–48. http://dx.doi.org/10.11591/eei.v6i2.605.
Pełny tekst źródłaWatson, Lauren, Anupam Mediratta, Tariq Elahi i Rik Sarkar. "Privacy Preserving Detection of Path Bias Attacks in Tor". Proceedings on Privacy Enhancing Technologies 2020, nr 4 (1.10.2020): 111–30. http://dx.doi.org/10.2478/popets-2020-0065.
Pełny tekst źródłaHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut i Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques". Electronics 12, nr 3 (23.01.2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Pełny tekst źródłaXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks". Applied Mechanics and Materials 484-485 (styczeń 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Pełny tekst źródłaAlansari, Zainab, Nor Badrul Anuar, Amirrudin Kamsin i Mohammad Riyaz Belgaum. "A systematic review of routing attacks detection in wireless sensor networks". PeerJ Computer Science 8 (21.10.2022): e1135. http://dx.doi.org/10.7717/peerj-cs.1135.
Pełny tekst źródłaHan, Dezhi, Kun Bi, Han Liu i Jianxin Jia. "A DDoS attack detection system based on spark framework". Computer Science and Information Systems 14, nr 3 (2017): 769–88. http://dx.doi.org/10.2298/csis161217028h.
Pełny tekst źródłaWu, Kongpei, Huiqin Qu i Conggui Huang. "A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part". Future Internet 15, nr 4 (28.03.2023): 128. http://dx.doi.org/10.3390/fi15040128.
Pełny tekst źródłados Santos, Rodrigo, Ashwitha Kassetty i Shirin Nilizadeh. "Disrupting Audio Event Detection Deep Neural Networks with White Noise". Technologies 9, nr 3 (6.09.2021): 64. http://dx.doi.org/10.3390/technologies9030064.
Pełny tekst źródłaGavrić, Nikola, i Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat". Sensors 22, nr 20 (14.10.2022): 7791. http://dx.doi.org/10.3390/s22207791.
Pełny tekst źródłaLee, Kyungroul, Jaehyuk Lee i Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack". Applied Sciences 13, nr 5 (23.02.2023): 2894. http://dx.doi.org/10.3390/app13052894.
Pełny tekst źródłaYu, Zhenhua, Xudong Duan, Xuya Cong, Xiangning Li i Li Zheng. "Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems". Mathematics 11, nr 4 (13.02.2023): 943. http://dx.doi.org/10.3390/math11040943.
Pełny tekst źródłaKasture, Pradnya. "DDoS Attack Detection using ML". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.
Pełny tekst źródłaAlamsyah, Hendri, Riska i Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System". JOINTECS (Journal of Information Technology and Computer Science) 5, nr 1 (25.01.2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Pełny tekst źródłaChauhan, Ravi, Ulya Sabeel, Alireza Izaddoost i Shahram Shah Heydari. "Polymorphic Adversarial Cyberattacks Using WGAN". Journal of Cybersecurity and Privacy 1, nr 4 (12.12.2021): 767–92. http://dx.doi.org/10.3390/jcp1040037.
Pełny tekst źródłaJoshi, Sagar Vasantrao, Nanda Wagh, Jambi Ratna Raja Kumar, Deepika Dongre, Nuzhat Rizvi i Mahua Bhowmik. "Mitigating DDoS attacks with an intrusion detection and prevention system based on 2-player Bayesian game theory". Journal of Discrete Mathematical Sciences and Cryptography 27, nr 2-B (2024): 809–20. http://dx.doi.org/10.47974/jdmsc-1957.
Pełny tekst źródłaSiddiqa, Ayesha. "Web Based Intrusion Detection System for SQLIA". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, nr 11 (1.11.2023): 1–11. http://dx.doi.org/10.55041/ijsrem26708.
Pełny tekst źródłaChaves, Cesar, Siavoosh Azad, Thomas Hollstein i Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures". Journal of Low Power Electronics and Applications 9, nr 1 (5.02.2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Pełny tekst źródłaPeterson, Matthew, Todd Andel i Ryan Benton. "Towards Detection of Selfish Mining Using Machine Learning". International Conference on Cyber Warfare and Security 17, nr 1 (2.03.2022): 237–43. http://dx.doi.org/10.34190/iccws.17.1.15.
Pełny tekst źródłaChamotra, Saurabh, Rakesh Kumar Sehgal i Ram Swaroop Misra. "Honeypot Baselining for Zero Day Attack Detection". International Journal of Information Security and Privacy 11, nr 3 (lipiec 2017): 63–74. http://dx.doi.org/10.4018/ijisp.2017070106.
Pełny tekst źródła