Artykuły w czasopismach na temat „Dynamic attack graph”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Dynamic attack graph”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi i A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Pełny tekst źródłaPal, Arunangshu, i Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph". Mapana - Journal of Sciences 11, nr 4 (22.08.2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Pełny tekst źródłaSæther, Sigve Hortemo, Jan Arne Telle i Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming". Journal of Artificial Intelligence Research 54 (9.09.2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Pełny tekst źródłaRajeshwari, T., i C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks". Asian Journal of Computer Science and Technology 8, S1 (5.02.2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Pełny tekst źródłaHu, Chenao, i Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game". IOP Conference Series: Materials Science and Engineering 790 (7.04.2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Pełny tekst źródłaLv, Huiying, Yuan Zhang i Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph". Cybernetics and Information Technologies 13, Special-Issue (1.12.2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Pełny tekst źródłaGao, Xiang, Xue Qin Xu i Min Wang. "Evaluating Network Security Based on Attack Graph". Advanced Materials Research 756-759 (wrzesień 2013): 2374–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2374.
Pełny tekst źródłaLee, Dongjin, Juho Lee i Kijung Shin. "Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 12 (24.03.2024): 13374–82. http://dx.doi.org/10.1609/aaai.v38i12.29239.
Pełny tekst źródłaBoudermine, Antoine, Rida Khatoun i Jean-Henri Choyer. "Dynamic logic-based attack graph for risk assessment in complex computer systems". Computer Networks 228 (czerwiec 2023): 109730. http://dx.doi.org/10.1016/j.comnet.2023.109730.
Pełny tekst źródłaGuo, Mingyu, Max Ward, Aneta Neumann, Frank Neumann i Hung Nguyen. "Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 5 (26.06.2023): 5649–56. http://dx.doi.org/10.1609/aaai.v37i5.25701.
Pełny tekst źródłaKavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos i Stephen Wolthusen. "Threat Analysis for Smart Homes". Future Internet 11, nr 10 (25.09.2019): 207. http://dx.doi.org/10.3390/fi11100207.
Pełny tekst źródłaBopche, Ghanshyam S., i Babu M. Mehtre. "Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks". Computers & Security 64 (styczeń 2017): 16–43. http://dx.doi.org/10.1016/j.cose.2016.09.010.
Pełny tekst źródłaAlwasel, Bader, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti i Mohammed Alsuhaibani. "Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection". Applied Sciences 13, nr 13 (30.06.2023): 7774. http://dx.doi.org/10.3390/app13137774.
Pełny tekst źródłaWan, Shanshan, i Ying Liu. "A security detection approach based on autonomy-oriented user sensor in social recommendation network". International Journal of Distributed Sensor Networks 18, nr 3 (marzec 2022): 155013292210824. http://dx.doi.org/10.1177/15501329221082415.
Pełny tekst źródłaShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani i Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure". Information & Computer Security 23, nr 2 (8.06.2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Pełny tekst źródłaSen, Saurabh Kumar, i Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm". International Journal for Research in Applied Science and Engineering Technology 10, nr 3 (31.03.2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Pełny tekst źródłaKholidy, Hisham A. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method". Sensors 22, nr 1 (21.12.2021): 9. http://dx.doi.org/10.3390/s22010009.
Pełny tekst źródłaKim, Jiyeon, i Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks". Electronics 9, nr 3 (9.03.2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Pełny tekst źródłaGao, Yazhuo, Guomin Zhang i Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction". Security and Communication Networks 2021 (21.10.2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Pełny tekst źródłaHu, Hao, Hongqi Zhang, Yuling Liu i Yongwei Wang. "Quantitative Method for Network Security Situation Based on Attack Prediction". Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/3407642.
Pełny tekst źródłaQiang, Weizhong, Shizhen Wang, Hai Jin i Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". Security and Communication Networks 2018 (17.10.2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Pełny tekst źródłaQin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma i Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks". Security and Communication Networks 2022 (11.04.2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Pełny tekst źródłaTurnip, Togu Novriansyah, William Suarez Lumbantobing, David Christian Sitorus i Friska Laurenzia Sianturi. "Software Watermarking Dinamis dengan Algoritme Collberg-Thomborson Dan Parent Pointer Graf pada Aplikasi Android". Jurnal Teknologi Informasi dan Ilmu Komputer 8, nr 4 (22.07.2021): 831. http://dx.doi.org/10.25126/jtiik.2021844500.
Pełny tekst źródłaWang, Chundong, Zheli Liu i Tong Zhao. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, nr 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.10028756.
Pełny tekst źródłaWang, Chundong, Tong Zhao i Zheli Liu. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, nr 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.107448.
Pełny tekst źródłaSong, Xuyan, Chen Chen, Baojiang Cui i Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model". Applied Sciences 10, nr 10 (16.05.2020): 3440. http://dx.doi.org/10.3390/app10103440.
Pełny tekst źródłaHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala i Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data". Electronics 10, nr 17 (4.09.2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Pełny tekst źródłaCraandijk, Dennis, i Floris Bex. "Enforcement Heuristics for Argumentation with Deep Reinforcement Learning". Proceedings of the AAAI Conference on Artificial Intelligence 36, nr 5 (28.06.2022): 5573–81. http://dx.doi.org/10.1609/aaai.v36i5.20497.
Pełny tekst źródłaXu, Hanyi, Guozhen Cheng, Xiaohan Yang, Wenyan Liu, Dacheng Zhou i Wei Guo. "Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm". Electronics 13, nr 3 (24.01.2024): 487. http://dx.doi.org/10.3390/electronics13030487.
Pełny tekst źródłaАверьянов, В. С., i И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH". Южно-Сибирский научный вестник, nr 1(41) (28.02.2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Pełny tekst źródłaUstun, Taha Selim, i Saqib Ayyubi. "Automated Network Topology Extraction Based on Graph Theory for Distributed Microgrid Protection in Dynamic Power Systems". Electronics 8, nr 6 (10.06.2019): 655. http://dx.doi.org/10.3390/electronics8060655.
Pełny tekst źródłaZhang, Quan, Chijin Zhou, Yiwen Xu, Zijing Yin, Mingzhe Wang, Zhuo Su, Chengnian Sun, Yu Jiang i Jiaguang Sun. "Building Dynamic System Call Sandbox with Partial Order Analysis". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16.10.2023): 1253–80. http://dx.doi.org/10.1145/3622842.
Pełny tekst źródłaInibhunu, Catherine, i Scott Langevin. "Adaptive Visualization of Complex Networks with FocalPoint". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, nr 1 (wrzesień 2016): 233–37. http://dx.doi.org/10.1177/1541931213601052.
Pełny tekst źródłaCheng, Xiao Han, Shan Ming Luo, Xue Feng Chang i Dan Xie. "Numerical Analysis of an External Flow-Field around a Formula SAE Car Body Based on FLUENT". Advanced Materials Research 1039 (październik 2014): 17–24. http://dx.doi.org/10.4028/www.scientific.net/amr.1039.17.
Pełny tekst źródłaMannarini, Gianandrea, Mario Leonardo Salinas, Lorenzo Carelli, Nicola Petacco i Josip Orović. "VISIR-2: ship weather routing in Python". Geoscientific Model Development 17, nr 10 (24.05.2024): 4355–82. http://dx.doi.org/10.5194/gmd-17-4355-2024.
Pełny tekst źródłaJayanthi Rao, Et al. "Intelligent Traffic Monitoring System Using Vehicular Ad Hoc Network". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 10 (2.11.2023): 629–35. http://dx.doi.org/10.17762/ijritcc.v11i10.8557.
Pełny tekst źródłaZhuang, Jun, i Mohammad Al Hasan. "Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-Supervision". Proceedings of the AAAI Conference on Artificial Intelligence 36, nr 4 (28.06.2022): 4405–13. http://dx.doi.org/10.1609/aaai.v36i4.20362.
Pełny tekst źródłaOnyshchenko, Svitlana, Alina Yanko, Alina Hlushko i Polina Sabelnikova. "Assessment of information protection level against unauthorized access". ScienceRise, nr 2 (30.04.2023): 36–44. http://dx.doi.org/10.21303/2313-8416.2023.003211.
Pełny tekst źródłaManoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images". September 2021 3, nr 3 (2.10.2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Pełny tekst źródłaFang, Zhu, i Zhengquan Xu. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping". Information 13, nr 11 (14.11.2022): 537. http://dx.doi.org/10.3390/info13110537.
Pełny tekst źródłaZhang, Shuqin, Shijie Wang, Guangyao Bai, Minzhi Zhang, Peng Chen, Chunxia Zhao, Shuhan Li i Jiehan Zhou. "Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution". Wireless Communications and Mobile Computing 2022 (16.06.2022): 1–16. http://dx.doi.org/10.1155/2022/2323228.
Pełny tekst źródłaKalinin, Maxim, Evgenii Zavadskii i Alexey Busygin. "A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure". Sensors 23, nr 21 (26.10.2023): 8724. http://dx.doi.org/10.3390/s23218724.
Pełny tekst źródłaNguyen, Thanh H., Mason Wright, Michael P. Wellman i Satinder Singh. "Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis". Security and Communication Networks 2018 (13.12.2018): 1–28. http://dx.doi.org/10.1155/2018/2864873.
Pełny tekst źródłaWei, Zhuangkun, Liang Wang, Schyler Chengyao Sun, Bin Li i Weisi Guo. "Graph Layer Security: Encrypting Information via Common Networked Physics". Sensors 22, nr 10 (23.05.2022): 3951. http://dx.doi.org/10.3390/s22103951.
Pełny tekst źródłaPoolsappasit, N., R. Dewri i I. Ray. "Dynamic Security Risk Management Using Bayesian Attack Graphs". IEEE Transactions on Dependable and Secure Computing 9, nr 1 (styczeń 2012): 61–74. http://dx.doi.org/10.1109/tdsc.2011.34.
Pełny tekst źródłaCatal, Cagatay, Hakan Gunduz i Alper Ozcan. "Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems". Electronics 10, nr 20 (18.10.2021): 2534. http://dx.doi.org/10.3390/electronics10202534.
Pełny tekst źródłaMajeed, Abdul, Safiullah Khan i Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks". Electronics 11, nr 13 (21.06.2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Pełny tekst źródłaKang, Qiyu, Kai Zhao, Yang Song, Yihang Xie, Yanan Zhao, Sijie Wang, Rui She i Wee Peng Tay. "Coupling Graph Neural Networks with Fractional Order Continuous Dynamics: A Robustness Study". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 12 (24.03.2024): 13049–58. http://dx.doi.org/10.1609/aaai.v38i12.29203.
Pełny tekst źródłaDharmalingam, Jeya Mala, i M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, nr 3 (lipiec 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Pełny tekst źródłaLi, Yicai, i Lin Shi. "Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing". Mathematical Problems in Engineering 2022 (22.03.2022): 1–10. http://dx.doi.org/10.1155/2022/9017267.
Pełny tekst źródła