Gotowa bibliografia na temat „Trust attacks Prevention”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Trust attacks Prevention”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Trust attacks Prevention"
Karabacak, Bilge, i Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, nr 1 (2.03.2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Pełny tekst źródłaLi, Lixiang, Jürgen Kurths, Yixian Yang i Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks". Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Pełny tekst źródłaKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid i Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks". Sensors 24, nr 6 (9.03.2024): 1775. http://dx.doi.org/10.3390/s24061775.
Pełny tekst źródłaS, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol". International Journal of Advanced Trends in Computer Science and Engineering 9, nr 3 (25.06.2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Pełny tekst źródłaAtiq, Eman, Maheen Mujeeb i Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies". British journal of Psychology Research 11, nr 2 (15.02.2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Pełny tekst źródłaBoakye-Boateng, Kwasi, Ali A. Ghorbani i Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal". Journal of Sensor and Actuator Networks 11, nr 3 (11.07.2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Pełny tekst źródłaSalahdine, Fatima, i Naima Kaabouch. "Social Engineering Attacks: A Survey". Future Internet 11, nr 4 (2.04.2019): 89. http://dx.doi.org/10.3390/fi11040089.
Pełny tekst źródłaSubathra, P., S. Sivagurunathan i N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks". International Journal of Business Data Communications and Networking 6, nr 1 (styczeń 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Pełny tekst źródłaMoinescu, Radu. "Study of social engineering attacks in Romania 2019". Scientific Bulletin of Naval Academy XXIII, nr 1 (15.07.2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Pełny tekst źródłaQuader, Faisal, i Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies". Journal of Cybersecurity and Privacy 1, nr 4 (11.11.2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Pełny tekst źródłaRozprawy doktorskie na temat "Trust attacks Prevention"
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social". Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Pełny tekst źródłaThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Alruwaili, Fahad F. "Information security, privacy, and compliance models for cloud computing services". Thesis, 2016. http://hdl.handle.net/1828/7119.
Pełny tekst źródłaGraduate
0984
0790
fahd333@gmail.com
Książki na temat "Trust attacks Prevention"
Office, General Accounting. Financial management: Recommendations on Indian trust fund Strategic Plan proposals : report to the Secretary of the Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1997.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Indian Affairs., red. Financial management: Creation of Bureau of Indian Affairs' Trust Fund Special Projects Team : report to the Chairman, Committee on Indian Affairs, U.S. Senate. Washington, D.C: The Office, 1993.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Status of the governmentwide efforts to address improper payment problems : report to the Subcommittee on Government Efficiency and Financial Management, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2003.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Survey of capitalization threshold and other policies for property, plant, and equipment : report to Agency officials. Washington, D.C: U.S. General Accounting Office, 2002.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Profile of Army financial managers : report to the Assistant Secretary of the Army (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Differences in Army and Air Force disbursing and accounting records : report to the Honorable Charles E. Grassley, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Coordinated approach needed to address the government's improper payments problems : report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: United States General Accounting Office, 2002.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Profile of Navy and Marine Corps financial managers : report to the Acting Assistant Secretary of the Navy (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Problems in accounting for Navy transactions impair funds control and financial reporting : report to agency officials. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: An overview of finance and accounting activities in DOD : report to the Chairman, Subcommittee on Defense, Committee on Appropriations, U.S. Senate. Washington, D.C: The Office, 1997.
Znajdź pełny tekst źródłaCzęści książek na temat "Trust attacks Prevention"
Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi i Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET". W Lecture Notes in Electrical Engineering, 193–204. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Pełny tekst źródłaChouhan, Piyush, i Swapnil Jain. "Prevention of DDoS Attack Through Trust Management System for VANET Environment". W Second International Conference on Computer Networks and Communication Technologies, 424–35. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_49.
Pełny tekst źródłaRoy, Amit Kumar, i Ajoy Kumar Khan. "Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks". W Lecture Notes in Electrical Engineering, 109–17. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5341-7_8.
Pełny tekst źródłaSingla, Bhawna, A. K. Verma i L. R. Raheja. "Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection". W Machine Learning for Computer and Cyber Security, 258–77. Boca Raton, FL : Taylor & Francis Group, [2019] | “A science publishers book.”: CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-11.
Pełny tekst źródła"Chapter 7: Terrorism prevention through trust-building". W A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks, 70–82. Sciendo, 2021. http://dx.doi.org/10.2478/9788366675599-013.
Pełny tekst źródłaShukla, Piyush Kumar, i Kirti Raj Bhatele. "Security in Ad-Hoc Networks (MANETS)". W Next Generation Wireless Network Security and Privacy, 286–312. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8687-8.ch010.
Pełny tekst źródłaKapoor, Janesh, i Nor Azlina Abdul Rahman. "Organizational Security Improvement in Preventing Deepfake Ransomware". W Digital Innovation Adoption: Architectural Recommendations and Security Solutions, 58–78. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010009.
Pełny tekst źródłaRevathy P i Belshia Jebamalar G. "A Review Based on Secure Banking Application Against Server Attacks". W Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210044.
Pełny tekst źródłaGorman, Sara E., i Jack M. Gorman. "The Attack on Health and Science Institutions". W Denying to the Grave, 303–32. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197547458.003.0009.
Pełny tekst źródłaDe Rango, Floriano. "Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs". W Networking and Telecommunications, 1488–505. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch097.
Pełny tekst źródłaStreszczenia konferencji na temat "Trust attacks Prevention"
Rathour, Shimmi Singh, i Nitin Manjhi. "Trust base hybrid approach for detection and prevention MANET from attacks". W 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877737.
Pełny tekst źródłaChoudhary, Sarika, i Nishtha Kesswani. "Detection and Prevention of Routing Attacks in Internet of Things". W 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00219.
Pełny tekst źródłaVaseer, Gurveen, Garima Ghai i Dhruva Ghai. "Distributed Trust-Based Multiple Attack Prevention for Secure MANETs". W 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). IEEE, 2018. http://dx.doi.org/10.1109/ises.2018.00032.
Pełny tekst źródłaGriscioli, Federico, Maurizio Pizzonia i Marco Sacchetti. "USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction". W 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907004.
Pełny tekst źródłaGhosh, Shamit, i Dipanwita Roy Chowdhury. "Preventing fault attack on stream cipher using randomization". W 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2015. http://dx.doi.org/10.1109/hst.2015.7140243.
Pełny tekst źródłaDachowicz, Adam, Mikhail Atallah i Jitesh H. Panchal. "Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing". W ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-98378.
Pełny tekst źródłaPadmanabhan, Jayashree, K. S. Easwarakumar, Gokul B. i Harishankar S. "Trust based traffic monitoring approach for preventing denial of service attacks". W the 2nd international conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1626195.1626245.
Pełny tekst źródłaBhawsar, Aditya, Yogadhar Pandey i Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System". W 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Pełny tekst źródłaSaxena, Mohit. "A mutual playmate attack prevention algorithm enhancing trust levels in MANET's systems". W 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155036.
Pełny tekst źródłaNakano, Hironori, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida i Iwao Sasase. "Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN". W 2019 25th Asia-Pacific Conference on Communications (APCC). IEEE, 2019. http://dx.doi.org/10.1109/apcc47188.2019.9026521.
Pełny tekst źródła