Artykuły w czasopismach na temat „Trust attacks Prevention”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Trust attacks Prevention”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Karabacak, Bilge, i Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, nr 1 (2.03.2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Pełny tekst źródłaLi, Lixiang, Jürgen Kurths, Yixian Yang i Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks". Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Pełny tekst źródłaKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid i Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks". Sensors 24, nr 6 (9.03.2024): 1775. http://dx.doi.org/10.3390/s24061775.
Pełny tekst źródłaS, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol". International Journal of Advanced Trends in Computer Science and Engineering 9, nr 3 (25.06.2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Pełny tekst źródłaAtiq, Eman, Maheen Mujeeb i Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies". British journal of Psychology Research 11, nr 2 (15.02.2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Pełny tekst źródłaBoakye-Boateng, Kwasi, Ali A. Ghorbani i Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal". Journal of Sensor and Actuator Networks 11, nr 3 (11.07.2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Pełny tekst źródłaSalahdine, Fatima, i Naima Kaabouch. "Social Engineering Attacks: A Survey". Future Internet 11, nr 4 (2.04.2019): 89. http://dx.doi.org/10.3390/fi11040089.
Pełny tekst źródłaSubathra, P., S. Sivagurunathan i N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks". International Journal of Business Data Communications and Networking 6, nr 1 (styczeń 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Pełny tekst źródłaMoinescu, Radu. "Study of social engineering attacks in Romania 2019". Scientific Bulletin of Naval Academy XXIII, nr 1 (15.07.2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Pełny tekst źródłaQuader, Faisal, i Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies". Journal of Cybersecurity and Privacy 1, nr 4 (11.11.2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Pełny tekst źródłaSrinivas, T. Aditya Sai, i S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing". Journal of Ambient Intelligence and Smart Environments 13, nr 2 (26.03.2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Pełny tekst źródłaAl-Shareeda, Mahmood A., Selvakumar Manickam, Murtaja Ali Saare i Navaneethan C. Arjuman. "Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network". Indonesian Journal of Electrical Engineering and Computer Science 29, nr 1 (1.01.2022): 518. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp518-526.
Pełny tekst źródłaOvaz Akpinar, Kevser, i Ibrahim Ozcelik. "Development of the ECAT Preprocessor with the Trust Communication Approach". Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2639750.
Pełny tekst źródłaKarri, Ganesh Reddy, A. V. Prabu, Sidheswar Routray, D. Sumathi, S. Rajasoundaran, Amrit Mukherjee, Pushpita Chatterjee i Waleed Alnumay. "Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks". Wireless Communications and Mobile Computing 2022 (17.08.2022): 1–20. http://dx.doi.org/10.1155/2022/7240795.
Pełny tekst źródłaAndrade, Rui, Isabel Praça, Sinan Wannous i Sergio Ramos. "The Impact of Attacks in LEM and Prevention Measures Based on Forecasting and Trust Models". Processes 9, nr 2 (8.02.2021): 314. http://dx.doi.org/10.3390/pr9020314.
Pełny tekst źródłaUllah, Ikram, Gerard de Roode, Nirvana Meratnia i Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, nr 5 (6.03.2021): 1834. http://dx.doi.org/10.3390/s21051834.
Pełny tekst źródłaMartínez, Jeferson, i Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study". International Journal of Safety and Security Engineering 11, nr 5 (31.10.2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Pełny tekst źródłaChandan, Radha Raman, Awatef Balobaid, Naga Lakshmi Sowjanya Cherukupalli, Gururaj H L, Francesco Flammini i Rajesh Natarajan. "Secure Modern Wireless Communication Network Based on Blockchain Technology". Electronics 12, nr 5 (22.02.2023): 1095. http://dx.doi.org/10.3390/electronics12051095.
Pełny tekst źródłaUslu, Suleyman, Davinder Kaur, Mimoza Durresi i Arjan Durresi. "Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing". Sensors 22, nr 24 (16.12.2022): 9905. http://dx.doi.org/10.3390/s22249905.
Pełny tekst źródłaSinghal, Prateek, Puneet Sharma i Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator". International Journal of Engineering & Technology 7, nr 2.8 (19.03.2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Pełny tekst źródłaSantosh Kumar, Dinesh Kumar Singh, Atma Prakash Singh,. "Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (5.11.2023): 2403–7. http://dx.doi.org/10.17762/ijritcc.v11i9.9295.
Pełny tekst źródłaKhan, Prince Waqas, i Yungcheol Byun. "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things". Entropy 22, nr 2 (4.02.2020): 175. http://dx.doi.org/10.3390/e22020175.
Pełny tekst źródłaZimba, Aaron, Luckson Simukonda i Mumbi Chishimba. "Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security". Zambia ICT Journal 1, nr 1 (11.12.2017): 35–40. http://dx.doi.org/10.33260/zictjournal.v1i1.19.
Pełny tekst źródłaU. V., Esara, Mfon E. A. i Walter O. O. "Impact of Modern Cultism and Governance in Akwa Ibom State, Nigeria". African Journal of Law, Political Research and Administration 7, nr 1 (2.07.2024): 135–47. http://dx.doi.org/10.52589/ajlpra-4ndqroth.
Pełny tekst źródłaJohnson, Anju P., Hussain Al-Aqrabi i Richard Hill. "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems". Sensors 20, nr 3 (5.02.2020): 844. http://dx.doi.org/10.3390/s20030844.
Pełny tekst źródłaMaheshwari, Uma, Suresh .., Mahendra .., Kadiyam .. i Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques". International Journal of Wireless and Ad Hoc Communication, nr 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.
Pełny tekst źródłaYang, Jing, Yen-Lin Chen, Lip Yee Por i Chin Soon Ku. "A Systematic Literature Review of Information Security in Chatbots". Applied Sciences 13, nr 11 (23.05.2023): 6355. http://dx.doi.org/10.3390/app13116355.
Pełny tekst źródłaPreiya, V. Sathya, V. D. Ambeth Kumar, R. Vijay, Vijay K. i N. Kirubakaran. "Blockchain-Based E-Voting System with Face Recognition". Fusion: Practice and Applications 12, nr 1 (2023): 53–63. http://dx.doi.org/10.54216/fpa.120104.
Pełny tekst źródłaAlshammari, Salah T., i Khalid Alsubhi. "Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment". Applied Sciences 11, nr 18 (13.09.2021): 8496. http://dx.doi.org/10.3390/app11188496.
Pełny tekst źródłaKuo, Jong-Yih, Zhi-Jia Wen, Ti-Feng Hsieh i Han-Xuan Huang. "A Study on the Security of Online Judge System Applied Sandbox Technology". Electronics 12, nr 14 (10.07.2023): 3018. http://dx.doi.org/10.3390/electronics12143018.
Pełny tekst źródłaPark, Sangwoo, Soowoong Lee i Jooseok Song. "An Improved Trust-Free Approach for Preserving Privacy in Internet of Things". International Journal on Cybernetics & Informatics 11, nr 4 (27.08.2022): 157–65. http://dx.doi.org/10.5121/ijci.2022.110412.
Pełny tekst źródłaChandel, Tanmay. "Review of Malware and Phishing in the Current and Next Generation of the Internet". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 6499–502. http://dx.doi.org/10.22214/ijraset.2023.52927.
Pełny tekst źródłaZhang, Fu-Guo. "Preventing Recommendation Attack in Trust-Based Recommender Systems". Journal of Computer Science and Technology 26, nr 5 (wrzesień 2011): 823–28. http://dx.doi.org/10.1007/s11390-011-0181-4.
Pełny tekst źródłaBlatchford, J. "An audit of a general practices compliance with national recommendations for the avoidance of complications for type 2 diabetic patients". International Journal of Pharmacy Practice 31, Supplement_2 (30.11.2023): ii8—ii9. http://dx.doi.org/10.1093/ijpp/riad074.010.
Pełny tekst źródłaNivedita, V., i N. Nandhagopal. "Trust Management-Based Service Recovery and Attack Prevention in MANET". Intelligent Automation & Soft Computing 29, nr 3 (2021): 771–86. http://dx.doi.org/10.32604/iasc.2021.017547.
Pełny tekst źródłaRajamäki, Jyri. "Towards Resilient Cyber-Physical eHealth Systems". EQUATIONS 1 (24.12.2021): 78–82. http://dx.doi.org/10.37394/232021.2021.1.12.
Pełny tekst źródłaHaval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols". Advances in Nonlinear Variational Inequalities 26, nr 2 (30.06.2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Pełny tekst źródłaSyed, Salman Ali, i Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing". International Journal of Electrical and Computer Engineering (IJECE) 12, nr 1 (1.02.2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.
Pełny tekst źródłaKang, Xin, i Yongdong Wu. "A trust-based pollution attack prevention scheme in peer-to-peer streaming networks". Computer Networks 72 (październik 2014): 62–73. http://dx.doi.org/10.1016/j.comnet.2014.07.012.
Pełny tekst źródłaBalaji Srikaanth, P., i V. Nagarajan. "A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs". Wireless Personal Communications 101, nr 1 (2.05.2018): 339–57. http://dx.doi.org/10.1007/s11277-018-5691-8.
Pełny tekst źródłaShinde, Prof Kaustubh, Sakshi Hadole, Rutuja Sathe, Sakshi Sirgan i Abhijit Thorat. "Cyber Attack Detection". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 03 (5.03.2024): 1–13. http://dx.doi.org/10.55041/ijsrem29058.
Pełny tekst źródłaSingh, Kamini, Gyan Singh i Arpit Agrawal. "A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET". International Journal of Computer Applications 94, nr 20 (30.05.2014): 1–5. http://dx.doi.org/10.5120/16548-5825.
Pełny tekst źródłaGellert, George A., Sean P. Kelly, Edwin W. Wright i Leslie C. Keil. "Zero Trust and the future of cybersecurity in healthcare delivery organizations". Journal of Hospital Administration 12, nr 1 (9.02.2023): 1. http://dx.doi.org/10.5430/jha.v12n1p1.
Pełny tekst źródłaJunejo, Aisha Kanwal, Imran Ali Jokhio i Tony Jan. "A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services". Electronics 11, nr 13 (21.06.2022): 1932. http://dx.doi.org/10.3390/electronics11131932.
Pełny tekst źródłaMehetre, Deepak C., S. Emalda Roslin i Sanjeev J. Wagh. "Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust". Cluster Computing 22, S1 (14.03.2018): 1313–28. http://dx.doi.org/10.1007/s10586-017-1622-9.
Pełny tekst źródłaIsaac Sajan, R., i J. Jasper. "Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network". International Journal of Communication Systems 33, nr 8 (28.01.2020): e4341. http://dx.doi.org/10.1002/dac.4341.
Pełny tekst źródłaMishra, Priya, Ompal Singh i Abhishek Bhatt. "A Trust Election based Mechanism for finding selfish node and preventing them from Attack". International Journal of Computer Sciences and Engineering 7, nr 2 (28.02.2019): 223–29. http://dx.doi.org/10.26438/ijcse/v7i2.223229.
Pełny tekst źródłaOtari, Grantej Vinod, i Vijay Ram Ghorpade. "A trust management model based on NSGA-II in mobile grid system". International Journal of Knowledge-based and Intelligent Engineering Systems 24, nr 3 (28.09.2020): 235–42. http://dx.doi.org/10.3233/kes-200045.
Pełny tekst źródłaShinde, Kaustubh. "Implementation Paper on Cyberattack Detection". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 05 (31.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35135.
Pełny tekst źródłaMarynissen, Hugo, i Mike Lauder. "Stakeholder-Focused Communication Strategy During Crisis: A Case Study Based on the Brussels Terror Attacks". International Journal of Business Communication 57, nr 2 (2.11.2019): 176–93. http://dx.doi.org/10.1177/2329488419882736.
Pełny tekst źródła