Artigos de revistas sobre o tema "Attack Path"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Attack Path".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi e A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completo da fonteLi, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He e Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees". Information 10, n.º 8 (29 de julho de 2019): 251. http://dx.doi.org/10.3390/info10080251.
Texto completo da fonteHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, n.º 3 (7 de dezembro de 2023): 1–30. http://dx.doi.org/10.1145/3626789.
Texto completo da fonteHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". ACM SIGMETRICS Performance Evaluation Review 52, n.º 1 (11 de junho de 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Texto completo da fonteLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu e Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm". Mathematics 10, n.º 21 (24 de outubro de 2022): 3938. http://dx.doi.org/10.3390/math10213938.
Texto completo da fonteLevner, Eugene, e Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes". Algorithms 17, n.º 11 (4 de novembro de 2024): 504. http://dx.doi.org/10.3390/a17110504.
Texto completo da fonteBhavani, Y., V. Janaki e R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback". Oriental journal of computer science and technology 10, n.º 2 (6 de junho de 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Texto completo da fonteGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song e Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid". Drones 8, n.º 9 (28 de agosto de 2024): 437. http://dx.doi.org/10.3390/drones8090437.
Texto completo da fonteBhavani, Yerram, Vinjamuri Janaki e Rangu Sridevi. "IP Traceback using Flow Based Classification". Recent Advances in Computer Science and Communications 13, n.º 3 (12 de agosto de 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Texto completo da fonteAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad e Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph". Karbala International Journal of Modern Science 8, n.º 3 (2 de agosto de 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Texto completo da fonteHu, Jian, Zhenhong Zhang, Feilu Hang e Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology". Scalable Computing: Practice and Experience 25, n.º 5 (1 de agosto de 2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.
Texto completo da fonteWu, Runze, Jinxin Gong, Weiyue Tong e Bing Fan. "Network Attack Path Selection and Evaluation Based on Q-Learning". Applied Sciences 11, n.º 1 (30 de dezembro de 2020): 285. http://dx.doi.org/10.3390/app11010285.
Texto completo da fonteAbujassar, Radwan, Mohamed Sayed e Husam Yaseen. "A new algorithm to enhance security against cyber threats for internet of things application". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 4 (1 de agosto de 2023): 4452. http://dx.doi.org/10.11591/ijece.v13i4.pp4452-4466.
Texto completo da fonteAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly e Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks". Sensors 23, n.º 1 (22 de dezembro de 2022): 102. http://dx.doi.org/10.3390/s23010102.
Texto completo da fonteV, Suresh Kumar, Rajesh Khanna M e Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection". ECS Transactions 107, n.º 1 (24 de abril de 2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Texto completo da fonteAn, Hyok, Yoonjong Na, Heejo Lee e Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures". Electronics 10, n.º 11 (24 de maio de 2021): 1240. http://dx.doi.org/10.3390/electronics10111240.
Texto completo da fonteKoo, Kijong, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung e Hansung Lee. "Attack Graph Generation with Machine Learning for Network Security". Electronics 11, n.º 9 (22 de abril de 2022): 1332. http://dx.doi.org/10.3390/electronics11091332.
Texto completo da fonteQiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu e Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge". Applied Sciences 14, n.º 14 (16 de julho de 2024): 6189. http://dx.doi.org/10.3390/app14146189.
Texto completo da fontePanda, Niranjan, e Binod Kumar Pattanayak. "Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET". International Journal of Engineering & Technology 7, n.º 3.4 (25 de junho de 2018): 84. http://dx.doi.org/10.14419/ijet.v7i3.4.16752.
Texto completo da fonteHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai e Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning". Sustainability 13, n.º 22 (12 de novembro de 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Texto completo da fonteWan, Gerry, Aaron Johnson, Ryan Wails, Sameer Wagh e Prateek Mittal. "Guard Placement Attacks on Path Selection Algorithms for Tor". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de outubro de 2019): 272–91. http://dx.doi.org/10.2478/popets-2019-0069.
Texto completo da fonteKasturi, Santanam, Xiaolong Li, Peng Li e John Pickard. "Predicting Attack Paths from Application Security Vulnerabilities Using a Multi-Layer Perceptron". American Journal of Software Engineering and Applications 12, n.º 1 (30 de maio de 2024): 23–35. http://dx.doi.org/10.11648/j.ajsea.20241201.14.
Texto completo da fonteZhang, Shuqin, Peiyu Shi, Tianhui Du, Xinyu Su e Yunfei Han. "Threat Attribution and Reasoning for Industrial Control System Asset". International Journal of Ambient Computing and Intelligence 15, n.º 1 (17 de novembro de 2023): 1–27. http://dx.doi.org/10.4018/ijaci.333853.
Texto completo da fonteHe, Jiaji, Haocheng Ma, Kaiyue Song e Yiqiang Zhao. "An Enhanced Logic Encryption Method with a Fully Correlated Key Interdependency Block". Electronics 8, n.º 12 (22 de novembro de 2019): 1392. http://dx.doi.org/10.3390/electronics8121392.
Texto completo da fonteLiao, Yan. "Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis". Scalable Computing: Practice and Experience 25, n.º 1 (4 de janeiro de 2024): 65–74. http://dx.doi.org/10.12694/scpe.v25i1.2254.
Texto completo da fonteChaves, Cesar, Siavoosh Azad, Thomas Hollstein e Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures". Journal of Low Power Electronics and Applications 9, n.º 1 (5 de fevereiro de 2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Texto completo da fonteYi, Junkai, e Xiaoyan Liu. "Deep Reinforcement Learning for Intelligent Penetration Testing Path Design". Applied Sciences 13, n.º 16 (21 de agosto de 2023): 9467. http://dx.doi.org/10.3390/app13169467.
Texto completo da fonteShen, Limin, Hui Li, Hongyi Wang e Yihuan Wang. "Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications". Mobile Information Systems 2020 (5 de junho de 2020): 1–16. http://dx.doi.org/10.1155/2020/3407437.
Texto completo da fonteZhang, Xiaojian, Qi Wang, Xiangqun Wang e Run Zhang. "Attack path analysis of power monitoring system based on attack graph". IOP Conference Series: Earth and Environmental Science 645 (26 de janeiro de 2021): 012064. http://dx.doi.org/10.1088/1755-1315/645/1/012064.
Texto completo da fonteKhlobystova, A. O., M. V. Abramov, A. L. Tulupyev e A. A. Zolotin. "Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities". Information and Control Systems, n.º 6 (18 de dezembro de 2018): 74–81. http://dx.doi.org/10.31799/1684-8853-2018-6-74-81.
Texto completo da fonteZhang, Yan, Yong Wang, Yihua Hu, Zhi Lin, Yadi Zhai, Lei Wang, Qingsong Zhao, Kang Wen e Linshuang Kang. "Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack". Sensors 22, n.º 19 (26 de setembro de 2022): 7286. http://dx.doi.org/10.3390/s22197286.
Texto completo da fonteLi, Yanna. "The Cyber Attack in the Use of Force". Lecture Notes in Education Psychology and Public Media 69, n.º 1 (15 de novembro de 2024): 122–30. http://dx.doi.org/10.54254/2753-7048/69/20240165.
Texto completo da fonteYang, Jinwei, e Yu Yang. "Optimal Security Protection Selection Strategy Based on Markov Model Attack Graph". Journal of Physics: Conference Series 2132, n.º 1 (1 de dezembro de 2021): 012020. http://dx.doi.org/10.1088/1742-6596/2132/1/012020.
Texto completo da fonteBraimah, Joseph Odunayo, Tendai Makoni e Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria". F1000Research 13 (2 de setembro de 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.
Texto completo da fonteLi, Xiaohong, Ran Liu, Zhiyong Feng e Ke He. "Threat modeling-oriented attack path evaluating algorithm". Transactions of Tianjin University 15, n.º 3 (junho de 2009): 162–67. http://dx.doi.org/10.1007/s12209-009-0029-y.
Texto completo da fonteChandran, Rahul, e Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics". International Journal of Digital Crime and Forensics 6, n.º 1 (janeiro de 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Texto completo da fonteChen, Yun, Kun Lv e Changzhen Hu. "A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments". Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2058429.
Texto completo da fonteAl-janabi, Rana Jumaa Surayh. "Messenger Attack(Problems and Solutions)". Journal of Kufa for Mathematics and Computer 1, n.º 2 (30 de outubro de 2010): 12–22. http://dx.doi.org/10.31642/jokmc/2018/010202.
Texto completo da fonteYang, Rong, Fang Ming Huang e Hua Jun Gong. "Best Attack Position Model for BVR Multi-Target Air Combat". Advanced Materials Research 1016 (agosto de 2014): 511–15. http://dx.doi.org/10.4028/www.scientific.net/amr.1016.511.
Texto completo da fonteVitali, Maycon. "Web Cache Deception Attack". H2HC Magazine, n.º 16 (22 de outubro de 2022): 34–40. http://dx.doi.org/10.47986/16/2.
Texto completo da fonteHarmeet Singh, Er, e Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN". International Journal of Engineering & Technology 7, n.º 4.7 (27 de setembro de 2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.
Texto completo da fonteElavarasan, R., K. Chitra e Amsalu Gosu Adigo. "Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network". Wireless Communications and Mobile Computing 2022 (14 de junho de 2022): 1–9. http://dx.doi.org/10.1155/2022/3321870.
Texto completo da fonteGuo, Mingyu, Jialiang Li, Aneta Neumann, Frank Neumann e Hung Nguyen. "Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 9 (28 de junho de 2022): 9360–67. http://dx.doi.org/10.1609/aaai.v36i9.21167.
Texto completo da fonteLin, Hsiao-Chung, Ping Wang, Wen-Hui Lin e Yu-Hsiang Huang. "A Multiple-Swarm Particle Swarm Optimisation Scheme for Tracing Packets Back to the Attack Sources of Botnet". Applied Sciences 11, n.º 3 (26 de janeiro de 2021): 1139. http://dx.doi.org/10.3390/app11031139.
Texto completo da fonteUmaparvathi, M., e Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs". International Journal of Business Data Communications and Networking 7, n.º 4 (outubro de 2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.
Texto completo da fonteSingh, Rupinder, Jatinder Singh e Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks". Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Texto completo da fonteSrinivas, T. Aditya Sai, e S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing". Journal of Ambient Intelligence and Smart Environments 13, n.º 2 (26 de março de 2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Texto completo da fonteFortilla, Zeny Arsya, e Muhammad Syauqi Jazuli. "Developing a 3D Virus Attack Simulation in Unity: A Case Study for Healthcare Education". Gameology and Multimedia Expert 1, n.º 2 (1 de abril de 2024): 33. http://dx.doi.org/10.29103/game.v1i2.15885.
Texto completo da fonteZhang, Bing, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu e Huan Wang. "Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN". Future Internet 16, n.º 4 (22 de abril de 2024): 143. http://dx.doi.org/10.3390/fi16040143.
Texto completo da fonteTan, Sery Vuth, Minh Yuk Choi e Kee Cheon Kim. "The New Mechanism to Detect and Prevent BlackHole Attacks on AODV-Based MANET". Advanced Materials Research 684 (abril de 2013): 547–50. http://dx.doi.org/10.4028/www.scientific.net/amr.684.547.
Texto completo da fonte