Artigos de revistas sobre o tema "Dynamic attack graph"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Dynamic attack graph".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi e A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completo da fontePal, Arunangshu, e Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph". Mapana - Journal of Sciences 11, n.º 4 (22 de agosto de 2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Texto completo da fonteSæther, Sigve Hortemo, Jan Arne Telle e Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming". Journal of Artificial Intelligence Research 54 (9 de setembro de 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Texto completo da fonteRajeshwari, T., e C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks". Asian Journal of Computer Science and Technology 8, S1 (5 de fevereiro de 2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Texto completo da fonteHu, Chenao, e Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game". IOP Conference Series: Materials Science and Engineering 790 (7 de abril de 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Texto completo da fonteLv, Huiying, Yuan Zhang e Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph". Cybernetics and Information Technologies 13, Special-Issue (1 de dezembro de 2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Texto completo da fonteGao, Xiang, Xue Qin Xu e Min Wang. "Evaluating Network Security Based on Attack Graph". Advanced Materials Research 756-759 (setembro de 2013): 2374–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2374.
Texto completo da fonteLee, Dongjin, Juho Lee e Kijung Shin. "Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 12 (24 de março de 2024): 13374–82. http://dx.doi.org/10.1609/aaai.v38i12.29239.
Texto completo da fonteBoudermine, Antoine, Rida Khatoun e Jean-Henri Choyer. "Dynamic logic-based attack graph for risk assessment in complex computer systems". Computer Networks 228 (junho de 2023): 109730. http://dx.doi.org/10.1016/j.comnet.2023.109730.
Texto completo da fonteGuo, Mingyu, Max Ward, Aneta Neumann, Frank Neumann e Hung Nguyen. "Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 5 (26 de junho de 2023): 5649–56. http://dx.doi.org/10.1609/aaai.v37i5.25701.
Texto completo da fonteKavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos e Stephen Wolthusen. "Threat Analysis for Smart Homes". Future Internet 11, n.º 10 (25 de setembro de 2019): 207. http://dx.doi.org/10.3390/fi11100207.
Texto completo da fonteBopche, Ghanshyam S., e Babu M. Mehtre. "Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks". Computers & Security 64 (janeiro de 2017): 16–43. http://dx.doi.org/10.1016/j.cose.2016.09.010.
Texto completo da fonteAlwasel, Bader, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti e Mohammed Alsuhaibani. "Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection". Applied Sciences 13, n.º 13 (30 de junho de 2023): 7774. http://dx.doi.org/10.3390/app13137774.
Texto completo da fonteWan, Shanshan, e Ying Liu. "A security detection approach based on autonomy-oriented user sensor in social recommendation network". International Journal of Distributed Sensor Networks 18, n.º 3 (março de 2022): 155013292210824. http://dx.doi.org/10.1177/15501329221082415.
Texto completo da fonteShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani e Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure". Information & Computer Security 23, n.º 2 (8 de junho de 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Texto completo da fonteSen, Saurabh Kumar, e Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de março de 2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Texto completo da fonteKholidy, Hisham A. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method". Sensors 22, n.º 1 (21 de dezembro de 2021): 9. http://dx.doi.org/10.3390/s22010009.
Texto completo da fonteKim, Jiyeon, e Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks". Electronics 9, n.º 3 (9 de março de 2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Texto completo da fonteGao, Yazhuo, Guomin Zhang e Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction". Security and Communication Networks 2021 (21 de outubro de 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Texto completo da fonteHu, Hao, Hongqi Zhang, Yuling Liu e Yongwei Wang. "Quantitative Method for Network Security Situation Based on Attack Prediction". Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/3407642.
Texto completo da fonteQiang, Weizhong, Shizhen Wang, Hai Jin e Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". Security and Communication Networks 2018 (17 de outubro de 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Texto completo da fonteQin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma e Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks". Security and Communication Networks 2022 (11 de abril de 2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Texto completo da fonteTurnip, Togu Novriansyah, William Suarez Lumbantobing, David Christian Sitorus e Friska Laurenzia Sianturi. "Software Watermarking Dinamis dengan Algoritme Collberg-Thomborson Dan Parent Pointer Graf pada Aplikasi Android". Jurnal Teknologi Informasi dan Ilmu Komputer 8, n.º 4 (22 de julho de 2021): 831. http://dx.doi.org/10.25126/jtiik.2021844500.
Texto completo da fonteWang, Chundong, Zheli Liu e Tong Zhao. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, n.º 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.10028756.
Texto completo da fonteWang, Chundong, Tong Zhao e Zheli Liu. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, n.º 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.107448.
Texto completo da fonteSong, Xuyan, Chen Chen, Baojiang Cui e Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model". Applied Sciences 10, n.º 10 (16 de maio de 2020): 3440. http://dx.doi.org/10.3390/app10103440.
Texto completo da fonteHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala e Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data". Electronics 10, n.º 17 (4 de setembro de 2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Texto completo da fonteCraandijk, Dennis, e Floris Bex. "Enforcement Heuristics for Argumentation with Deep Reinforcement Learning". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 5 (28 de junho de 2022): 5573–81. http://dx.doi.org/10.1609/aaai.v36i5.20497.
Texto completo da fonteXu, Hanyi, Guozhen Cheng, Xiaohan Yang, Wenyan Liu, Dacheng Zhou e Wei Guo. "Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm". Electronics 13, n.º 3 (24 de janeiro de 2024): 487. http://dx.doi.org/10.3390/electronics13030487.
Texto completo da fonteАверьянов, В. С., e И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH". Южно-Сибирский научный вестник, n.º 1(41) (28 de fevereiro de 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Texto completo da fonteUstun, Taha Selim, e Saqib Ayyubi. "Automated Network Topology Extraction Based on Graph Theory for Distributed Microgrid Protection in Dynamic Power Systems". Electronics 8, n.º 6 (10 de junho de 2019): 655. http://dx.doi.org/10.3390/electronics8060655.
Texto completo da fonteZhang, Quan, Chijin Zhou, Yiwen Xu, Zijing Yin, Mingzhe Wang, Zhuo Su, Chengnian Sun, Yu Jiang e Jiaguang Sun. "Building Dynamic System Call Sandbox with Partial Order Analysis". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 de outubro de 2023): 1253–80. http://dx.doi.org/10.1145/3622842.
Texto completo da fonteInibhunu, Catherine, e Scott Langevin. "Adaptive Visualization of Complex Networks with FocalPoint". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n.º 1 (setembro de 2016): 233–37. http://dx.doi.org/10.1177/1541931213601052.
Texto completo da fonteCheng, Xiao Han, Shan Ming Luo, Xue Feng Chang e Dan Xie. "Numerical Analysis of an External Flow-Field around a Formula SAE Car Body Based on FLUENT". Advanced Materials Research 1039 (outubro de 2014): 17–24. http://dx.doi.org/10.4028/www.scientific.net/amr.1039.17.
Texto completo da fonteMannarini, Gianandrea, Mario Leonardo Salinas, Lorenzo Carelli, Nicola Petacco e Josip Orović. "VISIR-2: ship weather routing in Python". Geoscientific Model Development 17, n.º 10 (24 de maio de 2024): 4355–82. http://dx.doi.org/10.5194/gmd-17-4355-2024.
Texto completo da fonteJayanthi Rao, Et al. "Intelligent Traffic Monitoring System Using Vehicular Ad Hoc Network". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10 (2 de novembro de 2023): 629–35. http://dx.doi.org/10.17762/ijritcc.v11i10.8557.
Texto completo da fonteZhuang, Jun, e Mohammad Al Hasan. "Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-Supervision". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 4 (28 de junho de 2022): 4405–13. http://dx.doi.org/10.1609/aaai.v36i4.20362.
Texto completo da fonteOnyshchenko, Svitlana, Alina Yanko, Alina Hlushko e Polina Sabelnikova. "Assessment of information protection level against unauthorized access". ScienceRise, n.º 2 (30 de abril de 2023): 36–44. http://dx.doi.org/10.21303/2313-8416.2023.003211.
Texto completo da fonteManoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images". September 2021 3, n.º 3 (2 de outubro de 2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Texto completo da fonteFang, Zhu, e Zhengquan Xu. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping". Information 13, n.º 11 (14 de novembro de 2022): 537. http://dx.doi.org/10.3390/info13110537.
Texto completo da fonteZhang, Shuqin, Shijie Wang, Guangyao Bai, Minzhi Zhang, Peng Chen, Chunxia Zhao, Shuhan Li e Jiehan Zhou. "Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution". Wireless Communications and Mobile Computing 2022 (16 de junho de 2022): 1–16. http://dx.doi.org/10.1155/2022/2323228.
Texto completo da fonteKalinin, Maxim, Evgenii Zavadskii e Alexey Busygin. "A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure". Sensors 23, n.º 21 (26 de outubro de 2023): 8724. http://dx.doi.org/10.3390/s23218724.
Texto completo da fonteNguyen, Thanh H., Mason Wright, Michael P. Wellman e Satinder Singh. "Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis". Security and Communication Networks 2018 (13 de dezembro de 2018): 1–28. http://dx.doi.org/10.1155/2018/2864873.
Texto completo da fonteWei, Zhuangkun, Liang Wang, Schyler Chengyao Sun, Bin Li e Weisi Guo. "Graph Layer Security: Encrypting Information via Common Networked Physics". Sensors 22, n.º 10 (23 de maio de 2022): 3951. http://dx.doi.org/10.3390/s22103951.
Texto completo da fontePoolsappasit, N., R. Dewri e I. Ray. "Dynamic Security Risk Management Using Bayesian Attack Graphs". IEEE Transactions on Dependable and Secure Computing 9, n.º 1 (janeiro de 2012): 61–74. http://dx.doi.org/10.1109/tdsc.2011.34.
Texto completo da fonteCatal, Cagatay, Hakan Gunduz e Alper Ozcan. "Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems". Electronics 10, n.º 20 (18 de outubro de 2021): 2534. http://dx.doi.org/10.3390/electronics10202534.
Texto completo da fonteMajeed, Abdul, Safiullah Khan e Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks". Electronics 11, n.º 13 (21 de junho de 2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Texto completo da fonteKang, Qiyu, Kai Zhao, Yang Song, Yihang Xie, Yanan Zhao, Sijie Wang, Rui She e Wee Peng Tay. "Coupling Graph Neural Networks with Fractional Order Continuous Dynamics: A Robustness Study". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 12 (24 de março de 2024): 13049–58. http://dx.doi.org/10.1609/aaai.v38i12.29203.
Texto completo da fonteDharmalingam, Jeya Mala, e M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, n.º 3 (julho de 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Texto completo da fonteLi, Yicai, e Lin Shi. "Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing". Mathematical Problems in Engineering 2022 (22 de março de 2022): 1–10. http://dx.doi.org/10.1155/2022/9017267.
Texto completo da fonte