Artigos de revistas sobre o tema "Security attacks detection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Security attacks detection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (12 de abril de 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Texto completo da fonteJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (12 de abril de 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Texto completo da fonteKumavat, Kavita S., e Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 4 (4 de maio de 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Texto completo da fonteKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood e Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier". Bulletin of Electrical Engineering and Informatics 12, n.º 6 (1 de dezembro de 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Texto completo da fonteDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou e Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method". Transactions of the Institute of Measurement and Control 41, n.º 6 (8 de janeiro de 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Texto completo da fonteKumar, Sunil, e Maninder Singh. "Detection and Isolation of Zombie Attack under Cloud Environment". Oriental journal of computer science and technology 10, n.º 2 (12 de abril de 2017): 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Texto completo da fonteFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi e Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning". World Journal of Advanced Engineering Technology and Sciences 12, n.º 1 (30 de maio de 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Texto completo da fonteAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz e Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions". Electronics 12, n.º 6 (11 de março de 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Texto completo da fonteAlamsyah, Hendri, Riska e Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System". JOINTECS (Journal of Information Technology and Computer Science) 5, n.º 1 (25 de janeiro de 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Texto completo da fonteSalih, Azar Abid, e Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection". Indonesian Journal of Electrical Engineering and Computer Science 31, n.º 3 (1 de setembro de 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Texto completo da fonteNeelaveni, Dr R., Abhinav . e Sahas . "Analysis of Efficient Intrusion Detection System using Ensemble Learning". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 1521–30. http://dx.doi.org/10.22214/ijraset.2023.51858.
Texto completo da fonteSheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh e Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)". Sensors 23, n.º 12 (9 de junho de 2023): 5459. http://dx.doi.org/10.3390/s23125459.
Texto completo da fonteSoe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto e Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture". Sensors 20, n.º 16 (5 de agosto de 2020): 4372. http://dx.doi.org/10.3390/s20164372.
Texto completo da fonteQiu, Ling, e Cai Ming Liu. "An Intelligent Detection Method for Network Security". Applied Mechanics and Materials 530-531 (fevereiro de 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.
Texto completo da fonteRohit Khedkar et al. "Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms". Proceeding International Conference on Science and Engineering 11, n.º 1 (18 de fevereiro de 2023): 241–52. http://dx.doi.org/10.52783/cienceng.v11i1.120.
Texto completo da fonteGavrić, Nikola, e Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat". Sensors 22, n.º 20 (14 de outubro de 2022): 7791. http://dx.doi.org/10.3390/s22207791.
Texto completo da fonteCho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms". Electronics 8, n.º 11 (13 de novembro de 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.
Texto completo da fontePanduardi, Farizqi, Herman Yuliandoko e Agus Priyo Utomo. "Network Security Using Honeypot and Attack Detection with Android Application". Indonesian Journal of Engineering Research 2, n.º 2 (27 de novembro de 2021): 53–60. http://dx.doi.org/10.11594/10.11594/ijer.02.02.04.
Texto completo da fonteSachdev, Rithik, Shreya Mishra e Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection". International Journal for Research in Applied Science and Engineering Technology 10, n.º 8 (31 de agosto de 2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Texto completo da fonteVinod Kumar, Boddupally, K. Pranaya Vardhan, Kurceti Subba Rao e Thipparthy Navya Sree. "IDENTIFICATION OF UNSATURATED ATTACKS IN VIRTUALIZED INFRASTRUCTURES WITH BIG DATA ANALYTICS IN CLOUD COMPUTING". Journal of Nonlinear Analysis and Optimization 14, n.º 02 (2023): 286–92. http://dx.doi.org/10.36893/jnao.2023.v14i2.286-292.
Texto completo da fonteGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi e Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System". Journal of Computer Networks and Communications 2019 (6 de janeiro de 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Texto completo da fontePatil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina e Ketan Kotecha. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning". Algorithms 14, n.º 10 (15 de outubro de 2021): 297. http://dx.doi.org/10.3390/a14100297.
Texto completo da fonteGupta, Punit, e Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, n.º 6 (30 de agosto de 2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Texto completo da fonteRajan, Del. "Entropic DDoS Detection for Quantum Networks". Quantum Reports 4, n.º 4 (13 de dezembro de 2022): 604–15. http://dx.doi.org/10.3390/quantum4040044.
Texto completo da fonteAl-Zewairi, Malek, Sufyan Almajali e Moussa Ayyash. "Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers". Electronics 9, n.º 12 (26 de novembro de 2020): 2006. http://dx.doi.org/10.3390/electronics9122006.
Texto completo da fonteFang, Xing, Wenhui Zhang, Jiming Lin e Yuming Liu. "Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection". Security and Communication Networks 2022 (13 de agosto de 2022): 1–14. http://dx.doi.org/10.1155/2022/1957497.
Texto completo da fonteSilva, Rui Filipe, Raul Barbosa e Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks". International Journal of Information Security and Privacy 14, n.º 2 (abril de 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Texto completo da fonteMuhammad, Hafsat, Olumide B. Longe, Abimbola Baale, e U.-O. Ekpo Antai. "Towards the Development of a Machine Learning Enhanceed Framework for Honeypot and CAPTCHA Intrusion Detection Systems". Advances in Multidisciplinary and scientific Research Journal Publication 34 (30 de dezembro de 2022): 43–50. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p4.
Texto completo da fonteO, Belej, Spas N, Artyshchuk I e Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models". Artificial Intelligence 26, jai2021.26(1) (30 de junho de 2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Texto completo da fonteHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut e Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques". Electronics 12, n.º 3 (23 de janeiro de 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Texto completo da fonteHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail e Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey". Sensors 23, n.º 15 (1 de agosto de 2023): 6850. http://dx.doi.org/10.3390/s23156850.
Texto completo da fonteTolіupa, Serhii, Oleksandr Pliushch e Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES". Cybersecurity: Education, Science, Technique 2, n.º 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Texto completo da fonteBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam e Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 6 (1 de dezembro de 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Texto completo da fonteAbuabid, Ali, e Abdulrahman Aldeij. "Cyber Security Incident Response". Journal of Information Security and Cybercrimes Research 7, n.º 1 (2 de junho de 2024): 29–50. http://dx.doi.org/10.26735/pnob5534.
Texto completo da fonteLin, Hsiao-Chung, Ping Wang e Wen-Hui Lin. "Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks". Computers 8, n.º 4 (4 de dezembro de 2019): 88. http://dx.doi.org/10.3390/computers8040088.
Texto completo da fonteGara, Fatma, Leila Ben Saad e Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility". International Journal on Semantic Web and Information Systems 13, n.º 3 (julho de 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Texto completo da fonteYan, Guanghua, Qiang Li, Dong Guo e Bing Li. "AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats". Sensors 19, n.º 14 (19 de julho de 2019): 3180. http://dx.doi.org/10.3390/s19143180.
Texto completo da fonteXuan, Cho Do, Duc Duong e Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic". Journal of Intelligent & Fuzzy Systems 40, n.º 6 (21 de junho de 2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Texto completo da fonteAlashhab, Abdussalam Ahmed, Mohd Soperi Mohd Zahid, Mohamed A. Azim, Muhammad Yunis Daha, Babangida Isyaku e Shimhaz Ali. "A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks". Symmetry 14, n.º 8 (29 de julho de 2022): 1563. http://dx.doi.org/10.3390/sym14081563.
Texto completo da fonteShang, Fute, Buhong Wang, Fuhu Yan e Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems". Security and Communication Networks 2019 (3 de março de 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Texto completo da fonteVermani, Kunal, Amandeep Noliya, Sunil Kumar e Kamlesh Dutta. "Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs". Journal of Information Systems Engineering and Business Intelligence 9, n.º 2 (1 de novembro de 2023): 136–46. http://dx.doi.org/10.20473/jisebi.9.2.136-146.
Texto completo da fonteLiu, Likun, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq e Mengmeng Ge. "An Efficient Security System for Mobile Data Monitoring". Wireless Communications and Mobile Computing 2018 (11 de junho de 2018): 1–10. http://dx.doi.org/10.1155/2018/9809345.
Texto completo da fonteDesai, Vinod, e Dinesha Hagare Annappaiah. "Reputation-based Security model for detecting biased attacks in BigData". Indonesian Journal of Electrical Engineering and Computer Science 29, n.º 3 (1 de março de 2023): 1567. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1567-1576.
Texto completo da fonteALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model". Journal of Applied Engineering and Technological Science (JAETS) 5, n.º 1 (10 de dezembro de 2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.
Texto completo da fonteDasari, Kishore Babu, e Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms". Ingénierie des systèmes d information 26, n.º 5 (31 de outubro de 2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Texto completo da fonteAl-Rajeh, Noura S., e Amal A. Al-Shargabi. "Dual Spectral Attention Model for Iris Presentation Attack Detection". International Journal of Interactive Mobile Technologies (iJIM) 18, n.º 10 (22 de maio de 2024): 71–89. http://dx.doi.org/10.3991/ijim.v18i10.46981.
Texto completo da fonteXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks". Applied Mechanics and Materials 484-485 (janeiro de 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Texto completo da fonteSkaruz, Jarosław. "Database security: combining neural networks and classification approach". Studia Informatica, n.º 23 (22 de dezembro de 2020): 95–115. http://dx.doi.org/10.34739/si.2019.23.06.
Texto completo da fonteKhan, Zulfiqar Ali, e Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, n.º 23 (24 de novembro de 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Texto completo da fonteBarabanov, Alexander, Denis Dergunov, Denis Makrushin e Aleksey Teplov. "AUTOMATIC DETECTION OF ACCESS CONTROL VULNERABILITIES VIA API SPECIFICATION PROCESSING". Voprosy kiberbezopasnosti, n.º 1(47) (2022): 49–65. http://dx.doi.org/10.21681/2311-3456-2022-1-49-65.
Texto completo da fonte