Artigos de revistas sobre o tema "Trust attacks Prevention"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Trust attacks Prevention".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Karabacak, Bilge, e Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, n.º 1 (2 de março de 2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Texto completo da fonteLi, Lixiang, Jürgen Kurths, Yixian Yang e Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks". Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Texto completo da fonteKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid e Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks". Sensors 24, n.º 6 (9 de março de 2024): 1775. http://dx.doi.org/10.3390/s24061775.
Texto completo da fonteS, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol". International Journal of Advanced Trends in Computer Science and Engineering 9, n.º 3 (25 de junho de 2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Texto completo da fonteAtiq, Eman, Maheen Mujeeb e Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies". British journal of Psychology Research 11, n.º 2 (15 de fevereiro de 2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Texto completo da fonteBoakye-Boateng, Kwasi, Ali A. Ghorbani e Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal". Journal of Sensor and Actuator Networks 11, n.º 3 (11 de julho de 2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Texto completo da fonteSalahdine, Fatima, e Naima Kaabouch. "Social Engineering Attacks: A Survey". Future Internet 11, n.º 4 (2 de abril de 2019): 89. http://dx.doi.org/10.3390/fi11040089.
Texto completo da fonteSubathra, P., S. Sivagurunathan e N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks". International Journal of Business Data Communications and Networking 6, n.º 1 (janeiro de 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Texto completo da fonteMoinescu, Radu. "Study of social engineering attacks in Romania 2019". Scientific Bulletin of Naval Academy XXIII, n.º 1 (15 de julho de 2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Texto completo da fonteQuader, Faisal, e Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies". Journal of Cybersecurity and Privacy 1, n.º 4 (11 de novembro de 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Texto completo da fonteSrinivas, T. Aditya Sai, e S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing". Journal of Ambient Intelligence and Smart Environments 13, n.º 2 (26 de março de 2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Texto completo da fonteAl-Shareeda, Mahmood A., Selvakumar Manickam, Murtaja Ali Saare e Navaneethan C. Arjuman. "Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network". Indonesian Journal of Electrical Engineering and Computer Science 29, n.º 1 (1 de janeiro de 2022): 518. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp518-526.
Texto completo da fonteOvaz Akpinar, Kevser, e Ibrahim Ozcelik. "Development of the ECAT Preprocessor with the Trust Communication Approach". Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2639750.
Texto completo da fonteKarri, Ganesh Reddy, A. V. Prabu, Sidheswar Routray, D. Sumathi, S. Rajasoundaran, Amrit Mukherjee, Pushpita Chatterjee e Waleed Alnumay. "Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks". Wireless Communications and Mobile Computing 2022 (17 de agosto de 2022): 1–20. http://dx.doi.org/10.1155/2022/7240795.
Texto completo da fonteAndrade, Rui, Isabel Praça, Sinan Wannous e Sergio Ramos. "The Impact of Attacks in LEM and Prevention Measures Based on Forecasting and Trust Models". Processes 9, n.º 2 (8 de fevereiro de 2021): 314. http://dx.doi.org/10.3390/pr9020314.
Texto completo da fonteUllah, Ikram, Gerard de Roode, Nirvana Meratnia e Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, n.º 5 (6 de março de 2021): 1834. http://dx.doi.org/10.3390/s21051834.
Texto completo da fonteMartínez, Jeferson, e Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study". International Journal of Safety and Security Engineering 11, n.º 5 (31 de outubro de 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Texto completo da fonteChandan, Radha Raman, Awatef Balobaid, Naga Lakshmi Sowjanya Cherukupalli, Gururaj H L, Francesco Flammini e Rajesh Natarajan. "Secure Modern Wireless Communication Network Based on Blockchain Technology". Electronics 12, n.º 5 (22 de fevereiro de 2023): 1095. http://dx.doi.org/10.3390/electronics12051095.
Texto completo da fonteUslu, Suleyman, Davinder Kaur, Mimoza Durresi e Arjan Durresi. "Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing". Sensors 22, n.º 24 (16 de dezembro de 2022): 9905. http://dx.doi.org/10.3390/s22249905.
Texto completo da fonteSinghal, Prateek, Puneet Sharma e Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator". International Journal of Engineering & Technology 7, n.º 2.8 (19 de março de 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Texto completo da fonteSantosh Kumar, Dinesh Kumar Singh, Atma Prakash Singh,. "Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de novembro de 2023): 2403–7. http://dx.doi.org/10.17762/ijritcc.v11i9.9295.
Texto completo da fonteKhan, Prince Waqas, e Yungcheol Byun. "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things". Entropy 22, n.º 2 (4 de fevereiro de 2020): 175. http://dx.doi.org/10.3390/e22020175.
Texto completo da fonteZimba, Aaron, Luckson Simukonda e Mumbi Chishimba. "Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security". Zambia ICT Journal 1, n.º 1 (11 de dezembro de 2017): 35–40. http://dx.doi.org/10.33260/zictjournal.v1i1.19.
Texto completo da fonteU. V., Esara, Mfon E. A. e Walter O. O. "Impact of Modern Cultism and Governance in Akwa Ibom State, Nigeria". African Journal of Law, Political Research and Administration 7, n.º 1 (2 de julho de 2024): 135–47. http://dx.doi.org/10.52589/ajlpra-4ndqroth.
Texto completo da fonteJohnson, Anju P., Hussain Al-Aqrabi e Richard Hill. "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems". Sensors 20, n.º 3 (5 de fevereiro de 2020): 844. http://dx.doi.org/10.3390/s20030844.
Texto completo da fonteMaheshwari, Uma, Suresh .., Mahendra .., Kadiyam .. e Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques". International Journal of Wireless and Ad Hoc Communication, n.º 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.
Texto completo da fonteYang, Jing, Yen-Lin Chen, Lip Yee Por e Chin Soon Ku. "A Systematic Literature Review of Information Security in Chatbots". Applied Sciences 13, n.º 11 (23 de maio de 2023): 6355. http://dx.doi.org/10.3390/app13116355.
Texto completo da fontePreiya, V. Sathya, V. D. Ambeth Kumar, R. Vijay, Vijay K. e N. Kirubakaran. "Blockchain-Based E-Voting System with Face Recognition". Fusion: Practice and Applications 12, n.º 1 (2023): 53–63. http://dx.doi.org/10.54216/fpa.120104.
Texto completo da fonteAlshammari, Salah T., e Khalid Alsubhi. "Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment". Applied Sciences 11, n.º 18 (13 de setembro de 2021): 8496. http://dx.doi.org/10.3390/app11188496.
Texto completo da fonteKuo, Jong-Yih, Zhi-Jia Wen, Ti-Feng Hsieh e Han-Xuan Huang. "A Study on the Security of Online Judge System Applied Sandbox Technology". Electronics 12, n.º 14 (10 de julho de 2023): 3018. http://dx.doi.org/10.3390/electronics12143018.
Texto completo da fontePark, Sangwoo, Soowoong Lee e Jooseok Song. "An Improved Trust-Free Approach for Preserving Privacy in Internet of Things". International Journal on Cybernetics & Informatics 11, n.º 4 (27 de agosto de 2022): 157–65. http://dx.doi.org/10.5121/ijci.2022.110412.
Texto completo da fonteChandel, Tanmay. "Review of Malware and Phishing in the Current and Next Generation of the Internet". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 6499–502. http://dx.doi.org/10.22214/ijraset.2023.52927.
Texto completo da fonteZhang, Fu-Guo. "Preventing Recommendation Attack in Trust-Based Recommender Systems". Journal of Computer Science and Technology 26, n.º 5 (setembro de 2011): 823–28. http://dx.doi.org/10.1007/s11390-011-0181-4.
Texto completo da fonteBlatchford, J. "An audit of a general practices compliance with national recommendations for the avoidance of complications for type 2 diabetic patients". International Journal of Pharmacy Practice 31, Supplement_2 (30 de novembro de 2023): ii8—ii9. http://dx.doi.org/10.1093/ijpp/riad074.010.
Texto completo da fonteNivedita, V., e N. Nandhagopal. "Trust Management-Based Service Recovery and Attack Prevention in MANET". Intelligent Automation & Soft Computing 29, n.º 3 (2021): 771–86. http://dx.doi.org/10.32604/iasc.2021.017547.
Texto completo da fonteRajamäki, Jyri. "Towards Resilient Cyber-Physical eHealth Systems". EQUATIONS 1 (24 de dezembro de 2021): 78–82. http://dx.doi.org/10.37394/232021.2021.1.12.
Texto completo da fonteHaval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols". Advances in Nonlinear Variational Inequalities 26, n.º 2 (30 de junho de 2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Texto completo da fonteSyed, Salman Ali, e Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing". International Journal of Electrical and Computer Engineering (IJECE) 12, n.º 1 (1 de fevereiro de 2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.
Texto completo da fonteKang, Xin, e Yongdong Wu. "A trust-based pollution attack prevention scheme in peer-to-peer streaming networks". Computer Networks 72 (outubro de 2014): 62–73. http://dx.doi.org/10.1016/j.comnet.2014.07.012.
Texto completo da fonteBalaji Srikaanth, P., e V. Nagarajan. "A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs". Wireless Personal Communications 101, n.º 1 (2 de maio de 2018): 339–57. http://dx.doi.org/10.1007/s11277-018-5691-8.
Texto completo da fonteShinde, Prof Kaustubh, Sakshi Hadole, Rutuja Sathe, Sakshi Sirgan e Abhijit Thorat. "Cyber Attack Detection". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 03 (5 de março de 2024): 1–13. http://dx.doi.org/10.55041/ijsrem29058.
Texto completo da fonteSingh, Kamini, Gyan Singh e Arpit Agrawal. "A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET". International Journal of Computer Applications 94, n.º 20 (30 de maio de 2014): 1–5. http://dx.doi.org/10.5120/16548-5825.
Texto completo da fonteGellert, George A., Sean P. Kelly, Edwin W. Wright e Leslie C. Keil. "Zero Trust and the future of cybersecurity in healthcare delivery organizations". Journal of Hospital Administration 12, n.º 1 (9 de fevereiro de 2023): 1. http://dx.doi.org/10.5430/jha.v12n1p1.
Texto completo da fonteJunejo, Aisha Kanwal, Imran Ali Jokhio e Tony Jan. "A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services". Electronics 11, n.º 13 (21 de junho de 2022): 1932. http://dx.doi.org/10.3390/electronics11131932.
Texto completo da fonteMehetre, Deepak C., S. Emalda Roslin e Sanjeev J. Wagh. "Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust". Cluster Computing 22, S1 (14 de março de 2018): 1313–28. http://dx.doi.org/10.1007/s10586-017-1622-9.
Texto completo da fonteIsaac Sajan, R., e J. Jasper. "Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network". International Journal of Communication Systems 33, n.º 8 (28 de janeiro de 2020): e4341. http://dx.doi.org/10.1002/dac.4341.
Texto completo da fonteMishra, Priya, Ompal Singh e Abhishek Bhatt. "A Trust Election based Mechanism for finding selfish node and preventing them from Attack". International Journal of Computer Sciences and Engineering 7, n.º 2 (28 de fevereiro de 2019): 223–29. http://dx.doi.org/10.26438/ijcse/v7i2.223229.
Texto completo da fonteOtari, Grantej Vinod, e Vijay Ram Ghorpade. "A trust management model based on NSGA-II in mobile grid system". International Journal of Knowledge-based and Intelligent Engineering Systems 24, n.º 3 (28 de setembro de 2020): 235–42. http://dx.doi.org/10.3233/kes-200045.
Texto completo da fonteShinde, Kaustubh. "Implementation Paper on Cyberattack Detection". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 05 (31 de maio de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35135.
Texto completo da fonteMarynissen, Hugo, e Mike Lauder. "Stakeholder-Focused Communication Strategy During Crisis: A Case Study Based on the Brussels Terror Attacks". International Journal of Business Communication 57, n.º 2 (2 de novembro de 2019): 176–93. http://dx.doi.org/10.1177/2329488419882736.
Texto completo da fonte