Статті в журналах з теми "Attack on the network"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Attack on the network".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Повний текст джерелаSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Повний текст джерелаGlăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.
Повний текст джерелаWinda Andrini Wulandari. "THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 3, no. 1 (April 20, 2018): 18–25. http://dx.doi.org/10.20527/jtiulm.v3i1.24.
Повний текст джерелаKamaleshwar, T., R. Lakshminarayanan, Yuvaraja Teekaraman, Ramya Kuppusamy, and Arun Radhakrishnan. "Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN." Wireless Communications and Mobile Computing 2021 (December 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/5143124.
Повний текст джерелаPark, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (November 14, 2020): 8079. http://dx.doi.org/10.3390/app10228079.
Повний текст джерелаQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Повний текст джерелаGandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.
Повний текст джерелаSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Повний текст джерелаMoskal, Stephen, Shanchieh Jay Yang, and Michael E. Kuhl. "Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (August 15, 2017): 13–29. http://dx.doi.org/10.1177/1548512917725408.
Повний текст джерелаPodobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (November 2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.
Повний текст джерелаPatel, Anshuman, and Devesh Jinwala. "A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things." International Journal of Information Security and Privacy 15, no. 4 (October 2021): 1–17. http://dx.doi.org/10.4018/ijisp.2021100101.
Повний текст джерелаBALABAN, Ioana. "Denial-of-Service Attack." International Journal of Information Security and Cybercrime 10, no. 1 (June 29, 2021): 59–64. http://dx.doi.org/10.19107/ijisc.2021.01.06.
Повний текст джерелаYan, Yao, and Rui Xu. "DDoS Attacks for Ad Hoc Network Based on Attack Cluster." Advanced Materials Research 546-547 (July 2012): 1371–76. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1371.
Повний текст джерелаChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Повний текст джерелаDhaked, Urvashi, Dr Ashok Kumar, and Dr Brajesh Kumar Singh. "Detection and Isolation Technique for Sinkhole Attack in WSN." Journal of University of Shanghai for Science and Technology 23, no. 10 (October 9, 2021): 381–90. http://dx.doi.org/10.51201/jusst/21/10718.
Повний текст джерелаShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Повний текст джерелаMitchel, Christopher, Baraq Ghaleb, Safwan M. Ghaleb, Zakwan Jaroucheh, and Bander Ali Saleh Al-rimy. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology 10, no. 2 (December 30, 2020): 66–72. http://dx.doi.org/10.35940/ijeat.b1962.1210220.
Повний текст джерелаSowah, Robert A., Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, and Koudjo M. Koumadi. "Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)." Journal of Computer Networks and Communications 2019 (January 20, 2019): 1–14. http://dx.doi.org/10.1155/2019/4683982.
Повний текст джерелаXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Повний текст джерелаDivekar, Anuja Sanjay, Deepali Borade, and Vivek Bugad. "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 3 (January 8, 2015): 5543–49. http://dx.doi.org/10.24297/ijct.v14i3.1998.
Повний текст джерелаNajafabadi, Maryam M., Taghi M. Khoshgoftaar, and Amri Napolitano. "Detecting Network Attacks Based on Behavioral Commonalities." International Journal of Reliability, Quality and Safety Engineering 23, no. 01 (February 2016): 1650005. http://dx.doi.org/10.1142/s0218539316500054.
Повний текст джерелаMunir, Misbachul, Ipung Ardiansyah, Joko Dwi Santoso, Ali Mustopa, and Sri Mulyatun. "DETECTION AND MITIGATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS ON NETWORK ARCHITECTURE SOFTWARE DEFINED NETWORKING USING THE NAIVE BAYES ALGORITHM." Journal of Information System Management (JOISM) 3, no. 2 (January 16, 2022): 51–55. http://dx.doi.org/10.24076/joism.2022v3i2.656.
Повний текст джерелаSun, Yan, and Xue Guang Zhou. "Research on Attack Model for Cognitive Network Based on Scientific Analysis of Network Material System." Applied Mechanics and Materials 63-64 (June 2011): 911–14. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.911.
Повний текст джерелаThakur, Mandeep, and Amninder Kaur Gill. "Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 25. http://dx.doi.org/10.23956/ijarcsse.v7i8.12.
Повний текст джерелаHoumer, Meriem, and Moulay Lahcen Hasnaoui. "A risk and security assessment of VANET availability using attack tree concept." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6039. http://dx.doi.org/10.11591/ijece.v10i6.pp6039-6044.
Повний текст джерелаApiecionek, Łukasz, and Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection." JUCS - Journal of Universal Computer Science 26, no. 11 (November 28, 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.
Повний текст джерелаvan Heerden, R. P., B. Irwin, I. D. Burke, and L. Leenen. "A Computer Network Attack Taxonomy and Ontology." International Journal of Cyber Warfare and Terrorism 2, no. 3 (July 2012): 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.
Повний текст джерелаLalar, Sacachin, Shashi Bhushan, and Surender Surender. "Analysis of Clone Detection Approaches in Static Wireless Sensor Networks." Oriental journal of computer science and technology 10, no. 3 (August 5, 2017): 653–59. http://dx.doi.org/10.13005/ojcst/10.03.14.
Повний текст джерелаWang, Rui, Yingxian Chang, Lei Ma, Hao Zhang, Xin Liu, Jianfei Chen, Donglan Liu, Yong Zhang, and Bing Su. "The Border Attack Defense System is Software-Based." Journal of Physics: Conference Series 2074, no. 1 (November 1, 2021): 012041. http://dx.doi.org/10.1088/1742-6596/2074/1/012041.
Повний текст джерелаBERCHE, BERTRAND, CHRISTIAN VON FERBER, TARAS HOLOVATCH, and YURIJ HOLOVATCH. "TRANSPORTATION NETWORK STABILITY: A CASE STUDY OF CITY TRANSIT." Advances in Complex Systems 15, supp01 (June 2012): 1250063. http://dx.doi.org/10.1142/s0219525912500634.
Повний текст джерелаAl-Rushdan, Huthifh, Mohammad Shurman, and Sharhabeel Alnabelsi. "On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks." International Arab Journal of Information Technology 17, no. 4A (July 31, 2020): 662–70. http://dx.doi.org/10.34028/iajit/17/4a/11.
Повний текст джерелаLi, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.
Повний текст джерелаRajeshwari, T., and C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Повний текст джерелаAlamsyah, Hendri, Riska, and Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Повний текст джерелаSatvir Kaur, Gureshpal Singh, Baljinder Singh. "Detection and Prevention of DDoS Attack Using Gateway Mechanism." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 2 (February 28, 2019): 21–26. http://dx.doi.org/10.17762/ijritcc.v7i2.5227.
Повний текст джерелаK*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.
Повний текст джерелаDhamodharan, Udaya Suriya Raj Kumar, and Rajamani Vayanaperumal. "Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method." Scientific World Journal 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/841267.
Повний текст джерелаYang, Yong, Kaijun Xu, and Honghui Xiang. "Analysis on Chinese Airline Network Invulnerability." Journal of Systems Science and Information 7, no. 4 (September 25, 2019): 359–72. http://dx.doi.org/10.21078/jssi-2019-359-14.
Повний текст джерелаAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Повний текст джерелаLi, Muhai, and Ming Li. "An Adaptive Approach for Defending against DDoS Attacks." Mathematical Problems in Engineering 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/570940.
Повний текст джерелаFeng, Xinzhi, Yang Yang, Xiaozhong Qi, Chunming Xu, and Ze Ji. "Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events." Security and Communication Networks 2021 (February 10, 2021): 1–14. http://dx.doi.org/10.1155/2021/6643034.
Повний текст джерелаStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Повний текст джерелаAdhana, Finandito, and I. Ketut Gede Suhartana. "Deteksi Serangan Denial of Service di Situs Web dengan Wireshark Menggunakan Metode IDS Berbasis Anomali." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 375. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p02.
Повний текст джерела., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Повний текст джерелаSharma, Vishal, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, and Sun-Young Lee. "A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT." Security and Communication Networks 2017 (2017): 1–24. http://dx.doi.org/10.1155/2017/4749085.
Повний текст джерелаFan, Cong, Nitheesh Murugan Kaliyamurthy, Shi Chen, He Jiang, Yiwen Zhou, and Carlene Campbell. "Detection of DDoS Attacks in Software Defined Networking Using Entropy." Applied Sciences 12, no. 1 (December 31, 2021): 370. http://dx.doi.org/10.3390/app12010370.
Повний текст джерелаKumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Повний текст джерелаAsabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (January 2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.
Повний текст джерелаBAO, ZHE-JING, WEN-JUN YAN, and CHUANG-XIN GUO. "RISK ASSESSMENT OF ATTACK-INDUCED CASCADE IN COMPLEX NETWORKS." International Journal of Modern Physics C 22, no. 08 (August 2011): 765–73. http://dx.doi.org/10.1142/s0129183111016579.
Повний текст джерела