Статті в журналах з теми "Attacks detection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Attacks detection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
BALIGA, SANDEEP, ETHAN BUENO DE MESQUITA, and ALEXANDER WOLITZKY. "Deterrence with Imperfect Attribution." American Political Science Review 114, no. 4 (August 3, 2020): 1155–78. http://dx.doi.org/10.1017/s0003055420000362.
Kareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood, and Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier." Bulletin of Electrical Engineering and Informatics 12, no. 6 (December 1, 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
O, Belej, Spas N, Artyshchuk I, and Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models." Artificial Intelligence 26, jai2021.26(1) (June 30, 2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Sambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (December 25, 2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Xuan, Cho Do, Duc Duong, and Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic." Journal of Intelligent & Fuzzy Systems 40, no. 6 (June 21, 2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Haseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail, and Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey." Sensors 23, no. 15 (August 1, 2023): 6850. http://dx.doi.org/10.3390/s23156850.
Zhou, Qing Lei, Yan Ke Zhao, and Wei Jun Zhu. "Intrusion Detection for Universal Attack Mode Based on Projection Temporal Logic." Applied Mechanics and Materials 556-562 (May 2014): 2821–24. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2821.
Sravanthi, P. "Machine Learning Methods for Attack Detection in Smart Grid." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 2257–61. http://dx.doi.org/10.22214/ijraset.2024.59222.
Gupta, Punit, and Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 6 (August 30, 2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Qiao, Peng Zhe, Yi Ran Wang, and Yan Ke Zhao. "Intrusion Detection for Universal Attack Mode Based on Linear Temporal Logic with Past Construct." Applied Mechanics and Materials 680 (October 2014): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.680.433.
Li, Yong Liang, Wei Jun Zhu, and Qing Lei Zhou. "Intrusion Detection for Universal Attack Mode Based on Interval Temporal Logic with Past Construct." Advanced Materials Research 1006-1007 (August 2014): 1047–50. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.1047.
Sachdev, Rithik, Shreya Mishra, and Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Zaini, Nur Sholihah, Deris Stiawan, Mohd Faizal Ab Razak, Ahmad Firdaus, Wan Isni Sofiah Wan Din, Shahreen Kasim, and Tole Sutikno. "Phishing detection system using nachine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1165. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Deng, Wenping, Ziyu Yang, Peng Xun, Peidong Zhu, and Baosheng Wang. "Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems." Electronics 8, no. 9 (August 26, 2019): 941. http://dx.doi.org/10.3390/electronics8090941.
Shang, Fute, Buhong Wang, Fuhu Yan, and Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems." Security and Communication Networks 2019 (March 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Kumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (May 4, 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Li, Feng, and Hai Ying Wang. "Design on DDoS Attack Detection and Prevention Systems." Applied Mechanics and Materials 530-531 (February 2014): 798–801. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.798.
Farane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi, and Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (May 30, 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Miller, David, Yujia Wang, and George Kesidis. "When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time." Neural Computation 31, no. 8 (August 2019): 1624–70. http://dx.doi.org/10.1162/neco_a_01209.
Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (November 12, 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Aridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (October 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Ghugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi, and Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System." Journal of Computer Networks and Communications 2019 (January 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Gara, Fatma, Leila Ben Saad, and Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility." International Journal on Semantic Web and Information Systems 13, no. 3 (July 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Du, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou, and Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method." Transactions of the Institute of Measurement and Control 41, no. 6 (January 8, 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Shchetinin, Eugeny Yu, and Tatyana R. Velieva. "Detection of cyber-attacks on the power smart grids using semi-supervised deep learning models." Discrete and Continuous Models and Applied Computational Science 30, no. 3 (October 5, 2022): 258–68. http://dx.doi.org/10.22363/2658-4670-2022-30-3-258-268.
Wang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network." Applied Mechanics and Materials 644-650 (September 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (March 11, 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Liu, Bo, Hongyu Wu, Qihui Yang, and Hang Zhang. "Random-Enabled Hidden Moving Target Defense against False Data Injection Alert Attackers." Processes 11, no. 2 (January 21, 2023): 348. http://dx.doi.org/10.3390/pr11020348.
D., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques." Scientific Bulletin of Naval Academy XXII, no. 1 (July 15, 2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Soe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture." Sensors 20, no. 16 (August 5, 2020): 4372. http://dx.doi.org/10.3390/s20164372.
Fadlil, Abdul, Imam Riadi, and Sukma Aji. "Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics." Bulletin of Electrical Engineering and Informatics 6, no. 2 (June 1, 2017): 140–48. http://dx.doi.org/10.11591/eei.v6i2.605.
Watson, Lauren, Anupam Mediratta, Tariq Elahi, and Rik Sarkar. "Privacy Preserving Detection of Path Bias Attacks in Tor." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 111–30. http://dx.doi.org/10.2478/popets-2020-0065.
Hairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (January 23, 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Xia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Alansari, Zainab, Nor Badrul Anuar, Amirrudin Kamsin, and Mohammad Riyaz Belgaum. "A systematic review of routing attacks detection in wireless sensor networks." PeerJ Computer Science 8 (October 21, 2022): e1135. http://dx.doi.org/10.7717/peerj-cs.1135.
Han, Dezhi, Kun Bi, Han Liu, and Jianxin Jia. "A DDoS attack detection system based on spark framework." Computer Science and Information Systems 14, no. 3 (2017): 769–88. http://dx.doi.org/10.2298/csis161217028h.
Wu, Kongpei, Huiqin Qu, and Conggui Huang. "A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part." Future Internet 15, no. 4 (March 28, 2023): 128. http://dx.doi.org/10.3390/fi15040128.
dos Santos, Rodrigo, Ashwitha Kassetty, and Shirin Nilizadeh. "Disrupting Audio Event Detection Deep Neural Networks with White Noise." Technologies 9, no. 3 (September 6, 2021): 64. http://dx.doi.org/10.3390/technologies9030064.
Gavrić, Nikola, and Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat." Sensors 22, no. 20 (October 14, 2022): 7791. http://dx.doi.org/10.3390/s22207791.
Lee, Kyungroul, Jaehyuk Lee, and Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack." Applied Sciences 13, no. 5 (February 23, 2023): 2894. http://dx.doi.org/10.3390/app13052894.
Yu, Zhenhua, Xudong Duan, Xuya Cong, Xiangning Li, and Li Zheng. "Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems." Mathematics 11, no. 4 (February 13, 2023): 943. http://dx.doi.org/10.3390/math11040943.
Kasture, Pradnya. "DDoS Attack Detection using ML." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.
Alamsyah, Hendri, Riska, and Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Chauhan, Ravi, Ulya Sabeel, Alireza Izaddoost, and Shahram Shah Heydari. "Polymorphic Adversarial Cyberattacks Using WGAN." Journal of Cybersecurity and Privacy 1, no. 4 (December 12, 2021): 767–92. http://dx.doi.org/10.3390/jcp1040037.
Joshi, Sagar Vasantrao, Nanda Wagh, Jambi Ratna Raja Kumar, Deepika Dongre, Nuzhat Rizvi, and Mahua Bhowmik. "Mitigating DDoS attacks with an intrusion detection and prevention system based on 2-player Bayesian game theory." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 809–20. http://dx.doi.org/10.47974/jdmsc-1957.
Siddiqa, Ayesha. "Web Based Intrusion Detection System for SQLIA." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (November 1, 2023): 1–11. http://dx.doi.org/10.55041/ijsrem26708.
Chaves, Cesar, Siavoosh Azad, Thomas Hollstein, and Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures." Journal of Low Power Electronics and Applications 9, no. 1 (February 5, 2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Peterson, Matthew, Todd Andel, and Ryan Benton. "Towards Detection of Selfish Mining Using Machine Learning." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 237–43. http://dx.doi.org/10.34190/iccws.17.1.15.
Chamotra, Saurabh, Rakesh Kumar Sehgal, and Ram Swaroop Misra. "Honeypot Baselining for Zero Day Attack Detection." International Journal of Information Security and Privacy 11, no. 3 (July 2017): 63–74. http://dx.doi.org/10.4018/ijisp.2017070106.