Статті в журналах з теми "Byzantines Attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Byzantines Attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Повний текст джерелаVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Повний текст джерелаYang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (August 5, 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Повний текст джерелаWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (March 1, 2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Повний текст джерелаSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Повний текст джерелаWang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (March 7, 2023): 2904. http://dx.doi.org/10.3390/s23062904.
Повний текст джерелаAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (July 2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Повний текст джерелаWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Повний текст джерелаABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (November 22, 2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Повний текст джерелаMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Повний текст джерелаPlatt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (January 6, 2023): 34. http://dx.doi.org/10.3390/a16010034.
Повний текст джерелаKaya, Tülin. "Understanding the Use of Byzantine Routes in Central Anatolia (ca. 7TH–9TH Centuries)." Studia Ceranea 9 (December 30, 2019): 259–78. http://dx.doi.org/10.18778/2084-140x.09.14.
Повний текст джерелаFilatov, Alexey. "The power of the arab caliphs in the byzantine literature of the 9th and 10th centuries." Metamorphoses of history, no. 26 (2022): 0. http://dx.doi.org/10.37490/s230861810023611-2.
Повний текст джерелаWhealey, Alice. "Muslim Motives for Conquering the Byzantine Empire 634–720: The Evidence from Eastern Christian Sources." Russian History 40, no. 1 (2013): 9–26. http://dx.doi.org/10.1163/18763316-04001002.
Повний текст джерелаPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Повний текст джерелаCheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.
Повний текст джерелаLi, Liping, Wei Xu, Tianyi Chen, Georgios B. Giannakis, and Qing Ling. "RSA: Byzantine-Robust Stochastic Aggregation Methods for Distributed Learning from Heterogeneous Datasets." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1544–51. http://dx.doi.org/10.1609/aaai.v33i01.33011544.
Повний текст джерелаKim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (June 28, 2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.
Повний текст джерелаZhai, Kun, Qiang Ren, Junli Wang, and Chungang Yan. "Byzantine-robust federated learning via credibility assessment on non-IID data." Mathematical Biosciences and Engineering 19, no. 2 (2021): 1659–76. http://dx.doi.org/10.3934/mbe.2022078.
Повний текст джерелаGuru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, and Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology." Applied Sciences 13, no. 4 (February 17, 2023): 2604. http://dx.doi.org/10.3390/app13042604.
Повний текст джерелаCao, Ruohan, Tan F. Wong, Tiejun Lv, Hui Gao, and Shaoshi Yang. "Detecting Byzantine Attacks Without Clean Reference." IEEE Transactions on Information Forensics and Security 11, no. 12 (December 2016): 2717–31. http://dx.doi.org/10.1109/tifs.2016.2596140.
Повний текст джерелаGupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (January 1, 2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.
Повний текст джерелаPrabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (October 18, 2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.
Повний текст джерелаAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (November 17, 2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.
Повний текст джерелаB.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (March 26, 2014): 1–4. http://dx.doi.org/10.5120/15817-4238.
Повний текст джерелаAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (August 18, 2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.
Повний текст джерелаWu, Jun, Pei Li, Yang Chen, Jifei Tang, Chao Wei, Lanhua Xia, and Tiecheng Song. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (August 2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.
Повний текст джерелаMenelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (December 1, 2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.
Повний текст джерелаNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (October 29, 2020): 185. http://dx.doi.org/10.3390/fi12110185.
Повний текст джерелаHarris, Simon. "The Byzantine prokeimena." Plainsong and Medieval Music 3, no. 2 (October 1994): 133–47. http://dx.doi.org/10.1017/s096113710000070x.
Повний текст джерелаWu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (June 2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.
Повний текст джерелаSarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (July 9, 2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.
Повний текст джерелаZhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.
Повний текст джерелаMarano, S., V. Matta, and Lang Tong. "Distributed Detection in the Presence of Byzantine Attacks." IEEE Transactions on Signal Processing 57, no. 1 (January 2009): 16–29. http://dx.doi.org/10.1109/tsp.2008.2007335.
Повний текст джерелаZhao, Bo, Peng Sun, Tao Wang, and Keyu Jiang. "FedInv: Byzantine-Robust Federated Learning by Inversing Local Model Updates." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 8 (June 28, 2022): 9171–79. http://dx.doi.org/10.1609/aaai.v36i8.20903.
Повний текст джерелаJanus, Tomasz, Mateusz Skomra, and Marcin Dziubiński. "Individual Security and Network Design with Malicious Nodes." Information 9, no. 9 (August 25, 2018): 214. http://dx.doi.org/10.3390/info9090214.
Повний текст джерелаHong, Sangwoo, Heecheol Yang, and Jungwoo Lee. "Hierarchical Group Testing for Byzantine Attack Identification in Distributed Matrix Multiplication." IEEE Journal on Selected Areas in Communications 40, no. 3 (March 2022): 1013–29. http://dx.doi.org/10.1109/jsac.2022.3142364.
Повний текст джерелаXu, Chentao, Qingshan Liu, and Tingwen Huang. "Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack." Information Sciences 596 (June 2022): 362–79. http://dx.doi.org/10.1016/j.ins.2022.02.055.
Повний текст джерелаFoss, Clive. "Byzantine Malagina and the Lower Sangarius." Anatolian Studies 40 (December 1990): 161–83. http://dx.doi.org/10.2307/3642800.
Повний текст джерелаRodríguez-Barroso, Nuria, Eugenio Martínez-Cámara, M. Victoria Luzón, and Francisco Herrera. "Dynamic defense against byzantine poisoning attacks in federated learning." Future Generation Computer Systems 133 (August 2022): 1–9. http://dx.doi.org/10.1016/j.future.2022.03.003.
Повний текст джерелаLuo, Junhai, and Zan Cao. "Distributed Detection in Wireless Sensor Networks under Byzantine Attacks." International Journal of Distributed Sensor Networks 11, no. 11 (January 2015): 381642. http://dx.doi.org/10.1155/2015/381642.
Повний текст джерелаAkbar, Nur Arifin, Amgad Muneer, Narmine ElHakim, and Suliman Mohamed Fati. "Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses." Future Internet 13, no. 11 (November 12, 2021): 285. http://dx.doi.org/10.3390/fi13110285.
Повний текст джерелаLang, Wei Min, Yuan Cheng Zhu, and Hu Sheng Li. "A Bayesian Game Analysis of Byzantine Attacks for Wireless Cognitive Sensor Networks in Smart Grids." Advanced Materials Research 571 (September 2012): 636–40. http://dx.doi.org/10.4028/www.scientific.net/amr.571.636.
Повний текст джерелаChen, Huifang, Lei Xie, and Congqi Shen. "Optimal Byzantine attack strategy for distributed localisation with M ‐ary quantised data." Electronics Letters 51, no. 25 (December 2015): 2158–60. http://dx.doi.org/10.1049/el.2015.2172.
Повний текст джерелаFu, Yuanhua, and Zhiming He. "Entropy-Based Weighted Decision Combining for Collaborative Spectrum Sensing Over Byzantine Attack." IEEE Wireless Communications Letters 8, no. 6 (December 2019): 1528–32. http://dx.doi.org/10.1109/lwc.2019.2926087.
Повний текст джерелаHe, Xiaofan, Huaiyu Dai, and Peng Ning. "A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check." IEEE Transactions on Wireless Communications 12, no. 5 (May 2013): 2512–23. http://dx.doi.org/10.1109/twc.2013.031313.121551.
Повний текст джерелаFylypchuk, Oleksandr M. "Harald Sigurdsson and the Russo-Byzantine War of 1043." Slovene 3, no. 1 (2014): 193–205. http://dx.doi.org/10.31168/2305-6754.2014.3.1.7.
Повний текст джерелаCoelho, Igor M., Vitor N. Coelho, Rodolfo P. Araujo, Wang Yong Qiang, and Brett D. Rhodes. "Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT." Future Internet 12, no. 8 (July 30, 2020): 129. http://dx.doi.org/10.3390/fi12080129.
Повний текст джерелаJianqi Lu, Ping Wei, and Zhe Chen. "Cooperative Spectrum Sensing under Byzantine Attacks in Cognitive Radio Networks." International Journal of Digital Content Technology and its Applications 7, no. 5 (March 15, 2013): 512–20. http://dx.doi.org/10.4156/jdcta.vol7.issue5.61.
Повний текст джерелаXiao, Zhiqing, Yunzhou Li, Ming Zhao, Xibin Xu, and Jing Wang. "Allocation of Network Error Correction Flow to Combat Byzantine Attacks." IEEE Transactions on Communications 63, no. 7 (July 2015): 2605–18. http://dx.doi.org/10.1109/tcomm.2015.2438811.
Повний текст джерела