Статті в журналах з теми "Control-oriented attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Control-oriented attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Cheng, Long, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, and Danfeng (Daphne) Yao. "Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–36. http://dx.doi.org/10.1145/3462699.
Повний текст джерелаPisu, Pierluigi, Jim Martin, and Zoleikha Abdollahi Biron. "A Control Oriented Perspective for Security in Connected and Automated Vehicles." Mechanical Engineering 139, no. 12 (December 1, 2017): S17—S20. http://dx.doi.org/10.1115/1.2017-dec-10.
Повний текст джерелаSánchez, Helem S., Damiano Rotondo, Teresa Escobet, Vicenç Puig, and Joseba Quevedo. "Bibliographical review on cyber attacks from a control oriented perspective." Annual Reviews in Control 48 (2019): 103–28. http://dx.doi.org/10.1016/j.arcontrol.2019.08.002.
Повний текст джерелаMa, Jian Hong, and Li Xia Ji. "Shrew Attack on Internet Congestion Control Protocol in Control Engineering." Advanced Materials Research 648 (January 2013): 277–80. http://dx.doi.org/10.4028/www.scientific.net/amr.648.277.
Повний текст джерелаBhardwaj, Akashdeep, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, and Leonardo Mostarda. "Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems." IEEE Access 8 (2020): 104956–66. http://dx.doi.org/10.1109/access.2020.2998983.
Повний текст джерелаTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Повний текст джерелаDelgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.
Повний текст джерелаWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Повний текст джерелаBaig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (September 6, 2021): 5967. http://dx.doi.org/10.3390/s21175967.
Повний текст джерелаGenge, Béla, Piroska Haller, Adrian-Vasile Duka, and Hunor Sándor. "A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 417–28. http://dx.doi.org/10.1515/auto-2019-0017.
Повний текст джерелаMuria, Risky Mezi, Arif Muntasa, Muhammad Yusuf, and Ardi Hamzah. "Studi Litelatur: Peningkatan Kinerja Digital Forensik Dan Pencegahan Cyber Crime." Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) 3, no. 1 (April 30, 2022): 12–20. http://dx.doi.org/10.31102/jatim.v3i1.1422.
Повний текст джерелаZafar, Faheem, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, and Adeel Anjum. "MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus." Sensors 21, no. 15 (July 28, 2021): 5096. http://dx.doi.org/10.3390/s21155096.
Повний текст джерелаMadrid, Antonio, Mar Joanpere, Lena de Botton, and Roger Campdepadrós. "Media Manipulation Against Social Justice Researchers: Second-Order Sexual Harassment." Qualitative Inquiry 26, no. 8-9 (July 10, 2020): 983–88. http://dx.doi.org/10.1177/1077800420938853.
Повний текст джерелаGupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, and Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids." Energies 14, no. 16 (August 12, 2021): 4941. http://dx.doi.org/10.3390/en14164941.
Повний текст джерелаPark, SeongJu, and Nam-Ho Kim. "Manufacture artificial intelligence education kit using Jetson Nano and 3D printer." Korean Institute of Smart Media 11, no. 11 (December 31, 2022): 40–48. http://dx.doi.org/10.30693/smj.2022.11.11.40.
Повний текст джерелаNOONAN, ALEXANDER. "“What Must Be the Answer of the United States to Such a Proposition?” Anarchist Exclusion and National Security in the United States, 1887–1903." Journal of American Studies 50, no. 2 (February 16, 2016): 347–76. http://dx.doi.org/10.1017/s0021875816000451.
Повний текст джерелаTsoupidi, Rodothea Myrsini, Roberto Castañeda Lozano, and Benoit Baudry. "Constraint-based Diversification of JOP Gadgets." Journal of Artificial Intelligence Research 72 (December 29, 2021): 1471–505. http://dx.doi.org/10.1613/jair.1.12848.
Повний текст джерелаLiagkou, Vasiliki, Vasileios Kavvadas, Spyridon K. Chronopoulos, Dionysios Tafiadis, Vasilis Christofilakis, and Kostas P. Peppas. "Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture." Computation 7, no. 2 (May 5, 2019): 24. http://dx.doi.org/10.3390/computation7020024.
Повний текст джерелаKosmowski, Kazimierz T., Emilian Piesik, Jan Piesik, and Marcin Śliwiński. "Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management." Energies 15, no. 10 (May 15, 2022): 3610. http://dx.doi.org/10.3390/en15103610.
Повний текст джерелаUstun, Taha Selim, S. M. Suhail Hussain, Ahsen Ulutas, Ahmet Onen, Muhammad M. Roomi, and Daisuke Mashima. "Machine Learning-Based Intrusion Detection for Achieving Cybersecurity in Smart Grids Using IEC 61850 GOOSE Messages." Symmetry 13, no. 5 (May 8, 2021): 826. http://dx.doi.org/10.3390/sym13050826.
Повний текст джерелаHuang, Ning, Shuguang Huang, and Chao Chang. "Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 57–76. http://dx.doi.org/10.4018/ijdcf.2021030104.
Повний текст джерелаNewman, Lena. "Nicholas S. Paliewicz and Marouf Hasian Jr. The Securitization of Memorial Space: Rhetoric and Public Memory." RBM: A Journal of Rare Books, Manuscripts, and Cultural Heritage 21, no. 1 (May 29, 2020): 42. http://dx.doi.org/10.5860/rbm.21.1.42.
Повний текст джерелаLee, Yongsoo, Eungyu Lee, and Taejin Lee. "Human-Centered Efficient Explanation on Intrusion Detection Prediction." Electronics 11, no. 13 (July 2, 2022): 2082. http://dx.doi.org/10.3390/electronics11132082.
Повний текст джерелаLee, Sungbin, and Jeonghun Cho. "ACE-M: Automated Control Flow Integrity Enforcement Based on MPUs at the Function Level." Electronics 11, no. 6 (March 15, 2022): 912. http://dx.doi.org/10.3390/electronics11060912.
Повний текст джерелаQiao, Yanchen, Bin Zhang, Weizhe Zhang, Arun Kumar Sangaiah, and Hualong Wu. "DGA Domain Name Classification Method Based on Long Short-Term Memory with Attention Mechanism." Applied Sciences 9, no. 20 (October 9, 2019): 4205. http://dx.doi.org/10.3390/app9204205.
Повний текст джерелаNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Повний текст джерелаEllemor, Heidi, and Jon Barnett. "National Security and Emergency Management after September 11." International Journal of Mass Emergencies & Disasters 23, no. 3 (November 2005): 5–26. http://dx.doi.org/10.1177/028072700502300301.
Повний текст джерелаElbez, Ghada, Hubert B. Keller, Atul Bohara, Klara Nahrstedt, and Veit Hagenmeyer. "Detection of DoS Attacks Using ARFIMA Modeling of GOOSE Communication in IEC 61850 Substations." Energies 13, no. 19 (October 5, 2020): 5176. http://dx.doi.org/10.3390/en13195176.
Повний текст джерелаAdler, Aaron, Peter Samouelian, Michael Atighetchi, and Yat Fu. "Remote Management of Boundary Protection Devices with Information Restrictions." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9398–403. http://dx.doi.org/10.1609/aaai.v33i01.33019398.
Повний текст джерелаFarooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (July 1, 2019): 2536. http://dx.doi.org/10.3390/en12132536.
Повний текст джерелаTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Повний текст джерелаSemenykhina, Olena V., та Yuliia О. Rudenko. "ПРОБЛЕМИ НАВЧАННЯ ПРОГРАМУВАТИ УЧНІВ СТАРШИХ КЛАСІВ ТА ШЛЯХИ ЇХ ПОДОЛАННЯ". Information Technologies and Learning Tools 66, № 4 (30 вересня 2018): 54. http://dx.doi.org/10.33407/itlt.v66i4.2149.
Повний текст джерелаLi, Song, Qian Zou, and Wei Huang. "VPN Packet Loss-Oriented Dynamic Control." Applied Mechanics and Materials 340 (July 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amm.340.710.
Повний текст джерелаLi, Shudong, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, and Zhihong Tian. "Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors." Journal of Sensors 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/8820413.
Повний текст джерелаLubkin, Ivan, and Vyacheslav Zolotarev. "Comprehensive Defense System against Vulnerabilities Based on Return-Oriented Programming." Informatics and Automation 21, no. 2 (November 16, 2021): 275–310. http://dx.doi.org/10.15622/ia.21.2.3.
Повний текст джерелаSuryawardani, I. Gusti Ayu Oka, and Agung Suryawan Wiranatha. "DIGITAL MARKETING IN PROMOTING EVENTS AND FESTIVITIES. A CASE OF SANUR VILLAGE FESTIVAL." Journal of Business on Hospitality and Tourism 2, no. 1 (January 6, 2017): 159. http://dx.doi.org/10.22334/jbhost.v2i1.51.
Повний текст джерелаVijayalakshmi, R., and N. Duraipandian. "Service oriented architecture and privacy preserving mashup of healthcare data." International Journal of Engineering & Technology 3, no. 3 (July 9, 2014): 337. http://dx.doi.org/10.14419/ijet.v3i3.2139.
Повний текст джерелаKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Повний текст джерелаShafae, Mohammed S., Lee J. Wells, and Gregory T. Purdy. "Defending against product-oriented cyber-physical attacks on machining systems." International Journal of Advanced Manufacturing Technology 105, no. 9 (May 24, 2019): 3829–50. http://dx.doi.org/10.1007/s00170-019-03805-z.
Повний текст джерелаShafae, Mohammed S., Lee J. Wells, and Gregory T. Purdy. "Correction to: Defending against product-oriented cyber-physical attacks on machining systems." International Journal of Advanced Manufacturing Technology 105, no. 9 (November 22, 2019): 3851–52. http://dx.doi.org/10.1007/s00170-019-04576-3.
Повний текст джерелаVillagrá, Victor A. "Advanced Cybersecurity Services Design." Electronics 11, no. 18 (September 6, 2022): 2803. http://dx.doi.org/10.3390/electronics11182803.
Повний текст джерелаBartoli, A., A. De Lorenzo, E. Medvet, M. Faraguna, and F. Tarlao. "A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration." Cybernetics and Information Technologies 18, no. 4 (November 1, 2018): 94–110. http://dx.doi.org/10.2478/cait-2018-0050.
Повний текст джерелаLubkin, I. A. "Application security metrics when using defense system against vulnerabilities based on return-oriented programming." Proceedings of Tomsk State University of Control Systems and Radioelectronics 24, no. 4 (2021): 46–51. http://dx.doi.org/10.21293/1818-0442-2021-24-4-46-51.
Повний текст джерелаMankovskyi, D. "Leading morphological dominants of stroke as a basis for the morbid psychotype in cardiosurgical patients with postoperative hypoxic-ischemic injuries." Journal of Education, Health and Sport 11, no. 10 (October 29, 2021): 423–34. http://dx.doi.org/10.12775/jehs.2021.11.10.039.
Повний текст джерелаFelson, Richard B., and James T. Tedeschi. "A Social Interactionist Approach to Violence: Cross-cultural Applications." Violence and Victims 8, no. 3 (January 1993): 295–310. http://dx.doi.org/10.1891/0886-6708.8.3.295.
Повний текст джерелаHusam Mahdi, Miaad, and Ibrahim Adel Ibrahim. "Enhancing the security of quality of service-oriented distributed routing protocol for hybrid wireless network." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (April 1, 2023): 121. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp121-128.
Повний текст джерелаCorke, Thomas C., Patrick O. Bowles, Chuan He, and Eric H. Matlis. "Sensing and control of flow separation using plasma actuators." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1940 (April 13, 2011): 1459–75. http://dx.doi.org/10.1098/rsta.2010.0356.
Повний текст джерелаPoddubnyi, V. O., R. Y. Gvozdov, О. V. Sievierinov, and V. M. Fedorchenko. "Object-oriented model of a formal description of an information and communication system." Radiotekhnika, no. 209 (June 24, 2022): 110–17. http://dx.doi.org/10.30837/rt.2022.2.209.11.
Повний текст джерелаWan, Kaifang, Dingwei Wu, Yiwei Zhai, Bo Li, Xiaoguang Gao, and Zijian Hu. "An Improved Approach towards Multi-Agent Pursuit–Evasion Game Decision-Making Using Deep Reinforcement Learning." Entropy 23, no. 11 (October 29, 2021): 1433. http://dx.doi.org/10.3390/e23111433.
Повний текст джерелаJones, J. G., G. D. Padfield, and M. T. Charlton. "Wavelet analysis of pilot workload in helicopter low-level flying tasks." Aeronautical Journal 103, no. 1019 (January 1999): 55–63. http://dx.doi.org/10.1017/s0001924000065106.
Повний текст джерела