Статті в журналах з теми "Dynamic attack graph"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Dynamic attack graph".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Повний текст джерелаPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (August 22, 2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Повний текст джерелаSæther, Sigve Hortemo, Jan Arne Telle, and Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming." Journal of Artificial Intelligence Research 54 (September 9, 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Повний текст джерелаRajeshwari, T., and C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Повний текст джерелаHu, Chenao, and Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game." IOP Conference Series: Materials Science and Engineering 790 (April 7, 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Повний текст джерелаLv, Huiying, Yuan Zhang, and Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph." Cybernetics and Information Technologies 13, Special-Issue (December 1, 2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Повний текст джерелаGao, Xiang, Xue Qin Xu, and Min Wang. "Evaluating Network Security Based on Attack Graph." Advanced Materials Research 756-759 (September 2013): 2374–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2374.
Повний текст джерелаLee, Dongjin, Juho Lee, and Kijung Shin. "Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 12 (March 24, 2024): 13374–82. http://dx.doi.org/10.1609/aaai.v38i12.29239.
Повний текст джерелаBoudermine, Antoine, Rida Khatoun, and Jean-Henri Choyer. "Dynamic logic-based attack graph for risk assessment in complex computer systems." Computer Networks 228 (June 2023): 109730. http://dx.doi.org/10.1016/j.comnet.2023.109730.
Повний текст джерелаGuo, Mingyu, Max Ward, Aneta Neumann, Frank Neumann, and Hung Nguyen. "Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 5 (June 26, 2023): 5649–56. http://dx.doi.org/10.1609/aaai.v37i5.25701.
Повний текст джерелаKavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos, and Stephen Wolthusen. "Threat Analysis for Smart Homes." Future Internet 11, no. 10 (September 25, 2019): 207. http://dx.doi.org/10.3390/fi11100207.
Повний текст джерелаBopche, Ghanshyam S., and Babu M. Mehtre. "Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks." Computers & Security 64 (January 2017): 16–43. http://dx.doi.org/10.1016/j.cose.2016.09.010.
Повний текст джерелаAlwasel, Bader, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti, and Mohammed Alsuhaibani. "Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection." Applied Sciences 13, no. 13 (June 30, 2023): 7774. http://dx.doi.org/10.3390/app13137774.
Повний текст джерелаWan, Shanshan, and Ying Liu. "A security detection approach based on autonomy-oriented user sensor in social recommendation network." International Journal of Distributed Sensor Networks 18, no. 3 (March 2022): 155013292210824. http://dx.doi.org/10.1177/15501329221082415.
Повний текст джерелаShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, and Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure." Information & Computer Security 23, no. 2 (June 8, 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Повний текст джерелаSen, Saurabh Kumar, and Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Повний текст джерелаKholidy, Hisham A. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method." Sensors 22, no. 1 (December 21, 2021): 9. http://dx.doi.org/10.3390/s22010009.
Повний текст джерелаKim, Jiyeon, and Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks." Electronics 9, no. 3 (March 9, 2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Повний текст джерелаGao, Yazhuo, Guomin Zhang, and Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction." Security and Communication Networks 2021 (October 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Повний текст джерелаHu, Hao, Hongqi Zhang, Yuling Liu, and Yongwei Wang. "Quantitative Method for Network Security Situation Based on Attack Prediction." Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/3407642.
Повний текст джерелаQiang, Weizhong, Shizhen Wang, Hai Jin, and Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS." Security and Communication Networks 2018 (October 17, 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Повний текст джерелаQin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma, and Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks." Security and Communication Networks 2022 (April 11, 2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Повний текст джерелаTurnip, Togu Novriansyah, William Suarez Lumbantobing, David Christian Sitorus, and Friska Laurenzia Sianturi. "Software Watermarking Dinamis dengan Algoritme Collberg-Thomborson Dan Parent Pointer Graf pada Aplikasi Android." Jurnal Teknologi Informasi dan Ilmu Komputer 8, no. 4 (July 22, 2021): 831. http://dx.doi.org/10.25126/jtiik.2021844500.
Повний текст джерелаWang, Chundong, Zheli Liu, and Tong Zhao. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm." International Journal of Information and Computer Security 12, no. 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.10028756.
Повний текст джерелаWang, Chundong, Tong Zhao, and Zheli Liu. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm." International Journal of Information and Computer Security 12, no. 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.107448.
Повний текст джерелаSong, Xuyan, Chen Chen, Baojiang Cui, and Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model." Applied Sciences 10, no. 10 (May 16, 2020): 3440. http://dx.doi.org/10.3390/app10103440.
Повний текст джерелаHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala, and Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data." Electronics 10, no. 17 (September 4, 2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Повний текст джерелаCraandijk, Dennis, and Floris Bex. "Enforcement Heuristics for Argumentation with Deep Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 5 (June 28, 2022): 5573–81. http://dx.doi.org/10.1609/aaai.v36i5.20497.
Повний текст джерелаXu, Hanyi, Guozhen Cheng, Xiaohan Yang, Wenyan Liu, Dacheng Zhou, and Wei Guo. "Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm." Electronics 13, no. 3 (January 24, 2024): 487. http://dx.doi.org/10.3390/electronics13030487.
Повний текст джерелаАверьянов, В. С., and И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH." Южно-Сибирский научный вестник, no. 1(41) (February 28, 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Повний текст джерелаUstun, Taha Selim, and Saqib Ayyubi. "Automated Network Topology Extraction Based on Graph Theory for Distributed Microgrid Protection in Dynamic Power Systems." Electronics 8, no. 6 (June 10, 2019): 655. http://dx.doi.org/10.3390/electronics8060655.
Повний текст джерелаZhang, Quan, Chijin Zhou, Yiwen Xu, Zijing Yin, Mingzhe Wang, Zhuo Su, Chengnian Sun, Yu Jiang, and Jiaguang Sun. "Building Dynamic System Call Sandbox with Partial Order Analysis." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (October 16, 2023): 1253–80. http://dx.doi.org/10.1145/3622842.
Повний текст джерелаInibhunu, Catherine, and Scott Langevin. "Adaptive Visualization of Complex Networks with FocalPoint." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 233–37. http://dx.doi.org/10.1177/1541931213601052.
Повний текст джерелаCheng, Xiao Han, Shan Ming Luo, Xue Feng Chang, and Dan Xie. "Numerical Analysis of an External Flow-Field around a Formula SAE Car Body Based on FLUENT." Advanced Materials Research 1039 (October 2014): 17–24. http://dx.doi.org/10.4028/www.scientific.net/amr.1039.17.
Повний текст джерелаMannarini, Gianandrea, Mario Leonardo Salinas, Lorenzo Carelli, Nicola Petacco, and Josip Orović. "VISIR-2: ship weather routing in Python." Geoscientific Model Development 17, no. 10 (May 24, 2024): 4355–82. http://dx.doi.org/10.5194/gmd-17-4355-2024.
Повний текст джерелаJayanthi Rao, Et al. "Intelligent Traffic Monitoring System Using Vehicular Ad Hoc Network." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 629–35. http://dx.doi.org/10.17762/ijritcc.v11i10.8557.
Повний текст джерелаZhuang, Jun, and Mohammad Al Hasan. "Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-Supervision." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 4 (June 28, 2022): 4405–13. http://dx.doi.org/10.1609/aaai.v36i4.20362.
Повний текст джерелаOnyshchenko, Svitlana, Alina Yanko, Alina Hlushko, and Polina Sabelnikova. "Assessment of information protection level against unauthorized access." ScienceRise, no. 2 (April 30, 2023): 36–44. http://dx.doi.org/10.21303/2313-8416.2023.003211.
Повний текст джерелаManoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images." September 2021 3, no. 3 (October 2, 2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Повний текст джерелаFang, Zhu, and Zhengquan Xu. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping." Information 13, no. 11 (November 14, 2022): 537. http://dx.doi.org/10.3390/info13110537.
Повний текст джерелаZhang, Shuqin, Shijie Wang, Guangyao Bai, Minzhi Zhang, Peng Chen, Chunxia Zhao, Shuhan Li, and Jiehan Zhou. "Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution." Wireless Communications and Mobile Computing 2022 (June 16, 2022): 1–16. http://dx.doi.org/10.1155/2022/2323228.
Повний текст джерелаKalinin, Maxim, Evgenii Zavadskii, and Alexey Busygin. "A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure." Sensors 23, no. 21 (October 26, 2023): 8724. http://dx.doi.org/10.3390/s23218724.
Повний текст джерелаNguyen, Thanh H., Mason Wright, Michael P. Wellman, and Satinder Singh. "Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis." Security and Communication Networks 2018 (December 13, 2018): 1–28. http://dx.doi.org/10.1155/2018/2864873.
Повний текст джерелаWei, Zhuangkun, Liang Wang, Schyler Chengyao Sun, Bin Li, and Weisi Guo. "Graph Layer Security: Encrypting Information via Common Networked Physics." Sensors 22, no. 10 (May 23, 2022): 3951. http://dx.doi.org/10.3390/s22103951.
Повний текст джерелаPoolsappasit, N., R. Dewri, and I. Ray. "Dynamic Security Risk Management Using Bayesian Attack Graphs." IEEE Transactions on Dependable and Secure Computing 9, no. 1 (January 2012): 61–74. http://dx.doi.org/10.1109/tdsc.2011.34.
Повний текст джерелаCatal, Cagatay, Hakan Gunduz, and Alper Ozcan. "Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems." Electronics 10, no. 20 (October 18, 2021): 2534. http://dx.doi.org/10.3390/electronics10202534.
Повний текст джерелаMajeed, Abdul, Safiullah Khan, and Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks." Electronics 11, no. 13 (June 21, 2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Повний текст джерелаKang, Qiyu, Kai Zhao, Yang Song, Yihang Xie, Yanan Zhao, Sijie Wang, Rui She, and Wee Peng Tay. "Coupling Graph Neural Networks with Fractional Order Continuous Dynamics: A Robustness Study." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 12 (March 24, 2024): 13049–58. http://dx.doi.org/10.1609/aaai.v38i12.29203.
Повний текст джерелаDharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (July 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Повний текст джерелаLi, Yicai, and Lin Shi. "Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing." Mathematical Problems in Engineering 2022 (March 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/9017267.
Повний текст джерела