Статті в журналах з теми "Security attacks detection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security attacks detection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Jimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Kumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (May 4, 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Kareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood, and Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier." Bulletin of Electrical Engineering and Informatics 12, no. 6 (December 1, 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Du, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou, and Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method." Transactions of the Institute of Measurement and Control 41, no. 6 (January 8, 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Kumar, Sunil, and Maninder Singh. "Detection and Isolation of Zombie Attack under Cloud Environment." Oriental journal of computer science and technology 10, no. 2 (April 12, 2017): 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Farane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi, and Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (May 30, 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (March 11, 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Alamsyah, Hendri, Riska, and Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Salih, Azar Abid, and Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (September 1, 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Neelaveni, Dr R., Abhinav ., and Sahas . "Analysis of Efficient Intrusion Detection System using Ensemble Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 1521–30. http://dx.doi.org/10.22214/ijraset.2023.51858.
Sheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh, and Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)." Sensors 23, no. 12 (June 9, 2023): 5459. http://dx.doi.org/10.3390/s23125459.
Soe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture." Sensors 20, no. 16 (August 5, 2020): 4372. http://dx.doi.org/10.3390/s20164372.
Qiu, Ling, and Cai Ming Liu. "An Intelligent Detection Method for Network Security." Applied Mechanics and Materials 530-531 (February 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.
Rohit Khedkar et al. "Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms." Proceeding International Conference on Science and Engineering 11, no. 1 (February 18, 2023): 241–52. http://dx.doi.org/10.52783/cienceng.v11i1.120.
Gavrić, Nikola, and Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat." Sensors 22, no. 20 (October 14, 2022): 7791. http://dx.doi.org/10.3390/s22207791.
Cho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms." Electronics 8, no. 11 (November 13, 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.
Panduardi, Farizqi, Herman Yuliandoko, and Agus Priyo Utomo. "Network Security Using Honeypot and Attack Detection with Android Application." Indonesian Journal of Engineering Research 2, no. 2 (November 27, 2021): 53–60. http://dx.doi.org/10.11594/10.11594/ijer.02.02.04.
Sachdev, Rithik, Shreya Mishra, and Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Vinod Kumar, Boddupally, K. Pranaya Vardhan, Kurceti Subba Rao, and Thipparthy Navya Sree. "IDENTIFICATION OF UNSATURATED ATTACKS IN VIRTUALIZED INFRASTRUCTURES WITH BIG DATA ANALYTICS IN CLOUD COMPUTING." Journal of Nonlinear Analysis and Optimization 14, no. 02 (2023): 286–92. http://dx.doi.org/10.36893/jnao.2023.v14i2.286-292.
Ghugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi, and Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System." Journal of Computer Networks and Communications 2019 (January 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Patil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina, and Ketan Kotecha. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning." Algorithms 14, no. 10 (October 15, 2021): 297. http://dx.doi.org/10.3390/a14100297.
Gupta, Punit, and Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 6 (August 30, 2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Rajan, Del. "Entropic DDoS Detection for Quantum Networks." Quantum Reports 4, no. 4 (December 13, 2022): 604–15. http://dx.doi.org/10.3390/quantum4040044.
Al-Zewairi, Malek, Sufyan Almajali, and Moussa Ayyash. "Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers." Electronics 9, no. 12 (November 26, 2020): 2006. http://dx.doi.org/10.3390/electronics9122006.
Fang, Xing, Wenhui Zhang, Jiming Lin, and Yuming Liu. "Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection." Security and Communication Networks 2022 (August 13, 2022): 1–14. http://dx.doi.org/10.1155/2022/1957497.
Silva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Muhammad, Hafsat, Olumide B. Longe, Abimbola Baale,, and U.-O. Ekpo Antai. "Towards the Development of a Machine Learning Enhanceed Framework for Honeypot and CAPTCHA Intrusion Detection Systems." Advances in Multidisciplinary and scientific Research Journal Publication 34 (December 30, 2022): 43–50. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p4.
O, Belej, Spas N, Artyshchuk I, and Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models." Artificial Intelligence 26, jai2021.26(1) (June 30, 2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Hairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (January 23, 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Haseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail, and Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey." Sensors 23, no. 15 (August 1, 2023): 6850. http://dx.doi.org/10.3390/s23156850.
Tolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Bdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Abuabid, Ali, and Abdulrahman Aldeij. "Cyber Security Incident Response." Journal of Information Security and Cybercrimes Research 7, no. 1 (June 2, 2024): 29–50. http://dx.doi.org/10.26735/pnob5534.
Lin, Hsiao-Chung, Ping Wang, and Wen-Hui Lin. "Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks." Computers 8, no. 4 (December 4, 2019): 88. http://dx.doi.org/10.3390/computers8040088.
Gara, Fatma, Leila Ben Saad, and Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility." International Journal on Semantic Web and Information Systems 13, no. 3 (July 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Yan, Guanghua, Qiang Li, Dong Guo, and Bing Li. "AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats." Sensors 19, no. 14 (July 19, 2019): 3180. http://dx.doi.org/10.3390/s19143180.
Xuan, Cho Do, Duc Duong, and Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic." Journal of Intelligent & Fuzzy Systems 40, no. 6 (June 21, 2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Alashhab, Abdussalam Ahmed, Mohd Soperi Mohd Zahid, Mohamed A. Azim, Muhammad Yunis Daha, Babangida Isyaku, and Shimhaz Ali. "A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks." Symmetry 14, no. 8 (July 29, 2022): 1563. http://dx.doi.org/10.3390/sym14081563.
Shang, Fute, Buhong Wang, Fuhu Yan, and Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems." Security and Communication Networks 2019 (March 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Vermani, Kunal, Amandeep Noliya, Sunil Kumar, and Kamlesh Dutta. "Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs." Journal of Information Systems Engineering and Business Intelligence 9, no. 2 (November 1, 2023): 136–46. http://dx.doi.org/10.20473/jisebi.9.2.136-146.
Liu, Likun, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq, and Mengmeng Ge. "An Efficient Security System for Mobile Data Monitoring." Wireless Communications and Mobile Computing 2018 (June 11, 2018): 1–10. http://dx.doi.org/10.1155/2018/9809345.
Desai, Vinod, and Dinesha Hagare Annappaiah. "Reputation-based Security model for detecting biased attacks in BigData." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 3 (March 1, 2023): 1567. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1567-1576.
ALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model." Journal of Applied Engineering and Technological Science (JAETS) 5, no. 1 (December 10, 2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.
Dasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms." Ingénierie des systèmes d information 26, no. 5 (October 31, 2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Al-Rajeh, Noura S., and Amal A. Al-Shargabi. "Dual Spectral Attention Model for Iris Presentation Attack Detection." International Journal of Interactive Mobile Technologies (iJIM) 18, no. 10 (May 22, 2024): 71–89. http://dx.doi.org/10.3991/ijim.v18i10.46981.
Xia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Skaruz, Jarosław. "Database security: combining neural networks and classification approach." Studia Informatica, no. 23 (December 22, 2020): 95–115. http://dx.doi.org/10.34739/si.2019.23.06.
Khan, Zulfiqar Ali, and Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology." Electronics 11, no. 23 (November 24, 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Barabanov, Alexander, Denis Dergunov, Denis Makrushin, and Aleksey Teplov. "AUTOMATIC DETECTION OF ACCESS CONTROL VULNERABILITIES VIA API SPECIFICATION PROCESSING." Voprosy kiberbezopasnosti, no. 1(47) (2022): 49–65. http://dx.doi.org/10.21681/2311-3456-2022-1-49-65.