Добірка наукової літератури з теми "Trust attacks Prevention"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Trust attacks Prevention".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Trust attacks Prevention":
Karabacak, Bilge, and Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Li, Lixiang, Jürgen Kurths, Yixian Yang, and Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Khan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid, and Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks." Sensors 24, no. 6 (March 9, 2024): 1775. http://dx.doi.org/10.3390/s24061775.
S, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Atiq, Eman, Maheen Mujeeb, and Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies." British journal of Psychology Research 11, no. 2 (February 15, 2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Boakye-Boateng, Kwasi, Ali A. Ghorbani, and Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal." Journal of Sensor and Actuator Networks 11, no. 3 (July 11, 2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.
Subathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Moinescu, Radu. "Study of social engineering attacks in Romania 2019." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Quader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Дисертації з теми "Trust attacks Prevention":
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social." Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
The social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Alruwaili, Fahad F. "Information security, privacy, and compliance models for cloud computing services." Thesis, 2016. http://hdl.handle.net/1828/7119.
Graduate
0984
0790
fahd333@gmail.com
Книги з теми "Trust attacks Prevention":
Office, General Accounting. Financial management: Recommendations on Indian trust fund Strategic Plan proposals : report to the Secretary of the Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1997.
United States. Congress. Senate. Committee on Indian Affairs., ed. Financial management: Creation of Bureau of Indian Affairs' Trust Fund Special Projects Team : report to the Chairman, Committee on Indian Affairs, U.S. Senate. Washington, D.C: The Office, 1993.
Office, General Accounting. Financial management: Status of the governmentwide efforts to address improper payment problems : report to the Subcommittee on Government Efficiency and Financial Management, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2003.
Office, General Accounting. Financial management: Survey of capitalization threshold and other policies for property, plant, and equipment : report to Agency officials. Washington, D.C: U.S. General Accounting Office, 2002.
Office, General Accounting. Financial management: Profile of Army financial managers : report to the Assistant Secretary of the Army (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Office, General Accounting. Financial management: Differences in Army and Air Force disbursing and accounting records : report to the Honorable Charles E. Grassley, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Office, General Accounting. Financial management: Coordinated approach needed to address the government's improper payments problems : report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: United States General Accounting Office, 2002.
Office, General Accounting. Financial management: Profile of Navy and Marine Corps financial managers : report to the Acting Assistant Secretary of the Navy (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Office, General Accounting. Financial management: Problems in accounting for Navy transactions impair funds control and financial reporting : report to agency officials. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Office, General Accounting. Financial management: An overview of finance and accounting activities in DOD : report to the Chairman, Subcommittee on Defense, Committee on Appropriations, U.S. Senate. Washington, D.C: The Office, 1997.
Частини книг з теми "Trust attacks Prevention":
Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering, 193–204. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Chouhan, Piyush, and Swapnil Jain. "Prevention of DDoS Attack Through Trust Management System for VANET Environment." In Second International Conference on Computer Networks and Communication Technologies, 424–35. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_49.
Roy, Amit Kumar, and Ajoy Kumar Khan. "Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks." In Lecture Notes in Electrical Engineering, 109–17. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5341-7_8.
Singla, Bhawna, A. K. Verma, and L. R. Raheja. "Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection." In Machine Learning for Computer and Cyber Security, 258–77. Boca Raton, FL : Taylor & Francis Group, [2019] | “A science publishers book.”: CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-11.
"Chapter 7: Terrorism prevention through trust-building." In A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks, 70–82. Sciendo, 2021. http://dx.doi.org/10.2478/9788366675599-013.
Shukla, Piyush Kumar, and Kirti Raj Bhatele. "Security in Ad-Hoc Networks (MANETS)." In Next Generation Wireless Network Security and Privacy, 286–312. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8687-8.ch010.
Kapoor, Janesh, and Nor Azlina Abdul Rahman. "Organizational Security Improvement in Preventing Deepfake Ransomware." In Digital Innovation Adoption: Architectural Recommendations and Security Solutions, 58–78. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010009.
Revathy P and Belshia Jebamalar G. "A Review Based on Secure Banking Application Against Server Attacks." In Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210044.
Gorman, Sara E., and Jack M. Gorman. "The Attack on Health and Science Institutions." In Denying to the Grave, 303–32. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197547458.003.0009.
De Rango, Floriano. "Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs." In Networking and Telecommunications, 1488–505. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch097.
Тези доповідей конференцій з теми "Trust attacks Prevention":
Rathour, Shimmi Singh, and Nitin Manjhi. "Trust base hybrid approach for detection and prevention MANET from attacks." In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877737.
Choudhary, Sarika, and Nishtha Kesswani. "Detection and Prevention of Routing Attacks in Internet of Things." In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00219.
Vaseer, Gurveen, Garima Ghai, and Dhruva Ghai. "Distributed Trust-Based Multiple Attack Prevention for Secure MANETs." In 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). IEEE, 2018. http://dx.doi.org/10.1109/ises.2018.00032.
Griscioli, Federico, Maurizio Pizzonia, and Marco Sacchetti. "USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907004.
Ghosh, Shamit, and Dipanwita Roy Chowdhury. "Preventing fault attack on stream cipher using randomization." In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2015. http://dx.doi.org/10.1109/hst.2015.7140243.
Dachowicz, Adam, Mikhail Atallah, and Jitesh H. Panchal. "Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-98378.
Padmanabhan, Jayashree, K. S. Easwarakumar, Gokul B., and Harishankar S. "Trust based traffic monitoring approach for preventing denial of service attacks." In the 2nd international conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1626195.1626245.
Bhawsar, Aditya, Yogadhar Pandey, and Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System." In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Saxena, Mohit. "A mutual playmate attack prevention algorithm enhancing trust levels in MANET's systems." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155036.
Nakano, Hironori, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, and Iwao Sasase. "Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN." In 2019 25th Asia-Pacific Conference on Communications (APCC). IEEE, 2019. http://dx.doi.org/10.1109/apcc47188.2019.9026521.