Статті в журналах з теми "Trust attacks Prevention"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Trust attacks Prevention".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Karabacak, Bilge, and Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Li, Lixiang, Jürgen Kurths, Yixian Yang, and Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Khan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid, and Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks." Sensors 24, no. 6 (March 9, 2024): 1775. http://dx.doi.org/10.3390/s24061775.
S, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Atiq, Eman, Maheen Mujeeb, and Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies." British journal of Psychology Research 11, no. 2 (February 15, 2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Boakye-Boateng, Kwasi, Ali A. Ghorbani, and Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal." Journal of Sensor and Actuator Networks 11, no. 3 (July 11, 2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.
Subathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Moinescu, Radu. "Study of social engineering attacks in Romania 2019." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Quader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Srinivas, T. Aditya Sai, and S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing." Journal of Ambient Intelligence and Smart Environments 13, no. 2 (March 26, 2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Al-Shareeda, Mahmood A., Selvakumar Manickam, Murtaja Ali Saare, and Navaneethan C. Arjuman. "Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (January 1, 2022): 518. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp518-526.
Ovaz Akpinar, Kevser, and Ibrahim Ozcelik. "Development of the ECAT Preprocessor with the Trust Communication Approach." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2639750.
Karri, Ganesh Reddy, A. V. Prabu, Sidheswar Routray, D. Sumathi, S. Rajasoundaran, Amrit Mukherjee, Pushpita Chatterjee, and Waleed Alnumay. "Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks." Wireless Communications and Mobile Computing 2022 (August 17, 2022): 1–20. http://dx.doi.org/10.1155/2022/7240795.
Andrade, Rui, Isabel Praça, Sinan Wannous, and Sergio Ramos. "The Impact of Attacks in LEM and Prevention Measures Based on Forecasting and Trust Models." Processes 9, no. 2 (February 8, 2021): 314. http://dx.doi.org/10.3390/pr9020314.
Ullah, Ikram, Gerard de Roode, Nirvana Meratnia, and Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, no. 5 (March 6, 2021): 1834. http://dx.doi.org/10.3390/s21051834.
Martínez, Jeferson, and Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study." International Journal of Safety and Security Engineering 11, no. 5 (October 31, 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Chandan, Radha Raman, Awatef Balobaid, Naga Lakshmi Sowjanya Cherukupalli, Gururaj H L, Francesco Flammini, and Rajesh Natarajan. "Secure Modern Wireless Communication Network Based on Blockchain Technology." Electronics 12, no. 5 (February 22, 2023): 1095. http://dx.doi.org/10.3390/electronics12051095.
Uslu, Suleyman, Davinder Kaur, Mimoza Durresi, and Arjan Durresi. "Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing." Sensors 22, no. 24 (December 16, 2022): 9905. http://dx.doi.org/10.3390/s22249905.
Singhal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Santosh Kumar, Dinesh Kumar Singh, Atma Prakash Singh,. "Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2403–7. http://dx.doi.org/10.17762/ijritcc.v11i9.9295.
Khan, Prince Waqas, and Yungcheol Byun. "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things." Entropy 22, no. 2 (February 4, 2020): 175. http://dx.doi.org/10.3390/e22020175.
Zimba, Aaron, Luckson Simukonda, and Mumbi Chishimba. "Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security." Zambia ICT Journal 1, no. 1 (December 11, 2017): 35–40. http://dx.doi.org/10.33260/zictjournal.v1i1.19.
U. V., Esara, Mfon E. A., and Walter O. O. "Impact of Modern Cultism and Governance in Akwa Ibom State, Nigeria." African Journal of Law, Political Research and Administration 7, no. 1 (July 2, 2024): 135–47. http://dx.doi.org/10.52589/ajlpra-4ndqroth.
Johnson, Anju P., Hussain Al-Aqrabi, and Richard Hill. "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems." Sensors 20, no. 3 (February 5, 2020): 844. http://dx.doi.org/10.3390/s20030844.
Maheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.
Yang, Jing, Yen-Lin Chen, Lip Yee Por, and Chin Soon Ku. "A Systematic Literature Review of Information Security in Chatbots." Applied Sciences 13, no. 11 (May 23, 2023): 6355. http://dx.doi.org/10.3390/app13116355.
Preiya, V. Sathya, V. D. Ambeth Kumar, R. Vijay, Vijay K., and N. Kirubakaran. "Blockchain-Based E-Voting System with Face Recognition." Fusion: Practice and Applications 12, no. 1 (2023): 53–63. http://dx.doi.org/10.54216/fpa.120104.
Alshammari, Salah T., and Khalid Alsubhi. "Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment." Applied Sciences 11, no. 18 (September 13, 2021): 8496. http://dx.doi.org/10.3390/app11188496.
Kuo, Jong-Yih, Zhi-Jia Wen, Ti-Feng Hsieh, and Han-Xuan Huang. "A Study on the Security of Online Judge System Applied Sandbox Technology." Electronics 12, no. 14 (July 10, 2023): 3018. http://dx.doi.org/10.3390/electronics12143018.
Park, Sangwoo, Soowoong Lee, and Jooseok Song. "An Improved Trust-Free Approach for Preserving Privacy in Internet of Things." International Journal on Cybernetics & Informatics 11, no. 4 (August 27, 2022): 157–65. http://dx.doi.org/10.5121/ijci.2022.110412.
Chandel, Tanmay. "Review of Malware and Phishing in the Current and Next Generation of the Internet." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6499–502. http://dx.doi.org/10.22214/ijraset.2023.52927.
Zhang, Fu-Guo. "Preventing Recommendation Attack in Trust-Based Recommender Systems." Journal of Computer Science and Technology 26, no. 5 (September 2011): 823–28. http://dx.doi.org/10.1007/s11390-011-0181-4.
Blatchford, J. "An audit of a general practices compliance with national recommendations for the avoidance of complications for type 2 diabetic patients." International Journal of Pharmacy Practice 31, Supplement_2 (November 30, 2023): ii8—ii9. http://dx.doi.org/10.1093/ijpp/riad074.010.
Nivedita, V., and N. Nandhagopal. "Trust Management-Based Service Recovery and Attack Prevention in MANET." Intelligent Automation & Soft Computing 29, no. 3 (2021): 771–86. http://dx.doi.org/10.32604/iasc.2021.017547.
Rajamäki, Jyri. "Towards Resilient Cyber-Physical eHealth Systems." EQUATIONS 1 (December 24, 2021): 78–82. http://dx.doi.org/10.37394/232021.2021.1.12.
Haval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols." Advances in Nonlinear Variational Inequalities 26, no. 2 (June 30, 2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Syed, Salman Ali, and Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.
Kang, Xin, and Yongdong Wu. "A trust-based pollution attack prevention scheme in peer-to-peer streaming networks." Computer Networks 72 (October 2014): 62–73. http://dx.doi.org/10.1016/j.comnet.2014.07.012.
Balaji Srikaanth, P., and V. Nagarajan. "A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs." Wireless Personal Communications 101, no. 1 (May 2, 2018): 339–57. http://dx.doi.org/10.1007/s11277-018-5691-8.
Shinde, Prof Kaustubh, Sakshi Hadole, Rutuja Sathe, Sakshi Sirgan, and Abhijit Thorat. "Cyber Attack Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 5, 2024): 1–13. http://dx.doi.org/10.55041/ijsrem29058.
Singh, Kamini, Gyan Singh, and Arpit Agrawal. "A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET." International Journal of Computer Applications 94, no. 20 (May 30, 2014): 1–5. http://dx.doi.org/10.5120/16548-5825.
Gellert, George A., Sean P. Kelly, Edwin W. Wright, and Leslie C. Keil. "Zero Trust and the future of cybersecurity in healthcare delivery organizations." Journal of Hospital Administration 12, no. 1 (February 9, 2023): 1. http://dx.doi.org/10.5430/jha.v12n1p1.
Junejo, Aisha Kanwal, Imran Ali Jokhio, and Tony Jan. "A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services." Electronics 11, no. 13 (June 21, 2022): 1932. http://dx.doi.org/10.3390/electronics11131932.
Mehetre, Deepak C., S. Emalda Roslin, and Sanjeev J. Wagh. "Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust." Cluster Computing 22, S1 (March 14, 2018): 1313–28. http://dx.doi.org/10.1007/s10586-017-1622-9.
Isaac Sajan, R., and J. Jasper. "Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network." International Journal of Communication Systems 33, no. 8 (January 28, 2020): e4341. http://dx.doi.org/10.1002/dac.4341.
Mishra, Priya, Ompal Singh, and Abhishek Bhatt. "A Trust Election based Mechanism for finding selfish node and preventing them from Attack." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 223–29. http://dx.doi.org/10.26438/ijcse/v7i2.223229.
Otari, Grantej Vinod, and Vijay Ram Ghorpade. "A trust management model based on NSGA-II in mobile grid system." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (September 28, 2020): 235–42. http://dx.doi.org/10.3233/kes-200045.
Shinde, Kaustubh. "Implementation Paper on Cyberattack Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (May 31, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35135.
Marynissen, Hugo, and Mike Lauder. "Stakeholder-Focused Communication Strategy During Crisis: A Case Study Based on the Brussels Terror Attacks." International Journal of Business Communication 57, no. 2 (November 2, 2019): 176–93. http://dx.doi.org/10.1177/2329488419882736.