Výsledky vyhledávání - "attack detection algorithm"

  1. 1

    A Wormhole Attack Detection Algorithm Integrated With the Node Trust Optimization Model in WSNs Autor Teng, Zhijun, Du, Chunqiu, Li, Meng, Zhang, Hengjia, Zhu, Weihua

    ISSN: 1530-437X, 1558-1748
    Vydáno: New York IEEE 01.04.2022
    Vydáno v IEEE sensors journal (01.04.2022)
    “…The openness of Wireless Sensor Networks (WSNs) layout makes them vulnerable to attacks. One of the most threatening attacks is the wormhole attack. The…”
    Získat plný text
    Journal Article
  2. 2

    Multi-Stage Network Attack Detection Algorithm Based on Gaussian Mixture Hidden Markov Model and Transfer Learning Autor Wang, Qian, Wang, Weilong, Wang, Yan, Ren, Jiadong, Zhang, Bing

    ISSN: 1545-5955, 1558-3783
    Vydáno: IEEE 2025
    “… Consequently, this paper proposes a multi-stage network attack detection algorithm based on Gaussian mixture hidden Markov model and transfer learning…”
    Získat plný text
    Journal Article
  3. 3

    A new delay attack detection algorithm for PTP network in power substation Autor Moradi, Mohsen, Jahangir, Amir Hossein

    ISSN: 0142-0615
    Vydáno: Elsevier Ltd 01.12.2021
    “…•Mathematical analysis and simulation of proposed attack detection algorithm.•Low average attack detection time and very low overhead network traffic…”
    Získat plný text
    Journal Article
  4. 4

    Enhanced time-delay attack detection algorithm for precision time protocol Autor Moradi, Mohsen, Jahangir, Amir Hossein

    ISSN: 2523-3246
    Vydáno: Singapore Springer Nature Singapore 01.12.2025
    Vydáno v Cybersecurity (Singapore) (01.12.2025)
    “…Precision Time Protocol, PTP, is one of the most accurate protocols for maintaining clock synchronization in industrial and distributed systems and networks…”
    Získat plný text
    Journal Article
  5. 5

    Digital Forensics-Based Consumer UAV Anti-Attack Detection Algorithm Using Time-Frequency Feature Fusion for Pine Wilt Disease Autor Ye, Hong, Ding, Xiajun, Alturki, Nazik, Bashir, Ali Kashif, Lv, Meilei, Fang, Kai, Wang, Wei

    ISSN: 0098-3063, 1558-4127
    Vydáno: IEEE 2025
    “… To address this challenge, we propose YOLOv8-FB, a UAV anti-attack detection algorithm for PWD…”
    Získat plný text
    Journal Article
  6. 6

    Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection Autor Du, Jian, Raza, Sajid Hussain, Ahmad, Mudassar, Alam, Iqbal, Dar, Saadat Hanif, Habib, Muhammad Asif

    ISSN: 1939-0114, 1939-0122
    Vydáno: London Hindawi 06.07.2022
    Vydáno v Security and communication networks (06.07.2022)
    “…Ransomware is a malicious software that takes files hostage and demands ransomware to release them. It targets individuals, corporations, organizations, and…”
    Získat plný text
    Journal Article
  7. 7
  8. 8

    Research on spectrum sensing data falsification attack detection algorithm in cognitive Internet of Things Autor Miao, Liu, Di, Xu, Huo, Zhuo-Miao, Sun, Zhen-Xing

    ISSN: 1018-4864, 1572-9451
    Vydáno: New York Springer US 01.06.2022
    Vydáno v Telecommunication systems (01.06.2022)
    “…The Internet of Things (IoT) is a new paradigm for connecting various heterogeneous networks. Cognitive radio (CR) adopts cooperative spectrum sensing (CSS) to…”
    Získat plný text
    Journal Article
  9. 9

    A QoS-aware adaptive cross-layer cyber-attack detection algorithm for vehicular networks Autor Kaur, Avneet, Saiyed, Makhduma F., Al-Anbagi, Irfan, Shamim Hossain, M.

    ISSN: 2214-2096
    Vydáno: Elsevier Inc 01.08.2025
    Vydáno v Vehicular Communications (01.08.2025)
    “…Securing data transmission and detecting cyber-attacks in consumer Vehicular Ad hoc Networks (VANETs) pose significant challenges due to the highly dynamic…”
    Získat plný text
    Journal Article
  10. 10

    Frame-by-frame Wi-Fi attack detection algorithm with scalable and modular machine-learning design Autor Rizzi, Antonello, Granato, Giuseppe, Baiocchi, Andrea

    ISSN: 1568-4946, 1872-9681
    Vydáno: Elsevier B.V 01.06.2020
    Vydáno v Applied soft computing (01.06.2020)
    “…The popularity of Wi-Fi networks coupled with the intrinsic vulnerability of wireless interfaces has promoted the investigation and proposal of traffic…”
    Získat plný text
    Journal Article
  11. 11

    RETRACTED ARTICLE: Support attack detection algorithm for recommendation system based on deep learning Autor Li, Xin, Wang, Zhixiao

    ISSN: 1687-1499, 1687-1472, 1687-1499
    Vydáno: Cham Springer International Publishing 20.07.2023
    “…In order to enhance the performance of recommendation systems that support attack detection algorithms, we have designed a novel approach based on deep learning…”
    Získat plný text
    Journal Article
  12. 12

    Generalized Iris Presentation Attack Detection Algorithm under Cross-Database Settings Autor Gupta, Mehak, Singh, Vishal, Agarwal, Akshay, Vatsa, Mayank, Singh, Richa

    Vydáno: IEEE 10.01.2021
    “…Presentation attacks are posing major challenges to most of the biometric modalities. Iris recognition, which is considered as one of the most accurate…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    A novel Kalman Filter based shilling attack detection algorithm Autor Liu, Xin, Xiao, Yingyuan, Jiao, Xu, Zheng, Wenguang, Ling, Zihao

    ISSN: 1551-0018, 1551-0018
    Vydáno: United States AIMS Press 01.01.2020
    “…Collaborative filtering has been widely used in recommendation systems to recommend items that users might like. However, collaborative filtering based…”
    Získat plný text
    Journal Article
  14. 14

    Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers Autor Nandhini, P. S., Kuppuswami, S., Malliga, S., DeviPriya, R.

    ISSN: 0920-8542, 1573-0484
    Vydáno: New York Springer US 01.04.2023
    Vydáno v The Journal of supercomputing (01.04.2023)
    “…Internet of Things (IoT) is becoming a crucial requirement for linking numerous physical devices or gadgets to the web. Due to large volume of data exchanged,…”
    Získat plný text
    Journal Article
  15. 15

    FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment Autor Kumar, Animesh, Dutta, Sandip, Pranav, Prashant

    ISSN: 2511-2104, 2511-2112
    Vydáno: Singapore Springer Nature Singapore 01.02.2024
    “…With on-demand resources, flexibility, scalability, dynamic nature, and cheaper maintenance costs, cloud computing technology has revolutionized the…”
    Získat plný text
    Journal Article
  16. 16

    A Novel Data Integrity Attack Detection Algorithm Based on Improved Grey Relational Analysis Autor Zhang, Zhengdao, Wang, Yunfei, Xie, Linbo

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2018
    Vydáno v IEEE access (2018)
    “…False data injection (FDI) attack is the most common data integrity attack, and it is also one of the most serious threats in industrial control systems…”
    Získat plný text
    Journal Article
  17. 17
  18. 18

    FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks Autor Kumar, Sunil, Dutta, Kamlesh, Garg, Anjani

    ISSN: 0929-6212, 1572-834X
    Vydáno: New York Springer US 01.08.2018
    Vydáno v Wireless personal communications (01.08.2018)
    “…TCP and UDP are considered the most popular and well known transport layer protocols to facilitate the end to end communication between two nodes in the…”
    Získat plný text
    Journal Article
  19. 19

    Impersonation Attack Detection Algorithm Based on Reinforcement Learning in Mobile Fog Computing Autor YU Jinliang, TU Shanshan, MENG Yuan

    ISSN: 1000-3428
    Vydáno: Editorial Office of Computer Engineering 01.01.2020
    Vydáno v Ji suan ji gong cheng (01.01.2020)
    “… learning.The impersonation attack model in fog computing is constructed and the impersonation attack detection algorithm based on Q-learning algorithm is designed under this model,so as to detect impersonation…”
    Získat plný text
    Journal Article
  20. 20

    Web SQL Injection Attack Detection Algorithm Using Deep Learning Autor Abi, Beza Alemu

    ISBN: 9798382584560
    Vydáno: ProQuest Dissertations & Theses 01.01.2024
    “…Advancement in technology, the Internet and 5G networks and Internet of Things (IoTs) have made life of modern human beings very simple. Web Applications play…”
    Získat plný text
    Dissertation