咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 2 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 软件工程
  • 4 篇 理学
    • 3 篇 物理学
    • 2 篇 数学
    • 1 篇 化学
    • 1 篇 生物学

主题

  • 13 篇 distributed atta...
  • 2 篇 firewall
  • 2 篇 sensitivity anal...
  • 2 篇 dns
  • 2 篇 internet
  • 2 篇 security
  • 2 篇 optimal control
  • 1 篇 eigenvalues and ...
  • 1 篇 event correlatio...
  • 1 篇 cache storage
  • 1 篇 princeprocessor
  • 1 篇 keywords denial ...
  • 1 篇 attack detection
  • 1 篇 botnet
  • 1 篇 ips
  • 1 篇 debit transactio...
  • 1 篇 credit transacti...
  • 1 篇 targeted network
  • 1 篇 cache poisoning
  • 1 篇 ethical disclosu...

机构

  • 1 篇 newcastle univ s...
  • 1 篇 pusan natl univ ...
  • 1 篇 cnr ieiit via ma...
  • 1 篇 sichuan univ col...
  • 1 篇 birla inst techn...
  • 1 篇 univ kent sch co...
  • 1 篇 coordinat ctr ch...
  • 1 篇 concordia univ c...
  • 1 篇 ump fac comp sys...
  • 1 篇 hassan ii univ e...
  • 1 篇 univ new south w...
  • 1 篇 csiros data61 de...
  • 1 篇 newcastle univ c...
  • 1 篇 brno university ...
  • 1 篇 indian sch mines...
  • 1 篇 indian sch mines...
  • 1 篇 univ sheffield s...
  • 1 篇 lebanese amer un...
  • 1 篇 khalifa univ sci...
  • 1 篇 newcastle univ n...

作者

  • 2 篇 singh prerna
  • 2 篇 upadhyay ranjit ...
  • 1 篇 yun youngyeo
  • 1 篇 kang hyoeun
  • 1 篇 mishra bimal kum...
  • 1 篇 lebbat adil
  • 1 篇 ali mohammed aam...
  • 1 篇 bentahar jamal
  • 1 篇 hassani mohamed
  • 1 篇 bolvanský dávid
  • 1 篇 larasati harasht...
  • 1 篇 aiello maurizio
  • 1 篇 papaleo gianluca
  • 1 篇 pan yanxian
  • 1 篇 emms martin
  • 1 篇 wang lidong
  • 1 篇 wu hao
  • 1 篇 zolkipli mohamad...
  • 1 篇 russell craig
  • 1 篇 kumari sangeeta

语言

  • 12 篇 英文
  • 1 篇 其他
检索条件"主题词=distributed attack"
13 条 记 录,以下是1-10 订阅
排序:
Virus dynamics of a distributed attack on a targeted network: Effect of firewall and optimal control
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2019年 73卷 74-91页
作者: Kumari, Sangeeta Singh, Prerna Upadhyay, Ranjit Kumar Indian Sch Mines Indian Inst Technol Dept Appl Math Dhanbad 826004 Bihar India
An attempt has been made to understand the virus dynamics of a distributed attack in a targeted network adopting firewall security coefficient and treatment rate. A mathematical model is proposed with two sub-framewor... 详细信息
来源: 评论
A mathematical model for a distributed attack on targeted resources in a computer network
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2014年 第9期19卷 3149-3160页
作者: Haldar, Kaushik Mishra, Bimal Kumar Birla Inst Technol Dept Appl Math Ranchi 835215 Bihar India
A mathematical model has been developed to analyze the spread of a distributed attack on critical targeted resources in a network. The model provides an epidemic framework with two sub-frameworks to consider the diffe... 详细信息
来源: 评论
Hierarchical Anomaly-Based Detection of distributed DNS attacks on Enterprise Networks
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2021年 第1期18卷 1031-1048页
作者: Lyu, Minzhao Gharakheili, Hassan Habibi Russell, Craig Sivaraman, Vijay Univ New South Wales Sch Elect Engn & Telecommun Sydney NSW 2052 Australia CSIROs Data61 Dept Networks Grp Sydney NSW 2015 Australia
Domain Name System (DNS) is a critical service for enterprise operations, and is often made openly accessible across firewalls. Malicious actors use this fact to attack organizational DNS servers, or use them as refle... 详细信息
来源: 评论
A distributed Black-Box Adversarial attack Based on Multi-Group Particle Swarm Optimization
收藏 引用
SENSORS 2020年 第24期20卷 7158-7158页
作者: Suryanto, Naufal Kang, Hyoeun Kim, Yongsu Yun, Youngyeo Larasati, Harashta Tatimma Kim, Howon Pusan Natl Univ Sch Comp Sci & Engn Busan 609735 South Korea
Adversarial attack techniques in deep learning have been studied extensively due to its stealthiness to human eyes and potentially dangerous consequences when applied to real-life applications. However, current attack... 详细信息
来源: 评论
Modeling and control of computer virus attack on a targeted network
收藏 引用
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS 2020年 538卷 122617-122617页
作者: Upadhyay, Ranjit Kumar Singh, Prerna Indian Sch Mines Dept Math & Comp Indian Inst Technol Dhanbad 826004 Bihar India Univ Sheffield Sch Math & Stat Sheffield S10 2TN S Yorkshire England
In this paper, a model with two different frameworks of an attacking class and a targeted class is introduced to study the virus mobility of an attack in a targeted network. Existence and stability of equilibrium poin... 详细信息
来源: 评论
Traceback model for identifying sources of distributed attacks in real time
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第13期9卷 2173-2185页
作者: Ahmed, Abdulghani Ali Sadiq, Ali Safa Zolkipli, Mohamad Fadli UMP Fac Comp Syst & Software Engn Pahang Malaysia
Locating sources of distributed attack is time-consuming;attackers are identified long after the attack is completed. This paper proposes a trackback model for identifying attackers and locating their distributed sour... 详细信息
来源: 评论
Information fusion-based method for distributed domain name system cache poisoning attack detection and identification
收藏 引用
IET INFORMATION SECURITY 2016年 第1期10卷 37-44页
作者: Wu, Hao Dang, Xianglei Wang, Lidong He, Longtao Coordinat Ctr China CNCERT CC Natl Comp Network Emergency Response Tech Team Beijing Peoples R China
In this study, the authors consider the detection and identification problems of distributed domain name system (DNS) cache poisoning attack. In the considered distributed attack, multiple cache servers are invaded si... 详细信息
来源: 评论
How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud?
How to distribute the detection load among virtual machines ...
收藏 引用
13th IEEE International Conference on Services Computing (SCC)
作者: Wahab, Omar Abdel Bentahar, Jamal Otrok, Hadi Mourad, Azzam Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ Canada Khalifa Univ Sci Technol & Res Dept ECE Abu Dhabi U Arab Emirates Lebanese Amer Univ Dept Comp Sci & Math Beirut Lebanon
Security has been identified to be the principal stumbling-block preventing users and enterprises from moving their businesses to the cloud. The reason is that cloud systems, besides inheriting all the vulnerabilities... 详细信息
来源: 评论
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
收藏 引用
IEEE SECURITY & PRIVACY 2017年 第2期15卷 78-86页
作者: Ali, Mohammed Aamir Arief, Budi Emms, Martin van Moorsel, Aad Newcastle Univ Ctr Cybercrime & Comp Secur Newcastle Upon Tyne Tyne & Wear England Univ Kent Sch Comp Canterbury Kent England Newcastle Univ Newcastle Upon Tyne Tyne & Wear England Newcastle Univ Sch Comp Newcastle Upon Tyne Tyne & Wear England
An extensive study of the current practice of online payment using credit and debit cards reveals the intrinsic security challenges caused by differences in how payment sites operate.
来源: 评论
Network Security Situation Analysis Aimed at distributed attack
Network Security Situation Analysis Aimed at Distributed Att...
收藏 引用
International Conference on Materials Science and Engineering Science
作者: Fu Yanming Chen Wen Li Lin Pan Yanxian Sichuan Univ Coll Comp Sci Chengdu 610064 Peoples R China Guangxi Technol Coll Machinery & Elect Nanning Peoples R China
When a certain distributed attack spreads in network, network hosts are classified into three types. The first type has undergone the distributed attack. The second type has the attacked likelihood. The third type is ... 详细信息
来源: 评论