ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Computer and Communicationsx
条 记 录,以下是1-10
视图:
排序:
Big Data & DDoS ATTACKS: A Discussion of Ensemble Algorithms to Detect Cyber Attacks
《Journal of Computer and Communications》2024年第12期246-265,共20页Anja Housden-Brooks 
The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or...
关键词:K-Means Clustering The KNN Algorithm PySpark Ensemble Learning Methods DDoS Attacks Veracity Malicious Traffic Alert Systems 
A Trajectory Privacy Protection Method to Resist Long-Term Observation Attacks
《Journal of Computer and Communications》2024年第5期53-70,共18页Qixin Zhan 
Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exp...
关键词:Location Privacy Long-Term Observation Attacks K-ANONYMITY Location Caching 
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)被引量:1
《Journal of Computer and Communications》2023年第1期26-42,共17页Azizi Majid 
Due to the long-term goal of bringing about significant changes in the quality of services supplied to smart city residents and urban environments and life, the development and deployment of ICT in city infrastructure...
关键词:Smart Cities Internet of Things (IoT) SECURITY PRIVACY ATTACKS Threats 
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
《Journal of Computer and Communications》2022年第4期1-13,共13页Nana Li Yong Wang Pengfei Shen Shuangfei Li Lin Zhou 
In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on indu...
关键词:Robotic Arms Remote Control Systems Cyber Attacks BASE SNORT Security Protection 
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions被引量:1
《Journal of Computer and Communications》2020年第4期11-25,共15页Mohammad Rafsun Islam K. M. Aktheruzzaman 
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied...
关键词:Internet of THINGS IOT IOT Architecture CYBERSECURITY ATTACKS Security Solutions 
Access Control Attacks on PLC Vulnerabilities
《Journal of Computer and Communications》2018年第11期311-325,共15页Yong Wang Jinyong Liu Can Yang Lin Zhou Shuangfei Li Zhaoyan Xu 
In Industrial Control Systems (ICS), security issues are getting more and more attention. The number of hacking attacks per year is endless, and the attacks on industrial control systems are numerous. Programmable Log...
关键词:ICS PLC PMU Data Tampering Delay Attack Methods 
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
《Journal of Computer and Communications》2016年第16期12-27,共17页Yousef Al-Raba’nah Mohammed Al-Refai 
Significant increasing in the number of vehicle accidents around the world and the resulting losses in both aspects human and material necessitate us to find efficient, innovative solutions to this passive phenomenon....
关键词:VANETS Security AUTHENTICATION PRIVACY ATTACKS 
Integrate Liveness Detection with Iris Verification to Construct Support Biometric System
《Journal of Computer and Communications》2016年第1期23-32,共11页Hanaa Mohsin Ahmad Bushra Jabbar Abdulkareem 
The probabilities for the technology to be spoofed are widely acknowledged in biometric verification system. Important efforts have been conducted to study such threats and to develop countermeasures to direct attacks...
关键词:Liveness Detection Iris Verification COUNTERMEASURES Direct Attacks Fingerprint Verification 
A Secure DHCP Protocol to Mitigate LAN Attacks被引量:1
《Journal of Computer and Communications》2016年第1期39-50,共12页Osama S. Younes 
Network security has become more of a concern with the rapid growth and expansion of the Internet. While there are several ways to provide security in the application, transport, or network layers of a network, the da...
关键词:DHCP AUTHENTICATION Data Link Layer Attacks ECDLP 
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems被引量:1
《Journal of Computer and Communications》2014年第8期10-21,共12页Stephen Brako Oti James Ben Hayfron-Acquah 
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to sessio...
关键词:Inter-Domain ROUTING SESSION HIJACKING BGP SECURITY Autonomous Systems 
检索报告 对象比较 聚类工具 使用帮助 返回顶部