咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 信息与通信工程
    • 2 篇 交通运输工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 地质资源与地质工...
  • 5 篇 法学
    • 5 篇 法学
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 1 篇 物理学
    • 1 篇 天文学
  • 2 篇 农学
    • 2 篇 农业资源与环境
    • 1 篇 作物学
  • 2 篇 军事学
    • 2 篇 军队指挥学

主题

  • 10 篇 dos attack
  • 1 篇 reliability
  • 1 篇 trojan horse att...
  • 1 篇 deep learning
  • 1 篇 timeliness
  • 1 篇 accessibility
  • 1 篇 event-driven con...
  • 1 篇 uav cyber securi...
  • 1 篇 satellite commun...
  • 1 篇 arbitrated quant...
  • 1 篇 intelligent tran...
  • 1 篇 ecc
  • 1 篇 time delay compe...
  • 1 篇 deep neural netw...
  • 1 篇 wsn security
  • 1 篇 interconnected n...
  • 1 篇 unforgeability
  • 1 篇 availability
  • 1 篇 wsn lifetime
  • 1 篇 vanet

机构

  • 1 篇 department of el...
  • 1 篇 department of el...
  • 1 篇 the third resear...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 college of compu...
  • 1 篇 department of in...
  • 1 篇 engineering rese...
  • 1 篇 computer science...
  • 1 篇 department of in...
  • 1 篇 department of ph...
  • 1 篇 the school of in...
  • 1 篇 school of cybers...
  • 1 篇 college of elect...
  • 1 篇 school of mathem...
  • 1 篇 school of inform...
  • 1 篇 state grid shang...
  • 1 篇 directorate of i...

作者

  • 1 篇 xiao-jun wang
  • 1 篇 r.ganesan
  • 1 篇 dai-yuan peng
  • 1 篇 suhail qadir
  • 1 篇 sultan ahmad
  • 1 篇 jingzhao chen
  • 1 篇 naiwang guo
  • 1 篇 b.prasad
  • 1 篇 r.gopi
  • 1 篇 a.merline
  • 1 篇 hui-ran li
  • 1 篇 yong wang
  • 1 篇 bin liu
  • 1 篇 chunming zou
  • 1 篇 yingjie tian
  • 1 篇 j.h.chen
  • 1 篇 tao zhao
  • 1 篇 anwer mustafa hi...
  • 1 篇 minmin xie
  • 1 篇 mahantesh mathap...

语言

  • 10 篇 英文
检索条件"主题词=DoS attack"
10 条 记 录,以下是1-10 订阅
排序:
Intelligent dos attack Detection with Congestion Control Technique for VANETs
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 141-156页
作者: R.Gopi Mahantesh Mathapati B.Prasad Sultan Ahmad Fahd N.Al-Wesabi Manal Abdullah Alohali Anwer Mustafa Hilal Department of Computer Science and Engineering Dhanalakshmi Srinivasan Engineering CollegePerambalur621212India Department of Computer Science and Engineering RajaRajeswari College of EngineeringBengaluru560074India Department of Information Technology Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharj11942Saudi Arabia Department of Computer Science College of Science&Arts at MahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia&Faculty of Computer and ITSana’a UniversitySana’a15347Yemen Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11564Saudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia
VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s *** is a network that can be heavily scaled up with a number of vehicles and road side units that keep fl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Honeypot Game Theory against dos attack in UAV Cyber
收藏 引用
Computers, Materials & Continua 2023年 第9期76卷 2745-2762页
作者: Shangting Miao Yang Li Quan Pan School of Cybersecurity Northwestern Polytechnical UniversityXi’an710129China School of Automation Northwestern Polytechnical UniversityXi’an710129China
A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are *** of service(dos)attack is a standard network attack method,especially suitable f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Observer‑Based Resilient Control of CACC Vehicle Platoon Against dos attack
收藏 引用
Automotive Innovation 2023年 第2期6卷 176-189页
作者: Xiao Tan Bin Liu Jingzhao Chen Zheng Jiang Engineering Research Center for Metallurgical Automation and Measurement Technology Ministry of EducationWuhan University of Science and TechnologyWuhan 430081China School of Information Science and Engineering Wuhan University of Science and TechnologyWuhan 430081China
Cooperative adaptive cruise control(CACC)is an important technology for improving road utilization and energy efficiency in the automotive *** CACC systems,connected vehicles can receive information from adjacent ones... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Measuring the Impact of dos attack on Availability: Empirical Study Based on Accessibility
收藏 引用
Journal of Information Security 2022年 第2期13卷 66-75页
作者: Suhail Qadir Uzair Bashir Directorate of IT & SS University of Kashmir Srinagar India Computer Science DSE Srinagar India
Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A W-EAP Algorithm for IEC 61850 Protocol against dos/Replay attack
收藏 引用
Journal of Computer and Communications 2020年 第11期8卷 88-101页
作者: Minmin Xie Yong Wang Chunming Zou Yingjie Tian Naiwang Guo College of Computer Science and Technology Shanghai University of Electric Power Shanghai China The Third Research Institute of Ministry of Public Security National Quality Supervision and Testing Center of Security Products for Network and Information Systems Shanghai China State Grid Shanghai Municipal Electric Power Company Shanghai Electric Power Research Institute Shanghai China
Substation automation system uses IEC 61850 protocol for the data transmission between different equipment manufacturers. However, the IEC 61850 protocol lacks an authentication security mechanism, which will make the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Machine Learning Approaches to Detect dos and Their Effect on WSNs Lifetime
收藏 引用
Computers, Materials & Continua 2022年 第3期70卷 4921-4946页
作者: Raniyah Wazirali Rami Ahmad College of Computing and Informatics Saudi Electronic UniversityRiyadh11673Saudi Arabia The School of Information Technology Sebha UniversitySebha71Libya
Energy and security remain the main two challenges in Wireless Sensor Networks(WSNs).Therefore,protecting these WSN networks from Denial of Service(dos)and Distributed dos(Ddos)is one of the WSN networks security *** ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Active event-driven reliable defense control for interconnected nonlinear systems under actuator faults and denial-of-service attacks
收藏 引用
Science China(Information Sciences) 2022年 第6期65卷 155-171页
作者: Bin GUO Songyi DIAN Tao ZHAO College of Electrical Engineering Sichuan University
This study investigates the reliable control design for a class of interconnected nonlinear systems subjected to actuator faults, disturbances, and denial-of-service(dos) attacks. dos attacks are carried out in both s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Progressive Transfer Learning-based Deep Q Network for Ddos Defence in WSN
收藏 引用
Computer Systems Science & Engineering 2023年 第3期44卷 2379-2394页
作者: S.Rameshkumar R.Ganesan A.Merline Department of Electronics and Communication Engineering Sethu Institute of TechnologyVirudhunagarTamilnaduIndia Department of Electrical and Electronics Engineering E.G.S.Pillay Engineering collegeNagapattinamTamilnaduIndia
In The Wireless Multimedia Sensor Network(WNSMs)have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current *** utilising portable technologies,it achieves solid... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Arbitrated Quantum Signature Scheme without Entanglement
收藏 引用
Communications in Theoretical Physics 2017年 第9期67卷 317-322页
作者: Hui-Ran Li Ming-Xing Luo Dai-Yuan Peng Xiao-Jun Wang School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China Department of Physics University of Michigan Ann Arbor M1 48109 USA Department of Electrical Engineering Dublin City University Dublin 9 Ireland
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Practical Authentication with Key Agreement Protocol for Satellite Communications on ECC
A Practical Authentication with Key Agreement Protocol for S...
收藏 引用
International Conference on Industrial Technology and Management Science(ITMS 2015)
作者: H.H.Huang J.H.Chen B.J.Huang School of Mathematics and Statistics Wuhan University
In order to remove the pitfalls and enhance the subsequent schemes, a practical authentication scheme is introduced by using elliptic curve cryptosystem(ECC) and identity-based cryptography(IBC) with three-round h... 详细信息
来源: cnki会议 评论