Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 43.239
21.
  • Event-Triggered Output Feed... Event-Triggered Output Feedback Synchronization of Master-Slave Neural Networks Under Deception Attacks
    Kazemy, Ali; Lam, James; Zhang, Xian-Ming IEEE transaction on neural networks and learning systems, 2022-March, 2022-03-00, 2022-3-00, 20220301, Letnik: 33, Številka: 3
    Journal Article

    The problem of event-triggered synchronization of master-slave neural networks is investigated in this article. It is assumed that both communication channels from the sensor to controller and from ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
22.
  • Optimal DoS Attack Scheduli... Optimal DoS Attack Scheduling in Wireless Networked Control System
    Zhang, Heng; Cheng, Peng; Shi, Ling ... IEEE transactions on control systems technology 24, Številka: 3
    Journal Article
    Recenzirano

    Recently, many literature works have considered the security issues of wireless networked control system (WNCS). However, few works studied how the attacker should optimize its attack schedule in ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
23.
  • Jamming Attacks on Remote S... Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
    Yuzhe Li; Ling Shi; Peng Cheng ... IEEE transactions on automatic control, 2015-Oct., 2015-10-00, 20151001, Letnik: 60, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor node communicates with a remote estimator through a wireless channel which may be jammed by an ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
24.
  • Risk-Sensitive Control Unde... Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies
    Befekadu, Getachew K.; Gupta, Vijay; Antsaklis, Panos J. IEEE transactions on automatic control, 2015-Dec., 2015-12-00, 20151201, Letnik: 60, Številka: 12
    Journal Article
    Recenzirano

    We consider the problem of risk-sensitive stochastic control under a Markov modulated denial-of-service (DoS) attack strategy in which the attacker, using a hidden Markov model, stochastically jams ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
25.
  • Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges
    Yan, Qiao; Yu, F. Richard; Gong, Qingxiang ... IEEE Communications surveys and tutorials, 2016-Firstquarter, Letnik: 18, Številka: 1
    Journal Article
    Recenzirano

    Distributed Denial of Service (DDoS) attacks in cloud computing environments are growing due to the essential characteristics of cloud computing. With recent advances in software-defined networking ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
26.
  • Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
    Pearce, Hammond; Ahmad, Baleegh; Tan, Benjamin ... 2022 IEEE Symposium on Security and Privacy (SP)
    Conference Proceeding

    There is burgeoning interest in designing AI-based systems to assist humans in designing computing systems, including tools that automatically generate computer code. The most notable of these comes ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
27.
  • Realtime DDoS Defense Using... Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis
    Jing Zheng; Qi Li; Guofei Gu ... IEEE transactions on information forensics and security, 2018-July, 2018-7-00, Letnik: 13, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Distributed denial-of-service (DDoS) defense is still a difficult problem though it has been extensively studied. The existing approaches are not capable of detecting various types of DDoS attacks. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
28.
  • JESS: Joint Entropy-Based D... JESS: Joint Entropy-Based DDoS Defense Scheme in SDN
    Kalkan, Kubra; Altay, Levent; Gur, Gurkan ... IEEE journal on selected areas in communications, 10/2018, Letnik: 36, Številka: 10
    Journal Article
    Recenzirano

    Software-defined networking (SDN) is a communication paradigm that brings cost efficiency and flexibility through software-defined functions resident on centralized controllers. Although SDN ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
29.
  • The Cybersecurity Landscape... The Cybersecurity Landscape in Industrial Control Systems
    McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang ... Proceedings of the IEEE 104, Številka: 5
    Journal Article
    Recenzirano

    Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based systems creating a close coupling ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
30.
  • Adversarial Deep Ensemble: ... Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
    Li, Deqiang; Li, Qianmu IEEE transactions on information forensics and security, 2020, Letnik: 15
    Journal Article
    Recenzirano

    Malware remains a big threat to cyber security, calling for machine learning based malware detection. While promising, such detectors are known to be vulnerable to evasion attacks. Ensemble learning ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
1 2 3 4 5
zadetkov: 43.239

Nalaganje filtrov