UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 19.558
1.
  • Cyber Criminals on Trial Cyber Criminals on Trial
    Smith, Russell G.; Grabosky, Peter; Urbas, Gregor 08/2004
    eBook

    As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been ...
Celotno besedilo
2.
  • CrowdBC: A Blockchain-Based... CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing
    Li, Ming; Weng, Jian; Yang, Anjia ... IEEE transactions on parallel and distributed systems, 06/2019, Letnik: 30, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Crowdsourcing systems which utilize the human intelligence to solve complex tasks have gained considerable interest and adoption in recent years. However, the majority of existing crowdsourcing ...
Celotno besedilo

PDF
3.
  • Input-to-State Stabilizing ... Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service
    Lu, An-Yang; Yang, Guang-Hong IEEE transactions on automatic control, 2018-June, 2018-6-00, Letnik: 63, Številka: 6
    Journal Article
    Recenzirano

    This paper is concerned with the input-to-state stabilizing control problem for cyber-physical systems (CPSs) with multiple transmission channels under denial-of-service (DoS) attacks. Under the data ...
Celotno besedilo
4.
  • Optimal Denial-of-Service A... Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks
    Qin, Jiahu; Li, Menglin; Shi, Ling ... IEEE transactions on automatic control, 2018-June, 2018-6-00, Letnik: 63, Številka: 6
    Journal Article
    Recenzirano

    The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically, we consider a ...
Celotno besedilo
5.
  • Exploring the Attack Surfac... Exploring the Attack Surface of Blockchain: A Comprehensive Survey
    Saad, Muhammad; Spaulding, Jeffrey; Njilla, Laurent ... IEEE Communications surveys and tutorials, 01/2020, Letnik: 22, Številka: 3
    Journal Article
    Recenzirano

    In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack ...
Celotno besedilo
6.
  • DDoS in the IoT: Mirai and ... DDoS in the IoT: Mirai and Other Botnets
    Kolias, Constantinos; Kambourakis, Georgios; Stavrou, Angelos ... Computer (Long Beach, Calif.), 2017, Letnik: 50, Številka: 7
    Journal Article
    Recenzirano

    The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive ...
Celotno besedilo
7.
  • Resilient Event-Triggering ... Resilient Event-Triggering H Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks
    Peng, Chen; Li, Jicai; Fei, Minrui IEEE transactions on power systems, 2017-Sept., 2017-9-00, 20170901, Letnik: 32, Številka: 5
    Journal Article
    Recenzirano

    This paper investigates a resilient event-triggering H ∞ load frequency control (LFC) for multi-area power systems with energy-limited Denial-of-Service (DoS) attacks. The LFC design specifically ...
Celotno besedilo
8.
  • Input-to-State Stabilizing ... Input-to-State Stabilizing Control Under Denial-of-Service
    De Persis, Claudio; Tesi, Pietro IEEE transactions on automatic control, 2015-Nov., 2015-11-00, 20151101, Letnik: 60, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service ...
Celotno besedilo

PDF
9.
  • Privacy-Preserving DDoS Att... Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks
    Liehuang Zhu; Xiangyun Tang; Meng Shen ... IEEE journal on selected areas in communications, 2018-March, 2018-3-00, Letnik: 36, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple ...
Celotno besedilo

PDF
10.
Celotno besedilo
1 2 3 4 5
zadetkov: 19.558

Nalaganje filtrov