Articles with "based attack" as a keyword



Photo from wikipedia

A balm: defend the clique-based attack from a fundamental aspect

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Combinatorial Optimization"

DOI: 10.1007/s10878-020-00527-x

Abstract: Clique, as the most compact cohesive component in a graph, has been employed to identify cohesive subgroups of entities, and explore the sensitive information in the online social network, crowdsourcing network, and cyber-physical network, etc.… read more here.

Keywords: clique; clique based; defend clique; based attack ... See more keywords
Photo from wikipedia

Robustness Analysis of Bipartite Task Assignment Networks: A Case Study in Hospital Logistics System

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2914258

Abstract: Task-oriented social systems involve workers and tasks, which can typically be modeled by bipartite networks. The absence of workers may cause some tasks cannot be finished in time, thus hampering the smoothing operation of the… read more here.

Keywords: based attack; task; task assignment; hospital logistics ... See more keywords
Photo by nampoh from unsplash

Behavioral Model for Live Detection of Apps Based Attack

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computational Social Systems"

DOI: 10.1109/tcss.2022.3166145

Abstract: Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way for numerous security threats. The threats are in the form of attacks such… read more here.

Keywords: application; based attack; detection; attack ... See more keywords
Photo from wikipedia

DETECTING IP BASED ATTACK ON CLOUD SERVER USING PASSIVE IP TRACEBACK

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal on Smart Sensing and Intelligent Systems"

DOI: 10.21307/ijssis-2017-241

Abstract: In computer network security, IP address spoofing plays a major role in the creation of Internet Protocol (IP) packets with a fake or forged source IP address and this may lead to major attacks to… read more here.

Keywords: packet sent; address; based attack; packet ... See more keywords
Photo from wikipedia

Optimal Disintegration Strategy in Multiplex Networks under Layer Node-Based Attack

Sign Up to like & get
recommendations!
Published in 2019 at "Applied Sciences"

DOI: 10.3390/app9193968

Abstract: From social networks to complex infrastructures, many systems could be described by multiplex networks formed by a set of nodes connected via more than one type of links. Network disintegration, which is the problem of… read more here.

Keywords: attack; disintegration; multiplex networks; based attack ... See more keywords