Search

Your search keyword '"DENIAL of service attacks"' showing total 143 results

Search Constraints

Start Over You searched for: Descriptor "DENIAL of service attacks" Remove constraint Descriptor: "DENIAL of service attacks" Journal information sciences Remove constraint Journal: information sciences
143 results on '"DENIAL of service attacks"'

Search Results

1. Resilient distributed estimation against FDI attacks: A correntropy-based approach.

2. Detecting backdoor in deep neural networks via intentional adversarial perturbations.

3. Writer-independent signature verification; Evaluation of robotic and generative adversarial attacks.

4. Implementation of art therapy assisted by the internet of medical things based on blockchain and fuzzy set theory.

5. Distributed adaptive fuzzy fault-tolerant control for multi-agent systems with node faults and denial-of-service attacks.

6. Adaptive neural self-triggered bipartite secure control for nonlinear MASs subject to DoS attacks.

7. Observer-based event-triggered non-PDC control for networked T-S fuzzy systems under actuator failures and aperiodic DoS attacks.

8. Resilient state containment of multi-agent systems against composite attacks via output feedback: A sampled-based event-triggered hierarchical approach.

9. Outlier-resistant sequential filtering fusion for cyber-physical systems with quantized measurements under denial-of-service attacks.

10. Secure synchronization against link attacks in complex networks with event-triggered coupling.

11. Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives.

12. Event-triggered fault-tolerant secure containment control of multi-agent systems through impulsive scheme.

13. Event-triggered fault-tolerant secure containment control of multi-agent systems through impulsive scheme.

14. Theoretical derivation of interval principal component analysis.

15. Impulsive security control for fractional-order delayed multi-agent systems with uncertain parameters and switching topology under DoS attack.

16. MPSC for networked switched systems based on timing-response event-triggering scheme.

17. A concealed poisoning attack to reduce deep neural networks' robustness against adversarial samples.

18. Robust backdoor injection with the capability of resisting network transfer.

19. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach.

20. Event-based security tracking control for networked control systems against stochastic cyber-attacks.

21. Distributed model-free adaptive control for multi-agent systems with external disturbances and DoS attacks.

22. Model-based hybrid dynamic event-triggered control for systems subject to DoS attacks: A hybrid system approach.

23. Compound adversarial examples in deep neural networks.

24. Event-based secure control for cyber-physical systems against false data injection attacks.

25. Fairness based on anomaly score and adaptive weight in network attack detection.

26. Secure intermittent impulsive consensus control for fractional-order multiagent systems under denial-of-service and deception attacks.

27. Defending against similarity shift attack for EaaS via adaptive multi-target watermarking.

28. Data-driven attack policy design for cyber-physical systems under channel constraints.

29. A generic approach for network defense strategies generation based on evolutionary game theory.

30. Exploring the vulnerability of self-supervised monocular depth estimation models.

31. Scaled consensus of heterogeneous multi-agent systems under asynchronous DoS attacks.

32. Leveraging cascading information for community detection in social networks.

33. Improving the quality of generative models through Smirnov transformation.

34. Event-based distributed secondary voltage tracking control of microgrids under DoS attacks.

35. Susceptibility & defense of satellite image-trained convolutional networks to backdoor attacks.

36. A lightweight data representation for phishing URLs detection in IoT environments.

37. Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks.

38. Similarity-based integrity protection for deep learning systems.

39. A novel fault diagnosis method of smart grids based on memory spiking neural P systems considering measurement tampering attacks.

40. Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks.

41. Interconnected Takagi-Sugeno system and fractional SIRS malware propagation model for stabilization of Wireless Sensor Networks.

42. Secure adaptive event-triggered anti-synchronization for BAM neural networks with energy-limited DoS attacks.

43. DeFTA: A plug-and-play peer-to-peer decentralized federated learning framework.

44. Adaptive memory event-triggered observer-based pinning synchronization control for complex dynamical networks under asynchronous attacks.

45. Cryptanalysis and improvement of "group public key encryption scheme supporting equality test without bilinear pairings".

46. Predictive control based on event-triggering mechanism of cyber-physical systems under denial-of-service attacks.

47. Distributed multi-rate sampled-data [formula omitted] consensus filtering for cyber-physical systems under denial-of-service attacks.

48. Event triggered control of connected vehicles under multiple cyber attacks.

49. Resilient leader tracking for networked Lagrangian systems under DoS attacks.

50. Reduced-order-asynchronous-based control for nonlinear jump networked systems with attacks.

Catalog

Books, media, physical & digital resources