|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1332 occurrences of 792 keywords
|
|
|
Results
Found 12185 publication records. Showing 10178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao |
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Lubomir Salanci |
Object-Oriented Programming at Upper Secondary School for Advanced Students. |
ISSEP |
2006 |
DBLP DOI BibTeX RDF |
|
18 | |
Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia |
Practical Broadcast Authentication in Sensor Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Basheer Al-Duwairi, G. Manimaran |
Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jeonil Kang, DaeHun Nyang |
RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. |
SIGMETRICS |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
18 | RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo |
An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. |
ICN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Hidetoshi Ueno, Hideharu Suzuki, Norihiro Ishikawa |
A Group Management Protocol for Mobile Multicast. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 |
SVision: A Network Host-Centered Anomaly Visualization Technique. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song |
FIT: fast Internet traceback. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Aki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang |
Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Seonho Choi |
Denial-of-Service Resistant Multicast Authentication Protocol with Prediction Hashing and One-way Key Chain. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Erol Gelenbe |
Users and Services in Intelligent Networks. |
AINTEC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | B. Saillet, Jean-Michel Portal, Didier Née |
Flash Memory Cell: Parametric Test Data Reconstruction for Process Monitoring. |
DFT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Salil S. Kanhere, Anjum Naveed |
A Novel Tuneable Low-Intensity Adversarial Attack. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Silvia Farraposo, Philippe Owezarski, Edmundo Monteiro |
On the Use of Traffic Monitoring and Measurements for Improving Networking. |
AICT/SAPIR/ELETE |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
SOS: an architecture for mitigating DDoS attacks. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Basheer Al-Duwairi, Anirban Chakrabarti, Govindarasu Manimaran |
An Efficient Probabilistic Packet Marking Scheme for IP Traceback. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Guang Yang 0001, Mario Gerla, M. Y. Sanadidi |
Defense against low-rate TCP-targeted denial-of-service attacks. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Bao-Tung Wang, Henning Schulzrinne |
A denial-of-service-resistant IP traceback approach. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
18 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas |
Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
qos signaling, security, quality of service, ad hoc networks, denial of service, attacks |
18 | Il-Ahn Cheong, Yongmin Kim 0005, Minsoo Kim 0002, BongNam Noh |
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ajmal S. Mian, Ashraf Masood |
Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
security, scalability, denial of service |
18 | Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda |
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Mossé |
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks. |
Annual Simulation Symposium |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu |
On the Issues of IP Traceback for IPv6 and Mobile IPv6. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Zhaole Chen, Moon-Chuen Lee |
An IP Traceback Technique against Denial-of-Service Attacks. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Cristian Estan, George Varghese, Mike Fisk |
Counting the number of active flows on a high speed link. |
Comput. Commun. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Hechmi Khlifi, Jocelyn Desbiens, Mohamed Cheriet |
Building Groupwares over Duplicated Object Systems. |
CRIWG |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Michel Portal, L. Forli, Hassen Aziza, Didier Née |
An Automated Design Methodology for EEPROM Cell (ADE). |
MTDT |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Michel Portal, L. Forli, Hassen Aziza, Didier Née |
An Automated Methodology to Diagnose Geometric Defect in the EEPROM Cell. |
ITC |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Kenjiro Cho, Ryo Kaizaki, Akira Kato |
Aguri: An Aggregation-Based Traffic Profiler. |
QofIS |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Akihiko Miyoshi, Ragunathan Rajkumar |
Protecting Resources with Resource Control Lists. |
IEEE Real Time Technology and Applications Symposium |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Martin Barghoorn |
High performance computing through parallel processing. |
APL |
2000 |
DBLP DOI BibTeX RDF |
APL |
18 | Jeffrey Horton, Jennifer Seberry |
Companion Viruses and the Macintosh: Threats and Countermeasures. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Friedrich Summann |
Das Internet-basierte Bibliotheksinformationssystem in der Bibliothek der Universität Bielefeld. |
Inform. Forsch. Entwickl. |
1998 |
DBLP DOI BibTeX RDF |
Informationsnetz, bibliographische Datenbanken, Dokumentlieferung, digitale Bibliothek |
18 | James Thatcher |
Screen reader/2: access to OS/2 and the graphical user interface. |
ASSETS |
1994 |
DBLP DOI BibTeX RDF |
OS/2 |
18 | Randy F. Pausch, Matthew Conway, Robert DeLine |
Lessons Learned from SUIT, the Simple User Interface Toolkit. |
ACM Trans. Inf. Syst. |
1992 |
DBLP DOI BibTeX RDF |
SUIT, GUI, graphical user interface, software tools, pedagogy, rapid prototyping, portability, UIMS, learnability, user interface toolkit, export |
18 | James G. Wheeler |
Design and Implementation of the Interface to Compiled Languages in APL*PLUS II. |
APL |
1990 |
DBLP DOI BibTeX RDF |
APL |
18 | A. H. Jarvis, D. Pratt, Keith E. Gatling |
The effect of unstaffing. |
SIGUCCS |
1989 |
DBLP DOI BibTeX RDF |
|
17 | Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han |
A Novel Cross Layer Intrusion Detection System in MANET. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
MANET, IDS, DoS, Cross layer, AODV |
17 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
17 | Meiko Jensen, Nils Gruschka, Norbert Luttenberger |
The Impact of Flooding Attacks on Network-based Services. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Web Services, availability, DoS, attacks, flooding |
17 | Danny Wong |
Kickin' it old school!: dealing with legacy applications. |
SIGUCCS |
2008 |
DBLP DOI BibTeX RDF |
Virtualization, Linux, DOS, VMware, cross-platform, Legacy |
17 | Virginia N. L. Franqueira, Raul H. C. Lopes |
Vulnerability Assessment by Learning Attack Specifications in Graphs. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Network Security, DoS, Intrusion Prevention |
17 | Udaya Kiran Tupakula, Vijay Varadharajan |
Analysis of traceback techniques. |
ACSW |
2006 |
DBLP BibTeX RDF |
DoS, denial of service, DDoS, traceback |
17 | Shigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura |
Design and Implementation of Unauthorized Access Tracing System. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
network security, IDS, traceback, unauthorized access, DOS |
17 | Cristina Cifuentes |
An Environment for the Reverse Engineering of Executable Programs. |
APSEC |
1995 |
DBLP DOI BibTeX RDF |
reverse compiler, i80286, reverse engineering, signatures, C language, disassembler, dos |
17 | Catherine C. Bareiss |
An introductory course on the use of operating systems. |
SIGCSE |
1992 |
DBLP DOI BibTeX RDF |
UNIX, DOS |
17 | Allison J. Mull, P. Tobin Maginnis |
Evolutionary Steps Toward a Distributed Operating System: Theory and Implementation. |
ACM SIGOPS Oper. Syst. Rev. |
1991 |
DBLP DOI BibTeX RDF |
MINIX, DOS |
17 | Paul Reince |
Hard disk management standards in a networked environment. |
SIGUCCS |
1990 |
DBLP DOI BibTeX RDF |
DOS |
16 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
16 | Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu |
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response. |
ICGEC |
2011 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attack, spoofed reader attack, authentication, access control, RFID security |
16 | Ying Xuan, Incheol Shin, My T. Thai, Taieb Znati |
Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. |
IEEE Trans. Parallel Distributed Syst. |
2010 |
DBLP DOI BibTeX RDF |
Application DoS, network security, group testing |
16 | Mehran S. Fallah |
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory. |
IEEE Trans. Dependable Secur. Comput. |
2010 |
DBLP DOI BibTeX RDF |
Client-puzzle approach, flooding DoS attack, reliability, game theory, availability and serviceability |
16 | Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar |
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility |
16 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane |
Fault Injection Resilience. |
FDTC |
2010 |
DBLP DOI BibTeX RDF |
Fault Injection Attack (FIA), symmetric block encryption, Fault Injection Resilience (FIR), Differential Fault Analysis (DFA), Dual-rail with Precharge Logic (DPL), Side-Channel Attack (SCA), Denial of Service (DoS) |
16 | Hakem Beitollahi, Geert Deconinck |
Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
Empirical study, overlay networks, DoS attacks |
16 | Jayashree Padmanabhan, K. S. Easwarakumar |
Traffic Engineering Based Attack Detection in Active Networks. |
ICDCN |
2009 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS), active network, traffic characteristics, leaky buckets |
16 | Sushil Kumar Jain, Kumkum Garg |
A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks. |
CICSyN |
2009 |
DBLP DOI BibTeX RDF |
Jamming Attack, Denial of Service (DoS), Multipath Routing |
16 | Siqin Zhao, Kang Chen, Weimin Zheng |
Defend Against Denial of Service Attack with VMM. |
GCC |
2009 |
DBLP DOI BibTeX RDF |
Isolated Environment, Selective Duplication, Threshold, Virtual Machine Monitor, DoS Attack |
16 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA |
16 | Eun-Jun Yoon, Kee-Young Yoo |
Two Security Problems of RFID Security Method with Ownership Transfer. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack |
16 | Ana Emília de Melo Queiroz, Maurício Motta Braga, Alex Sandro Gomes |
Design de ajudas inteligentes em interfaces educativas. |
IHC |
2008 |
DBLP BibTeX RDF |
análise instrumental da aprendizagem, interfaces educativas, teoria dos campos conceituais, scaffolding |
16 | Sanjeev Kumar, Einar Petana |
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security |
16 | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang |
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack |
16 | Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt |
Wireless client puzzles in IEEE 802.11 networks: security by wireless. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS), wireless security, impersonation attacks, client puzzles |
16 | Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry |
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Traffic statistical modeling, non-Gaussian long-range dependent process, flash crowd, DoS attack |
16 | Hung-Yu Chien, Chen-Wei Huang |
A Lightweight RFID Protocol Using Substring. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
low-cost cryptography, DOS attack, authentication, RFID, tracing, reader |
16 | Dmitrij Lagutin, Hannu H. Kari |
Controlling Incoming Connections Using Certificates and Distributed Hash Tables. |
NEW2AN |
2007 |
DBLP DOI BibTeX RDF |
rights delegation, DoS countermeasures, certificates, Session management, rights management |
16 | Mikhael Felker |
Internet War Games: Power of the Masses. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
defense methods, distributed DoS attacks, denial-of-service attacks |
16 | Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David R. Karger, Scott Shenker |
DDoS defense by offense. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
bandwidth, DoS attack, currency |
16 | Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, W. Timothy Strayer |
Single-packet IP traceback. |
IEEE/ACM Trans. Netw. |
2002 |
DBLP DOI BibTeX RDF |
network fault diagnosis, IP, denial of service (DoS), wide-area networks (WANs), computer network management, IP traceback, computer network security |
16 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
16 | Diomidis Spinellis |
Trace: A Tool for Logging Operating System Call Transactions. |
ACM SIGOPS Oper. Syst. Rev. |
1994 |
DBLP DOI BibTeX RDF |
MS-DOS |
16 | M. Stella Atkins, Louis J. Hafer, Patrick Leung |
Robots in the laboratory. |
SIGCSE |
1988 |
DBLP DOI BibTeX RDF |
IBM PC, MS-DOS |
12 | Merly Thomas, B. B. Meshram |
DoS attack detection using Aquila deer hunting optimization enabled deep belief network. |
Int. J. Web Inf. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yong Ma 0002, Xin Qi, Zhixiong Li, Songlin Hu, Miguel Ángel Sotelo |
Resilient Control for Networked Unmanned Surface Vehicles With Dynamic Event-Triggered Mechanism Under Aperiodic DoS Attacks. |
IEEE Trans. Veh. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sifan Li, Yue Cao 0002, Shuohan Liu, Yuping Lai, Yongdong Zhu, Naveed Ahmad 0003 |
HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben-Othman, Lynda Mokdad |
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yuan-Yuan Li, Yuan-Xin Li 0001 |
Security-based distributed fuzzy funnel cooperative control for uncertain nonlinear multi-agent systems against DoS attacks. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ling Chen, Guanqi Wang, Feng Li 0009 |
H∞ Filtering for Discrete-Time Singular Markov Jump Systems Under DoS Attacks and Its Application. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiaohua Zhang, Huaxiang Han |
Event-Triggered Finite-Time Filtering for Nonlinear Networked System With Quantization and DOS Attacks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Liyuan Yin, Lezhong Xu, Fusheng Hou, Hongming Zhu, Houhua Jing, Xingjian Sun, Chengwei Wu |
Security Analysis and Control Under Periodic DoS Attacks. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Palanisamy Selvaraj, Oh-Min Kwon 0001, Seung-Hoon Lee, R. Sakthivel 0001, S. M. Lee |
Event-triggered control design with varying gains for polynomial fuzzy systems against DoS attacks. |
Math. Comput. Simul. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yifan Zhong, Yuan Yuan 0006, Huanhuan Yuan |
Nash Equilibrium Seeking for Multi-Agent Systems Under DoS Attacks and Disturbances. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tohid Behdadnia, Klaas Thoelen, Fairouz Zobiri, Geert Deconinck |
Leveraging Deep Learning to Increase the Success Rate of DoS Attacks in PMU-Based Automatic Generation Control Systems. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Da-Wei Zhang, Guo-Ping Liu 0003 |
Secure Predictive Control for Networked High-Order Fully Actuated Systems Under Random DoS Attacks. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Lusong Ding, Weiwei Sun 0004 |
Neuroadaptive prescribed-time secure control for nonlinear interconnected NCSs via multiple triggering against DoS attacks. |
Appl. Math. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Shenshen Li, Haibo Du, Weile Chen, Wenwu Zhu 0004 |
Design of non-smooth consensus protocol for multi-agent systems under DoS attacks. |
Appl. Math. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ming-Juan Guo, Yuan-Xin Li 0001 |
Estimator-based adaptive prescribed performance cooperative bipartite containment control of nonlinear multiagent system against DoS attacks. |
Appl. Math. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xinyu Guan, Yanyan Hu, Kaixiang Peng |
Finite-time switching-like sliding mode fault-tolerant control for discrete-time cyber-physical systems under DoS attacks and intermittent faults. |
Appl. Math. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chenhang Yan, Liping Yan, Yuezu Lv, Yuanqing Xia |
Adaptive Event-Triggered Resilient Control of Heterogeneous Multiagent Under DoS Attacks and Link Faults on Directed Graphs. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Lili Li, Di Rong, Jun Fu 0001, Qingjun Guo |
Multi-Level Event-Triggered Scheme of Output Regulation Under Long-Duration DoS Attacks in Switched Systems With Dissipativity. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jinliang Liu, Yanhui Dong, Zhou Gu, Xiangpeng Xie, Engang Tian |
Security consensus control for multi-agent systems under DoS attacks via reinforcement learning method. |
J. Frankl. Inst. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chenrui Zhang, Yiming Jiang 0014, Shuang Shen, Rediet Tesfaye Zeru, Yuanqing Xia, Senchun Chai |
Inherent attack tolerance properties of model predictive control under DoS attacks. |
J. Frankl. Inst. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 10178 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|