Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Publication Date of Publication Type An adaptive observer design for denialofservice attack detection in platoon 2023-10-25 Paper A novel E-payment protocol...
    10 bytes (17 words) - 19:45, 13 December 2023
  • Publication Date of Publication Type A denial of service attack against fair computations using bitcoin deposits 2015-12-01 Paper...
    10 bytes (18 words) - 14:21, 6 October 2023
  • Publication Date of Publication Type Denial of service attack and defense method on load frequency control system 2019-10-16 Paper...
    10 bytes (16 words) - 09:04, 7 October 2023
  • Publication Date of Publication Type Advanced persistent distributed denial of service attack model on scale-free networks 2023-08-02 Paper An advanced...
    10 bytes (16 words) - 16:36, 24 September 2023
  • Publication Date of Publication Type Advanced persistent distributed denial of service attack model on scale-free networks 2023-08-02 Paper An advanced...
    10 bytes (16 words) - 16:36, 24 September 2023
  • 2019-09-03 Paper A denial-of-service attack on fiber-based continuous-variable quantum key distribution 2018-12-17 Paper...
    10 bytes (16 words) - 19:30, 24 September 2023
  • Publication Date of Publication Type An adaptive observer design for denialofservice attack detection in platoon 2023-10-25 Paper EXTREME VALUES OF THE RANKIN–SELBERG...
    10 bytes (16 words) - 21:35, 26 December 2023
  • Publication Date of Publication Type Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion 2010-04-23 Paper An Efficient Pre-filtering...
    10 bytes (16 words) - 19:43, 26 December 2023
  • Publication Date of Publication Type Optimal denial-of-service attack energy management against state estimation over an SINR-based network 2020-10-22...
    10 bytes (16 words) - 01:42, 25 September 2023
  • Publication Date of Publication Type Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential...
    10 bytes (18 words) - 01:16, 25 September 2023
  • Publication Date of Publication Type Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential...
    10 bytes (18 words) - 01:16, 25 September 2023
  • Publication Date of Publication Type Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential...
    10 bytes (18 words) - 01:16, 25 September 2023
  • Date of Publication Type Stabilization of distributed cyber physical systems subject to denial-of-service attack 2022-04-07 Paper Secure control of cyber...
    10 bytes (18 words) - 02:00, 25 September 2023
  • Date of Publication Type Switched-type unknown input observer-based fault-tolerant control for cyber-physical systems in the presence of denial of service...
    10 bytes (16 words) - 23:03, 24 September 2023
  • Publication Date of Publication Type Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion 2010-04-23 Paper DDoS Attack Detection Using...
    10 bytes (16 words) - 19:43, 26 December 2023
  • asynchronous DoS attacks 2020-09-22 Paper Robust event‐triggered model predictive control for cyber‐physical systems under denialofservice attacks 2019-11-01...
    10 bytes (17 words) - 02:25, 11 December 2023
  • fault-tolerant control for cyber-physical systems in the presence of denial of service attack 2023-09-08 Paper Several identities for the generalized Apostol-Bernoulli...
    10 bytes (16 words) - 17:16, 6 October 2023
  • analysis of continuous-variable quantum key distribution using a nondeterministic noiseless linear amplifier 2019-05-03 Paper A denial-of-service attack on fiber-based...
    10 bytes (17 words) - 19:30, 24 September 2023
  • analysis of practical continuous-variable quantum key distribution using a heralded noiseless amplifier 2019-09-03 Paper A denial-of-service attack on fiber-based...
    10 bytes (17 words) - 19:30, 24 September 2023
  • binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy 2022-10-04 Paper Optimal and...
    10 bytes (17 words) - 03:41, 10 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)