A Comparison of Malicious Interdiction Strategies Against Electrical Networks
نویسندگان
چکیده
منابع مشابه
EA Optimization of Networks Against Malicious Attacks
The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their components, and there has been a recent surge of interest in determining how one can optimize the structure of t...
متن کاملa comparison of linguistic and pragmatic knowledge: a case of iranian learners of english
در این تحقیق دانش زبانشناسی و کاربردشناسی زبان آموزان ایرانی در سطح بالای متوسط مقایسه شد. 50 دانش آموز با سابقه آموزشی مشابه از شش آموزشگاه زبان مختلف در دو آزمون دانش زبانشناسی و آزمون دانش گفتار شناسی زبان انگلیسی شرکت کردند که سوالات هر دو تست توسط محقق تهیه شده بود. همچنین در این تحقیق کارایی کتابهای آموزشی زبان در فراهم آوردن درون داد کافی برای زبان آموزان ایرانی به عنوان هدف جانبی تحقیق ...
15 صفحه اولBlind Network Interdiction Strategies - A Learning Approach
Network interdiction refers to disrupting a network in an attempt to either analyze the network’s vulnerabilities or to undermine a network’s communication capabilities. A vast majority of the works that have studied network interdiction assume a priori knowledge of the network topology. However, such knowledge may not be available in real-time settings. For instance, in practical electronic wa...
متن کاملUnderstanding and Defending Against Malicious Identities in Online Social Networks
Understanding and Defending Against Malicious Identities in Online Social Networks
متن کاملPushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be rendered inoperable by simple flooding attacks generated from insider nodes. In this paper, we study detection and containment mechanisms against insider Denial of Service (DoS) attacks for overlay networks. To counter such ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Emerging and Selected Topics in Circuits and Systems
سال: 2017
ISSN: 2156-3357,2156-3365
DOI: 10.1109/jetcas.2017.2704879