• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4599705)   Today's Articles (4338)   Subscriber (49359)
For: Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G. A game theoretic defence framework against DoS/DDoS cyber attacks. Comput Secur 2013. [DOI: 10.1016/j.cose.2013.03.014] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
Number Cited by Other Article(s)
1
Engström V, Lagerström R. Two decades of cyberattack simulations: A systematic literature review. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102681] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
2
REPEL: A Strategic Approach for Defending 5G Control Plane From DDoS Signalling Attacks. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2021. [DOI: 10.1109/tnsm.2020.3035342] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
3
A systematic review of cyber-resilience assessment frameworks. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101996] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
4
Li H, Zhang J, He X. Design of data-injection attacks for cyber-physical systems based on Kullback–Leibler divergence. Neurocomputing 2019. [DOI: 10.1016/j.neucom.2019.05.085] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
5
Bouhaddi M, Radjef MS, Adi K. An efficient intrusion detection in resource-constrained mobile ad-hoc networks. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.02.018] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
6
Wu H, Wang Z. Multi-source fusion-based security detection method for heterogeneous networks. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.01.003] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
7
Li J, Hu H, Ke Q, Xiong N. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network. SENSORS (BASEL, SWITZERLAND) 2017;17:s17030553. [PMID: 28282962 PMCID: PMC5375839 DOI: 10.3390/s17030553] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/10/2016] [Accepted: 03/03/2017] [Indexed: 06/06/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA