Year of publication
Type of material
Licence
TIB reading rooms collection
1–20 of 38,413 hits
Sort by:
Sort by:
-
Detection, estimation, and compensation of false data injection attack for UAVs
Elsevier | 2020|Keywords: False data injection attack, Attack modeling, Attack detection, Attack estimation -
Master–slave synchronization of neural networks subject to mixed-type communication attacks
Elsevier | 2021|Keywords: Cyber-attack, Deception attack, DoS attack, Replay attack -
Fast attack detection system using log analysis and attack tree generation
Online Contents | 2018|Keywords: Cyber attack, Attack detection, Attack data, Attack tree -
Honeypot Based Black-Hole Attack Confirmation in a MANET
Online Contents | 2018|Keywords: Attack-tree, Attack history, Attack confirmation system, Black-hole attack -
Honeypot Based Black-Hole Attack Confirmation in a MANET
Online Contents | 2018|Keywords: Attack-tree, Attack history, Attack confirmation system, Black-hole attack -
Partially-exposed cast-in-situ concrete degradation induced by internal-external sulfate and magnesium multiple coupled attack
Elsevier | 2021|Keywords: Internal attack, External attack, Magnesium attack, Sulfate attack -
A machine learning approach against a masked AES
Online Contents | 2015|Keywords: Profiled attack, Stochastic attack, Side-channel attack, Template attack -
Fast attack detection system using log analysis and attack tree generation
Online Contents | 2018|Keywords: Cyber attack, Attack detection, Attack data, Attack tree -
Adversarial attacks on Faster R-CNN object detector
Elsevier | 2019|Keywords: Adversarial attack, White-box attack, Black-box attack -
Shilling attacks against collaborative recommender systems: a review
Online Contents | 2018|Keywords: Profile injection attack, Attack detection, Shilling attack -
M-SAN: a patch-based transferable adversarial attack using the multi-stack adversarial network
SPIE | 2023|Keywords: adversarial attack, patch-based attack, untargeted attack, black-box attack, target attack -
BlindNet backdoor: Attack on deep neural network using blind watermark
Online Contents | 2022|Keywords: Causative attack, Poisoning attack, Backdoor attack -
A survey on attack detection, estimation and control of industrial cyber–physical systems
Elsevier | 2021|Keywords: DoS attack, Deception attack, Attack detection -
Security Attacks in Named Data Networking: A Review and Research Directions
Online Contents | 2019|Keywords: cache pollution attack, interest flooding attack, content poisoning attack, cache privacy attack -
Observer‐Based Sensor Attack Diagnosis for Cyber‐Physical Systems via Zonotope Theory
Wiley | 2021|Keywords: attack detection, attack reconstruction, sensor attack -
Shilling attacks against collaborative recommender systems: a review
Online Contents | 2018|Keywords: Profile injection attack, Attack detection, Shilling attack -
On the cryptanalysis of Fridrich's chaotic image encryption scheme
Elsevier | 2016|Keywords: Chosen-ciphertext attack, Differential attack -
Wind farm security: attack surface, targets, scenarios and mitigation
Elsevier | 2017|Keywords: Attack Surface, Attack Targets, Attack Scenarios, Attack Mitigation -
Improved control of cyber-physical systems subject to cyber and physical attacks
Taylor & Francis Verlag | 2019|Keywords: denial of service attack, deception attack, physical attack -
Low frequency sparse adversarial attack
Elsevier | 2023|Keywords: Adversarial attack, Imperceptible attack, Sparse attack, Low-frequency attack
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.