Genetic algorithm for SDN protection against network attacks
Saved in:
| Date: | 2016 |
|---|---|
| Main Author: | S. I. Zabelin |
| Format: | Article |
| Language: | English |
| Published: |
2016
|
| Series: | System researches & information technologies |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001078991 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Intrusion prevention within a SDN environment
by: Davies, J.N., et al.
Published: (2017)
by: Davies, J.N., et al.
Published: (2017)
Генетичний алгоритм захисту SDN від мережевих атак
by: Zabielin, Stanislav Igorovych
Published: (2016)
by: Zabielin, Stanislav Igorovych
Published: (2016)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Protection against wire break in the electrical distribution network
by: V. I. Koshman, et al.
Published: (2015)
by: V. I. Koshman, et al.
Published: (2015)
Neural Network System for Transient Ischemic Attacks Diagnostics
by: V. A. Golovko, et al.
Published: (2014)
by: V. A. Golovko, et al.
Published: (2014)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Global Attacks on Decentralized Systems Built on Peer-to-peer Networks
by: P. I. Stetsenko
Published: (2017)
by: P. I. Stetsenko
Published: (2017)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Construction of subsystem determination of attacks in cyberphysical systems by neural network methods
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Encryption of Graphic Information by means of Transformation Matrixes for Protection against Decoding by Neural Algorithms
by: O. M. Yunak, et al.
Published: (2020)
by: O. M. Yunak, et al.
Published: (2020)
The genetic algorithms in bioinformatics
by: A. M. Gupal, et al.
Published: (2019)
by: A. M. Gupal, et al.
Published: (2019)
Genetic algorithms of optimization
by: A. A. Vagis
Published: (2019)
by: A. A. Vagis
Published: (2019)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Genetic algorithm for structural adaptation of sorting algorithms
by: Shinkarenko, V.I., et al.
Published: (2024)
by: Shinkarenko, V.I., et al.
Published: (2024)
МULTIFREQUENCY PROTECTING METHOD AGAINST EARTH-FAULTS OF PHASE IN THE COMPENSATED ELECTRIC NETWORKS
by: Syvokobylenko, V. F., et al.
Published: (2020)
by: Syvokobylenko, V. F., et al.
Published: (2020)
Fast adaptive protection against short circuits in microgrid electric networks with distributed generation
by: M. V. Hrebchenko, et al.
Published: (2021)
by: M. V. Hrebchenko, et al.
Published: (2021)
Genetic algorithms for Chebyshev approximation
by: L. P. Vakal
Published: (2013)
by: L. P. Vakal
Published: (2013)
Genetic algorithm parenting fitness
by: M. Ouiss, et al.
Published: (2023)
by: M. Ouiss, et al.
Published: (2023)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
SIMULTANEOUS ALLOCATION OF MULTIPLE DISTRIBUTED GENERATION AND CAPACITORS IN RADIAL NETWORK USING GENETIC-SALP SWARM ALGORITHM
by: Djabali, Chabane, et al.
Published: (2020)
by: Djabali, Chabane, et al.
Published: (2020)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Using of Genetic Algorithms in Modeling of Migration
by: O. R. Ovchynnikova
Published: (2013)
by: O. R. Ovchynnikova
Published: (2013)
Constructive-synthesizing modeling of the genetic algorithm chromosomes with encoded sorting algorithms
by: Shinkarenko, V.I., et al.
Published: (2025)
by: Shinkarenko, V.I., et al.
Published: (2025)
Analyses of parallel algorithm of empirical models synthesis on the principles of genetic algorithms
by: M. I. Gorbijchuk, et al.
Published: (2016)
by: M. I. Gorbijchuk, et al.
Published: (2016)
Offering a Method to Find the Most Proper Parking Space in the City Automobile Expediency Network by Genetic Algorithm
by: A. Marziyeh, et al.
Published: (2019)
by: A. Marziyeh, et al.
Published: (2019)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
Hybrid genetic algorithm based on the biological apoptosis
by: O. G. Rudenko, et al.
Published: (2013)
by: O. G. Rudenko, et al.
Published: (2013)
Multivariate convergence-targeted operator for the genetic algorithm
by: O. Shadura, et al.
Published: (2017)
by: O. Shadura, et al.
Published: (2017)
The possibilities of the using genetic algorithms in simulation optimization
by: V. A. Pepeljaev, et al.
Published: (2019)
by: V. A. Pepeljaev, et al.
Published: (2019)
Multivariate convergence-targeted operator for the genetic algorithm
by: Shadura, O., et al.
Published: (2017)
by: Shadura, O., et al.
Published: (2017)
Protection of thermoelectric converters against electrical overloads
by: P. D. Mykytiuk, et al.
Published: (2018)
by: P. D. Mykytiuk, et al.
Published: (2018)
Protection of thermoelectric converters against electrical overloads
by: P. D. Mikitjuk, et al.
Published: (2018)
by: P. D. Mikitjuk, et al.
Published: (2018)
Features of implementation of the parallel version multipopulation genetic algorithm
by: I. O. Lukjanov, et al.
Published: (2018)
by: I. O. Lukjanov, et al.
Published: (2018)
Similar Items
-
Intrusion prevention within a SDN environment
by: Davies, J.N., et al.
Published: (2017) -
Генетичний алгоритм захисту SDN від мережевих атак
by: Zabielin, Stanislav Igorovych
Published: (2016) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021) -
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)