Academic literature on the topic 'Attack and defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack and defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack and defence"

1

Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.

Full text
Abstract:
Denial of Service( DOS) attacks are an immense trouble to internet spots and among the hardest security problems in moment’s Internet. Of particular concern- because of their implicit impact- are the Distributed Denial of Service( DDoS) attacks. With little or no advance advising a DDoS attack can fluently exhaust the computing and communication coffers of its victim within a short period of time. This paper presents the problem of DDoS attacks and develops a bracket of DDoS defence systems. Description of each attack and defence system order is provided ,along with the advantages and disadvan
APA, Harvard, Vancouver, ISO, and other styles
2

K.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.

Full text
Abstract:
Denial of Service (DoS) attacks is one of the major threats to Internet sites and one of the major security problems Internet faces today. The nature of threats caused by Distributed Denial of Service (DDoS) attacks on networks. With little or no warning, a DDoS attack could easily destroy its victim's communication and network resources in a short period of time. This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms. Important features of each attack and defense system category are described and advantages and disadvantages
APA, Harvard, Vancouver, ISO, and other styles
3

Siame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.

Full text
Abstract:
Pre-emptive use of force in self-defence is one of the most controversial areas under International Law. States attack each other even if the attack appears more distant. The Right of self-defence can only be invoked against an armed attack. Pre-emptive use of force allows states to use coercive measures against perceived future threats. This type of self-defence is used by the states prior to an armed attack which is contrary to the UN Charter. The defending states do not follow the requirement of necessity and proportionality when using force. The Research Questions were to what extent Pre-e
APA, Harvard, Vancouver, ISO, and other styles
4

Gao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.

Full text
Abstract:
The synthetic aperture radar (SAR) image ship detection system needs to adapt to an increasingly complicated actual environment, and the requirements for the stability of the detection system continue to increase. Adversarial attacks deliberately add subtle interference to input samples and cause models to have high confidence in output errors. There are potential risks in a system, and input data that contain confrontation samples can be easily used by malicious people to attack the system. For a safe and stable model, attack algorithms need to be studied. The goal of traditional attack algor
APA, Harvard, Vancouver, ISO, and other styles
5

KUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.

Full text
Abstract:
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to stop them is growing. The use of newly formed Software-Defined Networking (SDN) significantly lowers the computational burden on IoT network nodes and makes it possible to perform more security measurements. This paper proposes an SDN-based, four module DDoS attack detection and mitigation framework for IoT networks called FMDADM. The proposed
APA, Harvard, Vancouver, ISO, and other styles
6

Asabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.

Full text
Abstract:
In the domain of cyber security, the defence mechanisms of networks has traditionally been placed in a reactionary role. Cyber security professionals are therefore disadvantaged in a cyber-attack situation due to the fact that it is vital that they maneuver such attacks before the network is totally compromised. In this paper, we utilize the Betweenness Centrality network measure (social property) to discover possible cyber-attack paths and then employ computation of similar personality of nodes/users to generate predictions about possible attacks within the network. Our method proposes a soci
APA, Harvard, Vancouver, ISO, and other styles
7

Jurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.

Full text
Abstract:
AbstractTerrorist attacks on critical infrastructures can cause problems to a national stability and functioning. Food and water supply chains are some of the most important infrastructures, and it is the country’s (government’s) obligation to provide sufficient quantities of food and water to its population. Intentional food contamination can, among other motives, originate from an act of terrorism (with political or ideological motives) with the aim of causing fear (terror) among people. Food defence systems can help assess vulnerabilities, determine mitigation strategies for terrorist attac
APA, Harvard, Vancouver, ISO, and other styles
8

Akintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.

Full text
Abstract:
<em>Integrating research testbeds, attack mechanisms, and defence strategies into a unified cybersecurity framework offers a pathway to addressing the growing complexity of cyber threats. This study explores the multifaceted roles of research testbeds in simulating and emulating real-world environments, enabling the assessment of vulnerabilities and testing defence mechanisms. It also examines the evolution of attack vectors, such as Advanced Persistent Threats (APTs), and the importance of adapting preventive, detective, and corrective measures in response to these threats. The research advoc
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.

Full text
Abstract:
The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. The basic idea of safe active defence is to make the defence gain more significant than the at
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.

Full text
Abstract:
Data privacy breaches during the training and implementation of the model are the main challenges that impede the development of artificial intelligence technologies today. Federated Learning has been an effective tool for the protection of privacy. Federated Learning is a distributive machine learning method that trains a non-destructive learning module based on a local training and passage of parameters from participants, with no required direct access to data source. Federated Learning still holds many pitfalls. This paper first introduces the types of federated learning, including horizont
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Attack and defence"

1

Kemp, Benjamin Peter. "Attack and defence in cassava bacterial blight." Thesis, University of Bath, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sandin, Michael. "Pre-Emptive Self-Defence : When does an armed attack occur?" Thesis, Stockholms universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-193754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.

Full text
Abstract:
La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e qu
APA, Harvard, Vancouver, ISO, and other styles
4

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Full text
Abstract:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
APA, Harvard, Vancouver, ISO, and other styles
5

Mohr, Peter G., and lswan@deakin edu au. "Abscisic acid regulation of plant defence responses during pathogen attack." Deakin University. School of Biological and Chemical Sciences, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060927.120049.

Full text
Abstract:
The plant hormone, abscisic acid (ABA), has previously been shown to have an impact on the resistance or susceptibility of plants to pathogens. In this thesis, it was shown that ABA had a regulatory effect on an extensive array of plant defence responses in three different plant and pathogen interaction combinations as well as following the application of an abiotic elicitor. In unique studies using ABA deficient mutants of Arabidopsis, exogenous ABA addition or ABA biosynthesis inhibitor application and simulated drought stress, ABA was shown to have a profound effect on the outcome of inte
APA, Harvard, Vancouver, ISO, and other styles
6

Glass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks." Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.

Full text
Abstract:
Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and health care applications. One application of particular interest is that of emergency communications where an Incident Area Network (IAN) can be rapidly deployed at an incident site. Wireless networks are well suited to such applications because they can be rapidly established and facilitate the exchange of voice, video and multimedia content such as detailed maps, building plans and photographs. The experience of Hurricane Katrina, the Asian Tsunami and Black Saturday demonstrates the
APA, Harvard, Vancouver, ISO, and other styles
7

Arnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.

Full text
Abstract:
This thesis investigates how successive British governments in the last two decades of the Cold War developed and adapted civil defence policies aimed at mitigating the effects of a nuclear attack on the population of Britain. It tests the hypothesis that civil defence in Britain from 1972 until 1986 was shaped by three distinct influences; economic, ideological and external. It establishes in which ways and to what extent policy was shaped by these factors and which, if any, was the primary determinant of the major policy decisions of the time. It explains how changing economic, ideological a
APA, Harvard, Vancouver, ISO, and other styles
8

Catic, Elma. "A right to self-defence or an excuse to use armed force? : About the legality of using self-defence before an armed attack has occurred." Thesis, Stockholms universitet, Stockholm Center for International Law and Justice (SCILJ), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-183513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Crossley, G. J. "The civil defence debate in Britain 1957-83 : an account and critical analysis of the major issues in the debate about civil defence against nuclear attack." Thesis, University of Bradford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ioannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.

Full text
Abstract:
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents concerned with critical information exfiltration from High Valued Targets (HVT's) by terrorists, cyber criminals or enemy states. Existing Cyber Defence frameworks and data fusion models do not adequately address (i) the multi-stage nature of XAPTs and (ii) the uncertainty and conflicting information associated with XAPTs. A new data fusion theory, called the Markov Multi-phase Transferable Belief Model (MM-TBM) is developed, for tracking and predicting XAPTs. MM-TBM expands the attack kill-chain model to attac
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Attack and defence"

1

P, Mayer C., ed. Hostile takeovers: Defence, attack, and corporate governance. McGraw-Hill Book Co., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jorge A. De Vasconcellos e Sá. Strategy plays: Attack and defence strategies for business. Financial Times Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderluh, Gregor, and Robert Gilbert, eds. MACPF/CDC Proteins - Agents of Defence, Attack and Invasion. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8881-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paloczi-Horvath, George. From monitor to missile boat: Coast defence ships and coastal defence since 1860. Naval Institute Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meredith, Sheena, and Graham Jackson. Conquering heart attack & stroke: Your 10 step self-defence plan. Reader's Digest, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dvoretsky, Mark. Attack and defence: How creative thought develops in a chess player. Batsford, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Szabó, Kinga Tibori. Anticipatory action in self-defence: Essence and limits under international law. T.M.C. Asser Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wood, Derek. Attack Warning Red: The Royal Observer Corps and the defence of Britain 1925 to 1992. Carmichael & Sweet, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Southall, Colin Spencer. The defence of Lithgow: Under threat of invasion and air attack during the Second World War. Greater Lithgow City Council, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

S. Rajaratnam School of International Studies, ed. In defence of freedom of speech and against the publication of certain cartoons. S. Rajaratnam School of International Studies, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Attack and defence"

1

Gabbay, Dov M., Ross Horne, Sjouke Mauw, and Leendert van der Torre. "Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Broom, Donald M. "Defence and attack behaviour." In Broom and Fraser’s domestic animal behaviour and welfare, 6th ed. CABI, 2021. http://dx.doi.org/10.1079/9781789249835.0008.

Full text
Abstract:
Abstract This chapter discusses the organization of behaviour in animals in the following aspects: defence and attack; defence and avoidance; agonistic reactivity; and defence reactions to humans by farm animals.
APA, Harvard, Vancouver, ISO, and other styles
3

Latas, Milan. "Panic Disorder During a Bioterroristic Attack." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Tao, Hang Zhang, Jun Ma, and Sujuan Zhang. "Intelligent DDoS Attack Defence Model." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40618-8_90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Shui. "DDoS Attack and Defence in Cloud." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hermanns, Holger, Julia Krämer, Jan Krčál, and Mariëlle Stoelinga. "The Value of Attack-Defence Diagrams." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49635-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Belojevic, Goran. "Comparison of the Available Methods of Differentiation Between a Biological Attack and Other Epidemics." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aslanyan, Zaruhi, and Flemming Nielson. "Pareto Efficient Solutions of Attack-Defence Trees." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46666-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Min, Byungho, and Vijay Varadharajan. "Feature-Distributed Malware Attack: Risk and Defence." In Computer Security - ESORICS 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11212-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goldsmith, Netta Murray. "Attack – the Best Method of Defence: Strategies." In Alexander Pope. Routledge, 2024. http://dx.doi.org/10.4324/9781003577119-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack and defence"

1

Ahmed, Mahad, and Muhammad Atif Tahir. "Bagging as Defence Mechanism Against Adversarial Attack." In 2024 International Conference on Emerging Trends in Smart Technologies (ICETST). IEEE, 2024. http://dx.doi.org/10.1109/icetst62952.2024.10737949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patil, Rajendra Shivaji, Markus Dypbukt Källman, and Viktoria Fodor. "DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sinha, Indrajeet Kumar, Avadhoot Bangal, Krishna Pratap Singh, and Shekhar Verma. "MDMFL: Monitored Defence Mechanism for Federated Learning against Data Poisoning Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alsharidah, Ahmad A., Devki Nandan Jha, Bo Wei, Ellis Solaiman, and Rajiv Ranjan. "SecureFed: Blockchain-Based Defence for Data Poisoning Attack in Federated Learning." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Chengcheng, and Peilin Hong. "A routing defence scheme against wormhole-like attack in BCube networks." In Fifth International Conference on Digital Signal and Computer Communications (DSCC 2025), edited by Gordana Jovanovic-Dolecek and Ke-Lin Du. SPIE, 2025. https://doi.org/10.1117/12.3071385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

van Lier, Michel L., Richard J. M. den Hollander, and Hugo J. Kuijf. "Adversarial AI image perturbation attack invariant to object scale and type." In Artificial Intelligence for Security and Defence Applications II, edited by Henri Bouma, Yitzhak Yitzhaky, Radhakrishna Prabhu, and Hugo J. Kuijf. SPIE, 2024. http://dx.doi.org/10.1117/12.3031545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Xin, Chunyan Yang, and Ming Xie. "Optimized Design of Security Attack and Defence Strategies for Virtual Network Simulation Platforms." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10672988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Xiaodong, Lina Chen, Siwei Li, and Mingfei Zeng. "Research on cyber security attack and defence strategy simulation in a virtual network environment." In Fourth International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2024), edited by Massimo Ficco and Yixian Yang. SPIE, 2025. https://doi.org/10.1117/12.3058606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

S, Prasanth V., P. S. Haritha, B. Likhitha, Kasireddy Mahalakshmi, and A. Parveen Akhther. "Artificial Intelligence Based Supervised Learning Model for Attack Detection of Botnet and Defence in Iot Cybersecurity Infrastructures Using Convolutional Neural Network." In 2025 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2025. https://doi.org/10.1109/icict64420.2025.11004980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sofia, R., S. Yazhinian, R. Sambathkumar, R. Saranya, and M. Jeyakumar. "CSPS- Cyber Security Physical System with a Gaming and Defence Strategic Approach to Detect the Malicious Attack for Vehicle to Everything Network." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894465.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack and defence"

1

Smythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.

Full text
Abstract:
Space-based assets (satellites and the terrestrial ground stations that communicate with them) provide critical support to military and civilian operations. They are vulnerable to unintentional damage and disruption, and to deliberate attack. This POSTnote outlines how the UK uses and accesses satellites, potential risks to satellites, and approaches to mitigation.
APA, Harvard, Vancouver, ISO, and other styles
2

Paine, K., O. Whitehouse, J. Sellwood, and A. Shaw. Indicators of Compromise (IoCs) and Their Role in Attack Defence. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saalman, Lora. Navigating Chinese–Russian Nuclear and Space Convergence and Divergence. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/rxgl6272.

Full text
Abstract:
Following the release of a China–Russia joint statement in February 2022, analysts have argued that the two countries have become strategically aligned. While both share security concerns and even use similar terminology on ‘active defence’, the manner in which they address these concerns and operationalize these concepts is not the same—at least not yet. When applied to nuclear deterrence, the Chinese version of active defence suggests retaliatory action against a nuclear attack while the Russian version indicates pre-emption in the face of either non-nuclear or nuclear aggression. In terms o
APA, Harvard, Vancouver, ISO, and other styles
4

Christie, Lorna, and Jeni Spragg. Chemical Weapons. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn596.

Full text
Abstract:
Chemical weapons are prohibited, however recent chemical weapons attacks in Malaysia, Syria, Iraq and the UK have raised concerns about their use. In the UK in 2018, four people were taken seriously ill and one person died following exposure to a Novichok, a type of nerve agent. The UK Government recently announced £11m to strengthen the UK’s chemical defences and highlighted chemical, biological, radiological and nuclear (CBRN) threats as an area of focus in the recent Modernising Defence Programme. This briefing provides an overview of chemical weapons including types of chemical weapons and
APA, Harvard, Vancouver, ISO, and other styles
5

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under
APA, Harvard, Vancouver, ISO, and other styles
6

Maxion, Roy A., Kevin S. Killourhy, and Kymie M. Tan. Developing a Defense-Centric Attack Taxonomy. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada435079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Aman. Hardware Trojan Attack and Defense Techniques. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jennings-Edquist, Grace. Time to defend science under attack. Monash University, 2024. http://dx.doi.org/10.54377/0e1f-f103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Best, Carole N. Computer Network Defense and Attack: Information Warfare in the Department of Defense. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada394187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!