Academic literature on the topic 'Attack and defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack and defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack and defence"
Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Full textK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Full textSiame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.
Full textGao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.
Full textKUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.
Full textAsabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.
Full textJurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.
Full textAkintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.
Full textLi, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.
Full textLi, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.
Full textDissertations / Theses on the topic "Attack and defence"
Kemp, Benjamin Peter. "Attack and defence in cassava bacterial blight." Thesis, University of Bath, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268932.
Full textSandin, Michael. "Pre-Emptive Self-Defence : When does an armed attack occur?" Thesis, Stockholms universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-193754.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textMohr, Peter G., and lswan@deakin edu au. "Abscisic acid regulation of plant defence responses during pathogen attack." Deakin University. School of Biological and Chemical Sciences, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060927.120049.
Full textGlass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks." Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.
Full textArnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.
Full textCatic, Elma. "A right to self-defence or an excuse to use armed force? : About the legality of using self-defence before an armed attack has occurred." Thesis, Stockholms universitet, Stockholm Center for International Law and Justice (SCILJ), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-183513.
Full textCrossley, G. J. "The civil defence debate in Britain 1957-83 : an account and critical analysis of the major issues in the debate about civil defence against nuclear attack." Thesis, University of Bradford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355206.
Full textIoannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.
Full textBooks on the topic "Attack and defence"
P, Mayer C., ed. Hostile takeovers: Defence, attack, and corporate governance. McGraw-Hill Book Co., 1994.
Find full textJorge A. De Vasconcellos e Sá. Strategy plays: Attack and defence strategies for business. Financial Times Prentice Hall, 2005.
Find full textAnderluh, Gregor, and Robert Gilbert, eds. MACPF/CDC Proteins - Agents of Defence, Attack and Invasion. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8881-6.
Full textPaloczi-Horvath, George. From monitor to missile boat: Coast defence ships and coastal defence since 1860. Naval Institute Press, 1996.
Find full textMeredith, Sheena, and Graham Jackson. Conquering heart attack & stroke: Your 10 step self-defence plan. Reader's Digest, 2010.
Find full textDvoretsky, Mark. Attack and defence: How creative thought develops in a chess player. Batsford, 1998.
Find full textSzabó, Kinga Tibori. Anticipatory action in self-defence: Essence and limits under international law. T.M.C. Asser Press, 2011.
Find full textWood, Derek. Attack Warning Red: The Royal Observer Corps and the defence of Britain 1925 to 1992. Carmichael & Sweet, 1992.
Find full textSouthall, Colin Spencer. The defence of Lithgow: Under threat of invasion and air attack during the Second World War. Greater Lithgow City Council, 1995.
Find full textS. Rajaratnam School of International Studies, ed. In defence of freedom of speech and against the publication of certain cartoons. S. Rajaratnam School of International Studies, 2015.
Find full textBook chapters on the topic "Attack and defence"
Gabbay, Dov M., Ross Horne, Sjouke Mauw, and Leendert van der Torre. "Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_8.
Full textBroom, Donald M. "Defence and attack behaviour." In Broom and Fraser’s domestic animal behaviour and welfare, 6th ed. CABI, 2021. http://dx.doi.org/10.1079/9781789249835.0008.
Full textLatas, Milan. "Panic Disorder During a Bioterroristic Attack." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_11.
Full textWu, Tao, Hang Zhang, Jun Ma, and Sujuan Zhang. "Intelligent DDoS Attack Defence Model." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40618-8_90.
Full textYu, Shui. "DDoS Attack and Defence in Cloud." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_5.
Full textHermanns, Holger, Julia Krämer, Jan Krčál, and Mariëlle Stoelinga. "The Value of Attack-Defence Diagrams." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49635-0_9.
Full textBelojevic, Goran. "Comparison of the Available Methods of Differentiation Between a Biological Attack and Other Epidemics." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_6.
Full textAslanyan, Zaruhi, and Flemming Nielson. "Pareto Efficient Solutions of Attack-Defence Trees." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46666-7_6.
Full textMin, Byungho, and Vijay Varadharajan. "Feature-Distributed Malware Attack: Risk and Defence." In Computer Security - ESORICS 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11212-1_26.
Full textGoldsmith, Netta Murray. "Attack – the Best Method of Defence: Strategies." In Alexander Pope. Routledge, 2024. http://dx.doi.org/10.4324/9781003577119-12.
Full textConference papers on the topic "Attack and defence"
Ahmed, Mahad, and Muhammad Atif Tahir. "Bagging as Defence Mechanism Against Adversarial Attack." In 2024 International Conference on Emerging Trends in Smart Technologies (ICETST). IEEE, 2024. http://dx.doi.org/10.1109/icetst62952.2024.10737949.
Full textPatil, Rajendra Shivaji, Markus Dypbukt Källman, and Viktoria Fodor. "DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679390.
Full textSinha, Indrajeet Kumar, Avadhoot Bangal, Krishna Pratap Singh, and Shekhar Verma. "MDMFL: Monitored Defence Mechanism for Federated Learning against Data Poisoning Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725046.
Full textAlsharidah, Ahmad A., Devki Nandan Jha, Bo Wei, Ellis Solaiman, and Rajiv Ranjan. "SecureFed: Blockchain-Based Defence for Data Poisoning Attack in Federated Learning." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00064.
Full textJiang, Chengcheng, and Peilin Hong. "A routing defence scheme against wormhole-like attack in BCube networks." In Fifth International Conference on Digital Signal and Computer Communications (DSCC 2025), edited by Gordana Jovanovic-Dolecek and Ke-Lin Du. SPIE, 2025. https://doi.org/10.1117/12.3071385.
Full textvan Lier, Michel L., Richard J. M. den Hollander, and Hugo J. Kuijf. "Adversarial AI image perturbation attack invariant to object scale and type." In Artificial Intelligence for Security and Defence Applications II, edited by Henri Bouma, Yitzhak Yitzhaky, Radhakrishna Prabhu, and Hugo J. Kuijf. SPIE, 2024. http://dx.doi.org/10.1117/12.3031545.
Full textLi, Xin, Chunyan Yang, and Ming Xie. "Optimized Design of Security Attack and Defence Strategies for Virtual Network Simulation Platforms." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10672988.
Full textWei, Xiaodong, Lina Chen, Siwei Li, and Mingfei Zeng. "Research on cyber security attack and defence strategy simulation in a virtual network environment." In Fourth International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2024), edited by Massimo Ficco and Yixian Yang. SPIE, 2025. https://doi.org/10.1117/12.3058606.
Full textS, Prasanth V., P. S. Haritha, B. Likhitha, Kasireddy Mahalakshmi, and A. Parveen Akhther. "Artificial Intelligence Based Supervised Learning Model for Attack Detection of Botnet and Defence in Iot Cybersecurity Infrastructures Using Convolutional Neural Network." In 2025 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2025. https://doi.org/10.1109/icict64420.2025.11004980.
Full textSofia, R., S. Yazhinian, R. Sambathkumar, R. Saranya, and M. Jeyakumar. "CSPS- Cyber Security Physical System with a Gaming and Defence Strategic Approach to Detect the Malicious Attack for Vehicle to Everything Network." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894465.
Full textReports on the topic "Attack and defence"
Smythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.
Full textPaine, K., O. Whitehouse, J. Sellwood, and A. Shaw. Indicators of Compromise (IoCs) and Their Role in Attack Defence. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9424.
Full textSaalman, Lora. Navigating Chinese–Russian Nuclear and Space Convergence and Divergence. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/rxgl6272.
Full textChristie, Lorna, and Jeni Spragg. Chemical Weapons. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn596.
Full textde Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textMaxion, Roy A., Kevin S. Killourhy, and Kymie M. Tan. Developing a Defense-Centric Attack Taxonomy. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada435079.
Full textGupta, Aman. Hardware Trojan Attack and Defense Techniques. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-812.
Full textJennings-Edquist, Grace. Time to defend science under attack. Monash University, 2024. http://dx.doi.org/10.54377/0e1f-f103.
Full textBest, Carole N. Computer Network Defense and Attack: Information Warfare in the Department of Defense. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada394187.
Full textHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500822.
Full text