Academic literature on the topic 'Attack deployment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack deployment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack deployment"
Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (2021): 1–36. http://dx.doi.org/10.1145/3465171.
Full textXavier, Riofrío, Astudillo-Salinas Fabian, Tello-Oquendo Luis, and Merchan-Lima Jorge. "The Zero-day attack: Deployment and evolution." Latin-American Journal of Computing 8, no. 1 (2021): 38–53. https://doi.org/10.5281/zenodo.5747676.
Full textHisham, A. Kholidy ˡ'²᾽³ Fabrizio Baiardi ². and Salim Hariri ˡ. "A HIERARCHICAL INTRUSION DETECTION SYSTEM FOR CLOUDS: DESIGN AND EVALUATION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 2, December (2018): 01–24. https://doi.org/10.5281/zenodo.1435321.
Full textHance, Jack, Jordan Milbrath, Noah Ross, and Jeremy Straub. "Distributed Attack Deployment Capability for Modern Automated Penetration Testing." Computers 11, no. 3 (2022): 33. http://dx.doi.org/10.3390/computers11030033.
Full textWang, Junyi. "Vision-Language Model Security in Autonomous Driving: A Survey." Applied and Computational Engineering 146, no. 1 (2025): None. https://doi.org/10.54254/2755-2721/2025.tj22524.
Full textKennedy, Edemacu, Euku Martin, and Ssekibuule Richard. "PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 75–86. https://doi.org/10.5281/zenodo.7502898.
Full textBayani, Samir Vinayak, Sanjeev Prakash, and Jesu Narkarunai Arasu Malaiyappan. "Unifying Assurance A Framework for Ensuring Cloud Compliance in AIML Deployment." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 457–72. http://dx.doi.org/10.60087/jklst.vol2.n3.p472.
Full textTong, Xin, Lan Chen, and Ying Li. "A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks." Applied Mechanics and Materials 128-129 (October 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.441.
Full textKaiya, Haruhiko, Junya Sakai, Shinpei Ogata, and Kenji Kaijiri. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment." International Journal of Secure Software Engineering 4, no. 3 (2013): 42–63. http://dx.doi.org/10.4018/jsse.2013070103.
Full textHasin, Martin, Martin Chovanec, Jakub Palša, and Martin Havrilla. "Analysis and Collection Data from IP Network." Acta Electrotechnica et Informatica 22, no. 3 (2022): 18–23. http://dx.doi.org/10.2478/aei-2022-0013.
Full textDissertations / Theses on the topic "Attack deployment"
Beckman, Philip J. "Scheduling attack submarine deployments." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8944.
Full textChairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.
Full textHASSAN, FARRUKH. "ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.
Full textLin, Shoa-Hua, and 林紹驊. "Heterogeneous Tracers Deployment against DDoS Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/67279576997063309296.
Full textHSU, CHUN-YI, and 徐君毅. "Digital Forensics of Cyber Attack on Cloud Deployment Environment Based on vSphere Hypervisor." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/bkg9f2.
Full textLien, Chia-Chun, and 連嘉俊. "Tracers Deployment of Nodes-Aware Protection Areas against DDoS Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/46763164147765613154.
Full text林昭名. "The Deployment of Distributed Virtual Honeynet for Detecting Network Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73013564976506391756.
Full textChen, Yi-Shun, and 陳奕勳. "Deployment and Management of SDN/NFV Network Testbed: A Case Study of DDoS Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/m68z28.
Full textBooks on the topic "Attack deployment"
Beckman, Philip J. Scheduling attack submarine deployments. Naval Postgraduate School, 1997.
Find full textClinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.
Find full textClinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to sevceral isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.
Find full textUnited States. President (1993-2001 : Clinton). Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.
Find full textOffice, General Accounting. Operation Desert Storm: Disposal and sale of excess items : fact sheet for Congressional requesters. U.S. General Accounting Office, 1992.
Find full textOffice, General Accounting. Operation Desert Storm: Army medical supply issues : report to the Chairman, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 1993.
Find full textOffice, General Accounting. Operation Desert Storm: No evidence that foreign suppliers refused to support war effort : report to Congressional requesters. U.S. General Accounting Office, 1992.
Find full textOffice, General Accounting. Operation Desert Storm: Problems with Air Force medical readiness : report to the Chairman, Subcommittee on Military Forces and Personnel, Committee on Armed Services. U.S. General Accounting Office, 1993.
Find full textOffice, General Accounting. Operation Desert Storm: Apache helicopter fratricide incident : report to the Chairman, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. The Office, 1993.
Find full textOffice, General Accounting. Operation Desert Storm: Army had difficulty providing adequate active and reserve support forces : report to the Chairman, Subcommittee on Readiness, Committee on Armed Services, House of Representatives. The Office, 1992.
Find full textBook chapters on the topic "Attack deployment"
Haber, Morey J. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_24.
Full textHaber, Morey J., and Brad Hibbert. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_21.
Full textHaber, Morey J., and Brad Hibbert. "Vulnerability Management Deployment." In Asset Attack Vectors. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_15.
Full textKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Full textBen Salem, Malek, and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_3.
Full textMoëllic, Pierre-Alain, Mathieu Dumont, Kevin Hector, Christine Hennebert, Raphaël Joud, and Dylan Paulin. "Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models." In Intelligent Secure Trustable Things. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_6.
Full textMaaliw, Renato R., Haewon Byeon, Ravi Kumar, and D. Y. Patil Vidyapeeth. "Dynamic deployment and traffic scheduling of UPF in 5G networks." In Networks Attack Detection on 5G Networks using Data Mining Techniques. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281-2.
Full textFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Full textSayari, Amal, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, and Belhassen Jerbi. "Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph." In Advanced Information Networking and Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99587-4_48.
Full textVolk, Kaitlin M., and Trajan J. Gering. "Predicting Biosecurity Threats: Deployment and Detection of Biological Weapons." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_13.
Full textConference papers on the topic "Attack deployment"
You, Young, and Sung Jung. "Optimal Active Twist Deployment Schedule of a Rotor for Performance Improvement and Vibration Reduction." In Vertical Flight Society 72nd Annual Forum & Technology Display. The Vertical Flight Society, 2016. http://dx.doi.org/10.4050/f-0072-2016-11444.
Full textBarrett, Seth, Calvin Idom, German Zavala Villafuerte, Andrew Byers, and Berk Gulmezoglu. "Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies1." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758948.
Full textPalencsár, Attila, and Rolf Nyborg. "Assessment of Precorrosion Methods for Inhibitor Testing under Sour Conditions." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17903.
Full textMaleki, Sajjad, Subhash Lakshminarayana, E. Veronica Belmega, and Carsten Maple. "A Game-Theoretic Approach for PMU Deployment Against False Data Injection Attacks." In 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 2024. http://dx.doi.org/10.1109/smartgridcomm60555.2024.10738064.
Full textMoon, Soo-Jin, Milind Srivastava, Yves Bieri, Ruben Martins, and Vyas Sekar. "Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00144.
Full textMarek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textYoung June Pyun and Douglas S. Reeves. "Strategic deployment of network monitors for attack attribution." In 2007 4th International Conference on Broadband Communications, Networks and Systems (BROADNETS 2007). IEEE, 2007. http://dx.doi.org/10.1109/broadnets.2007.4550478.
Full textFang, Hao, Ajian Liu, Haocheng Yuan, et al. "Unified Physical-Digital Face Attack Detection." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/83.
Full textLei Wang, Qing Li, Yong Jiang, and Jianping Wu. "Towards mitigating Link Flooding Attack via incremental SDN deployment." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543772.
Full textAgmon, Noga, Asaf Shabtai, and Rami Puzis. "Deployment optimization of IoT devices through attack graph analysis." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3323411.
Full textReports on the topic "Attack deployment"
England, Ellen C. Food for Thought - The Use of Hazard and Critical Control Point Analysis to Assess Vulnerability of Food to Terrorist Attack in Deployment Locations, A Case Study. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada398624.
Full textBerney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40401.
Full textAmador, Julio S. III, Maria Gisela Orinion, Mary Ann Del Rosario, and Jill Angeli Bacasmas. Process Evaluation of the Deployment of Service Attachés or Representatives of Certain Government Agencies. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.54.
Full textCasey, Jonathan, Alexander Bisaro, Alvaro Valverde, Marlon Martinez, and Martin Rokitzki. Private finance investment opportunities in climate-smart agriculture technologies. Foreign, Commonwealth and Development Office (FCDO), 2021. http://dx.doi.org/10.1079/20220030734.
Full text