Academic literature on the topic 'Attack deployment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack deployment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack deployment"

1

Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (2021): 1–36. http://dx.doi.org/10.1145/3465171.

Full text
Abstract:
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances
APA, Harvard, Vancouver, ISO, and other styles
2

Xavier, Riofrío, Astudillo-Salinas Fabian, Tello-Oquendo Luis, and Merchan-Lima Jorge. "The Zero-day attack: Deployment and evolution." Latin-American Journal of Computing 8, no. 1 (2021): 38–53. https://doi.org/10.5281/zenodo.5747676.

Full text
Abstract:
In cybersecurity and computer science, the term “zero-day” is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a highrisk probability, and a critical impact.  Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate them. In this paper, it is conducted a review of the zero-da
APA, Harvard, Vancouver, ISO, and other styles
3

Hisham, A. Kholidy ˡ'²᾽³ Fabrizio Baiardi ². and Salim Hariri ˡ. "A HIERARCHICAL INTRUSION DETECTION SYSTEM FOR CLOUDS: DESIGN AND EVALUATION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 2, December (2018): 01–24. https://doi.org/10.5281/zenodo.1435321.

Full text
Abstract:
Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for our Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it describes the experimental results that confirm that the deployments overcome some limitation of current IDSs to detect host, network and DDoS attacks. Lastly, we discuss the integration and the correlation of the host and network IDSs alerts to
APA, Harvard, Vancouver, ISO, and other styles
4

Hance, Jack, Jordan Milbrath, Noah Ross, and Jeremy Straub. "Distributed Attack Deployment Capability for Modern Automated Penetration Testing." Computers 11, no. 3 (2022): 33. http://dx.doi.org/10.3390/computers11030033.

Full text
Abstract:
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict and even harder to prepare for. This paper presents work designed to prepare for the cybersecurity landscape of tomorrow by creating a key support capability for an autonomous cybersecurity testing system. This system is designed to test and prepare critical infrastructure for what the future of cyberattacks looks like. It proposes a new type of attack framework that provides precise and granular attack control and higher perception within a set of infected infrastructure. The proposed attack framework i
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Junyi. "Vision-Language Model Security in Autonomous Driving: A Survey." Applied and Computational Engineering 146, no. 1 (2025): None. https://doi.org/10.54254/2755-2721/2025.tj22524.

Full text
Abstract:
With the rapid advancement of Vision-Language Models (VLMs), their remarkable capabilities in multimodal perception and decision-making have garnered significant attention in autonomous driving. By integrating VLMs, autonomous driving systems can achieve a deeper understanding of their environment, thereby enhancing safety and efficiency. However, despite their advantages, the deployment of VLMs also introduces potential security vulnerabilities that pose critical challenges to real-world applications. They stem from the complex nature of multimodal processing, making VLMs susceptible to vario
APA, Harvard, Vancouver, ISO, and other styles
6

Kennedy, Edemacu, Euku Martin, and Ssekibuule Richard. "PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 75–86. https://doi.org/10.5281/zenodo.7502898.

Full text
Abstract:
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and com
APA, Harvard, Vancouver, ISO, and other styles
7

Bayani, Samir Vinayak, Sanjeev Prakash, and Jesu Narkarunai Arasu Malaiyappan. "Unifying Assurance A Framework for Ensuring Cloud Compliance in AIML Deployment." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 457–72. http://dx.doi.org/10.60087/jklst.vol2.n3.p472.

Full text
Abstract:
Intrusion poses a significant challenge in Cloud networks, necessitating the development of efficient mechanisms to mitigate intrusions and enhance system security. To address this, we propose a novel Artificial Bee-based Elman Neural Security Framework (ABENSF). This framework involves rescaling the raw dataset using preprocessing functions and integrating an optimal fitness function based on artificial bees into the feature extraction phase to identify and extract attack features. Additionally, the monitoring mechanism in ABENSF enhances network security by proactively preventing attacks. By
APA, Harvard, Vancouver, ISO, and other styles
8

Tong, Xin, Lan Chen, and Ying Li. "A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks." Applied Mechanics and Materials 128-129 (October 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.441.

Full text
Abstract:
Wireless sensor networks (WSNs) are vulnerable to a variety of malicious attacks, especially the packet dropping attack, making security an important research field. Since prevention based techniques are less helpful for guarding against inside attacks, intrusion detection (ID) techniques are indispensable to provide advanced protection. This paper proposes an innovative cellular ID framework for packet dropping attack, which takes the deployment of passive listening nodes into consideration. Performance evaluation made in VisualSense demonstrates its high detection accuracy.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaiya, Haruhiko, Junya Sakai, Shinpei Ogata, and Kenji Kaijiri. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment." International Journal of Secure Software Engineering 4, no. 3 (2013): 42–63. http://dx.doi.org/10.4018/jsse.2013070103.

Full text
Abstract:
The authors cannot comprehensively determine all of the vulnerabilities to an attack only from requirements descriptions. To resolve the problem, the authors propose a method for eliciting security requirements using the information about system architecture. The authors convert a use-case description into a variation of a data flow diagram called an asset-flow diagram (AFD). The authors then refine the AFDs based on a processor deployment diagram (PDD), which gives information about a system architecture. By using vulnerabilities patterns to an attack, the authors distinguish vulnerabilities
APA, Harvard, Vancouver, ISO, and other styles
10

Hasin, Martin, Martin Chovanec, Jakub Palša, and Martin Havrilla. "Analysis and Collection Data from IP Network." Acta Electrotechnica et Informatica 22, no. 3 (2022): 18–23. http://dx.doi.org/10.2478/aei-2022-0013.

Full text
Abstract:
Abstract The rapid deployment of technologies that can share data brings, in addition to the positive aspects, also technologies that an attacker can use to misuse personal data. Vulnerabilities in the network can be divided according to the type of attack into horizontal attacks from the perspective of the attacker and vertical attacks from the perspective of the victim. An important goal of organizations is to successfully defend against such an attack. The search for attacks on the network infrastructure can be ensured by implementing machine learning that can capture the current attack. Th
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Attack deployment"

1

Beckman, Philip J. "Scheduling attack submarine deployments." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8944.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Navy's peacetime mission is "to conduct forward presence operations to help shape the strategic environment by deterring conflict, building interoperability, and by responding, as necessary, to fast breaking crises with the demonstration and application of credible combat power." (OPNAV INSTRUCTION 3501.316, February 1995) The ability to carry out this mission hinges on the Navy's ability to maintain ships and submarines forward deployed in regions where such crises may occur. The end of the Cold War and current budget constraints h
APA, Harvard, Vancouver, ISO, and other styles
2

Chairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.

Full text
Abstract:
Large scale networks face daily thousands of network attacks. No matter the strength of the existing security defending mechanisms, these networks remain vulnerable, as new tools and techniques are being constantly developed by hackers. A new promising technology that lures the attackers in order to monitor their malicious activities and divulge their intentions is emerging with Virtual Honeypots. In the present thesis, we examine an extensive security mechanism based on three different open source low interaction honeypots. We implement this mechanism at our university campus network in an at
APA, Harvard, Vancouver, ISO, and other styles
3

HASSAN, FARRUKH. "ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.

Full text
Abstract:
This thesis communicates a new approach for the future Library system using secure NFC technology. Today we can use NFC and Android based mobile phones to build modern library system in which user will instead of standing in the queue can directly borrow and return books. The NFC technology which will use in this thesis is capable of storing small amount of information. This storage will be used for maintaining the books records. Although the NFC works in close proximity but still there are possibilities of attacks. Due to contact less communication the victim cannot notice the attacks. There
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Shoa-Hua, and 林紹驊. "Heterogeneous Tracers Deployment against DDoS Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/67279576997063309296.

Full text
Abstract:
碩士<br>中華大學<br>資訊工程學系碩士班<br>102<br>To mitigate the DoS/DDoS attacks efficiently, traditional routers are supposed to enhance with different capabilities for tracing attacks origins and filtering abnormal packets in time. In previous work, the enhanced routers are referred to as tracers and classified into three categories, namely tunneling-enabled tracers, marking-enabled tracers and filtering-enabled tracers. The tunneling-enabled tracers can easily reroute packets to the other two kinds of tracers and then the probability of marking and filtering attack packets can be increased. In the enviro
APA, Harvard, Vancouver, ISO, and other styles
5

HSU, CHUN-YI, and 徐君毅. "Digital Forensics of Cyber Attack on Cloud Deployment Environment Based on vSphere Hypervisor." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/bkg9f2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lien, Chia-Chun, and 連嘉俊. "Tracers Deployment of Nodes-Aware Protection Areas against DDoS Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/46763164147765613154.

Full text
Abstract:
碩士<br>中華大學<br>資訊工程學系碩士班<br>102<br>Network security problems emerge in an endless stream. One of serious problems is Distributed Denial of Service (DDoS) attack, which paralyzes hosts such that they cannot provide service for their clients by occupying their resources or network bandwidth. To solve the DDoS problems efficiently, traditional routers have to be enhanced with additional capabilities such as tracing attacks origins, filtering malicious packets, etc. We refer the enhanced routers to as tracers. Under the cost consideration in practice, it is hard to upgrade all of routers to be trac
APA, Harvard, Vancouver, ISO, and other styles
7

林昭名. "The Deployment of Distributed Virtual Honeynet for Detecting Network Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73013564976506391756.

Full text
Abstract:
碩士<br>佛光大學<br>資訊學系<br>99<br>With the popularity of the Internet, the application of daily life is also booming, so many of the network gradually derivative security problems facing the program and continue to introduce new variants of malicious network attack techniques, the use of traditional firewall and intrusion detection systems Passive defense, has been unable to response to this rapid change. In order to effectively resolve the difficulties faced, the previous passive way of defense has to be changed into an active way of exploration, so the possible existing network loopholes of the cu
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Yi-Shun, and 陳奕勳. "Deployment and Management of SDN/NFV Network Testbed: A Case Study of DDoS Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/m68z28.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程學系<br>103<br>After the concept of SDN (Software Defined Network) and NFV (Network Functions Virtualization) are proposed in the world. Researchers begin to study SDN/NFV but the experiment of SDN/NFV needs many costs of devices so there are many network testbeds proposed literature, currently. The Compute node (CN) is an important resource in network testbed. In the past, network testbed usually makes CN by VM. The VM must loads guest OS but let cost and performance, poorly. This paper proposed DONT (Docker-based Openflow Network Testbed, DONT) The CN use Docker Container,
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Attack deployment"

1

Beckman, Philip J. Scheduling attack submarine deployments. Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to sevceral isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. President (1993-2001 : Clinton). Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Operation Desert Storm: Disposal and sale of excess items : fact sheet for Congressional requesters. U.S. General Accounting Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Operation Desert Storm: Army medical supply issues : report to the Chairman, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Operation Desert Storm: No evidence that foreign suppliers refused to support war effort : report to Congressional requesters. U.S. General Accounting Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Operation Desert Storm: Problems with Air Force medical readiness : report to the Chairman, Subcommittee on Military Forces and Personnel, Committee on Armed Services. U.S. General Accounting Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Operation Desert Storm: Apache helicopter fratricide incident : report to the Chairman, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Operation Desert Storm: Army had difficulty providing adequate active and reserve support forces : report to the Chairman, Subcommittee on Readiness, Committee on Armed Services, House of Representatives. The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Attack deployment"

1

Haber, Morey J. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haber, Morey J., and Brad Hibbert. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haber, Morey J., and Brad Hibbert. "Vulnerability Management Deployment." In Asset Attack Vectors. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.

Full text
Abstract:
AbstractDetection of unknown attacks is challenging due to the lack of exemplary attack vectors. However, previously unknown attacks are a significant danger for systems due to a lack of tools for protecting systems against them, especially in fast-evolving Internet of Things (IoT) technology. The most widely used approach for malicious behaviour of the monitored system is detecting anomalies. The vicious behaviour might result from an attack (both known and unknown) or accidental breakdown. We present a Net Anomaly Detector (NAD) system that uses one-class classification Machine Learning tech
APA, Harvard, Vancouver, ISO, and other styles
5

Ben Salem, Malek, and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moëllic, Pierre-Alain, Mathieu Dumont, Kevin Hector, Christine Hennebert, Raphaël Joud, and Dylan Paulin. "Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models." In Intelligent Secure Trustable Things. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_6.

Full text
Abstract:
AbstractThe large-scale deployment of machine learning models in a wide variety of AI-based systems raises major security concerns related to their integrity, confidentiality and availability. These security issues encompass the overall traditional machine learning pipeline, including the training and the inference processes. In the case of embedded models deployed in physically accessible devices, the attack surface is particularly complex because of additional attack vectors exploiting implementation-based flaws. This chapter aims at describing the most important attacks that threaten state-
APA, Harvard, Vancouver, ISO, and other styles
7

Maaliw, Renato R., Haewon Byeon, Ravi Kumar, and D. Y. Patil Vidyapeeth. "Dynamic deployment and traffic scheduling of UPF in 5G networks." In Networks Attack Detection on 5G Networks using Data Mining Techniques. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Full text
Abstract:
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the f
APA, Harvard, Vancouver, ISO, and other styles
9

Sayari, Amal, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, and Belhassen Jerbi. "Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph." In Advanced Information Networking and Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99587-4_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Volk, Kaitlin M., and Trajan J. Gering. "Predicting Biosecurity Threats: Deployment and Detection of Biological Weapons." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_13.

Full text
Abstract:
AbstractUnderstanding what kinds of biological weapons can be made with what sort of technology and by whom is an important component of biosecurity. An equally important component is understanding the different potential targets a biological weapon could be designed to attack, how the weapon would be deployed against these targets, and the available strategies to detect the creation and deployment of an illegal biological weapon. Understanding how a weapon could be deployed against specific targets affords decision makers a better picture of the current state and capabilities of biowarfare an
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack deployment"

1

You, Young, and Sung Jung. "Optimal Active Twist Deployment Schedule of a Rotor for Performance Improvement and Vibration Reduction." In Vertical Flight Society 72nd Annual Forum & Technology Display. The Vertical Flight Society, 2016. http://dx.doi.org/10.4050/f-0072-2016-11444.

Full text
Abstract:
In this paper, the best actuation schedules exploiting various waveform types are sought taking advantage of the global search algorithm for the reduction of the power required and/or hub vibration of a rotor in high speed forward flight. The active twist schedules include two non-harmonic inputs formed based on segmented step functions along with the simple harmonic waveform input. An advanced particle swarm assisted genetic algorithm (PSGA) is employed for the optimizer. A rotorcraft computational structural dynamics (CSD) code CAMRAD II is used to perform the rotor aeromechanics analysis. A
APA, Harvard, Vancouver, ISO, and other styles
2

Barrett, Seth, Calvin Idom, German Zavala Villafuerte, Andrew Byers, and Berk Gulmezoglu. "Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies1." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Palencsár, Attila, and Rolf Nyborg. "Assessment of Precorrosion Methods for Inhibitor Testing under Sour Conditions." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17903.

Full text
Abstract:
Abstract Qualification of corrosion inhibitors for field deployment involves performance testing in the laboratory. Especially for sour service, a common set of test methods and associated protocols or guidelines used across the oil and gas industry, chemical companies and laboratories does, however, not exist. Development and testing of robust methodology were at the core of a Joint Industry Project (JIP) carried out at the Institute for Energy Technology (IFE). This contribution presents a selection of findings related to precorrosion, one of the aspects addressed in the JIP. A series of ben
APA, Harvard, Vancouver, ISO, and other styles
4

Maleki, Sajjad, Subhash Lakshminarayana, E. Veronica Belmega, and Carsten Maple. "A Game-Theoretic Approach for PMU Deployment Against False Data Injection Attacks." In 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 2024. http://dx.doi.org/10.1109/smartgridcomm60555.2024.10738064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moon, Soo-Jin, Milind Srivastava, Yves Bieri, Ruben Martins, and Vyas Sekar. "Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framewor
APA, Harvard, Vancouver, ISO, and other styles
7

Young June Pyun and Douglas S. Reeves. "Strategic deployment of network monitors for attack attribution." In 2007 4th International Conference on Broadband Communications, Networks and Systems (BROADNETS 2007). IEEE, 2007. http://dx.doi.org/10.1109/broadnets.2007.4550478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fang, Hao, Ajian Liu, Haocheng Yuan, et al. "Unified Physical-Digital Face Attack Detection." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/83.

Full text
Abstract:
Face Recognition (FR) systems can suffer from physical (i.e., print photo) and digital (i.e., DeepFake) attacks. However, previous related work rarely considers both situations at the same time. This implies the deployment of multiple models and thus more computational burden. The main reasons for this lack of an integrated model are caused by two factors: (1) The lack of a dataset including both physical and digital attacks which the same ID covers the real face and all attack types; (2) Given the large intra-class variance between these two attacks, it is difficult to learn a compact feature
APA, Harvard, Vancouver, ISO, and other styles
9

Lei Wang, Qing Li, Yong Jiang, and Jianping Wu. "Towards mitigating Link Flooding Attack via incremental SDN deployment." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agmon, Noga, Asaf Shabtai, and Rami Puzis. "Deployment optimization of IoT devices through attack graph analysis." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3323411.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack deployment"

1

England, Ellen C. Food for Thought - The Use of Hazard and Critical Control Point Analysis to Assess Vulnerability of Food to Terrorist Attack in Deployment Locations, A Case Study. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada398624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Berney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40401.

Full text
Abstract:
The ability to remotely assess road and airfield pavement condition is critical to dynamic basing, contingency deployment, convoy entry and sustainment, and post-attack reconnaissance. Current Army processes to evaluate surface condition are time-consuming and require Soldier presence. Recent developments in the area of photogrammetry and light detection and ranging (LiDAR) enable rapid generation of three-dimensional point cloud models of the pavement surface. Point clouds were generated from data collected on a series of asphalt, concrete, and unsurfaced pavements using ground- and aerial-ba
APA, Harvard, Vancouver, ISO, and other styles
3

Amador, Julio S. III, Maria Gisela Orinion, Mary Ann Del Rosario, and Jill Angeli Bacasmas. Process Evaluation of the Deployment of Service Attachés or Representatives of Certain Government Agencies. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.54.

Full text
Abstract:
This study evaluates the deployment processes of service attachés of eight government agencies. It reviews the current systems, frameworks, and criteria in place for deploying service attachés at the relevant partner agencies and the Department of Foreign Affairs based on laws and policies (i.e., agency-specific and interagency). Further, it reviews the monitoring and evaluation systems in place that have captured the measurable outputs and performance of the deployed service attachés. Findings validate that the processes involved in the deployment of service attachés are based on policies (i.
APA, Harvard, Vancouver, ISO, and other styles
4

Casey, Jonathan, Alexander Bisaro, Alvaro Valverde, Marlon Martinez, and Martin Rokitzki. Private finance investment opportunities in climate-smart agriculture technologies. Foreign, Commonwealth and Development Office (FCDO), 2021. http://dx.doi.org/10.1079/20220030734.

Full text
Abstract:
This investor-focused study analyses the role of private finance in climate-smart agriculture (CSA) technology innovation and deployment in Africa and Asia. It focuses in on the perspectives of investors, identifies technologies and areas that demonstrate commercial viability and investment potential, profiles existing investments in CSA technologies, explores the motives and incentives that may attract investors to financing CSA technology companies, and provides a more nuanced understanding of the barriers and bottlenecks that exist for mobilizing greater investment for CSA technology. The f
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!