Academic literature on the topic 'Attack mitigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack mitigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack mitigation"
Bentley, Mark, Alec Stephenson, Peter Toscas, and Zili Zhu. "A Multivariate Model to Quantify and Mitigate Cybersecurity Risk." Risks 8, no. 2 (2020): 61. http://dx.doi.org/10.3390/risks8020061.
Full textSamer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.
Full textKadiri, Padmaja, and Seshadri Ravala. "Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks." International Journal of e-Collaboration 17, no. 4 (2021): 75–88. http://dx.doi.org/10.4018/ijec.2021100106.
Full textDhadhal, Hema, and Dr Paresh Kotak. "Analytical study of effects of DDoS mitigation methods." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 5 (2023): 728–31. http://dx.doi.org/10.54660/.ijmrge.2023.4.5.728-731.
Full textDhadhal, Hema, and Paresh Kotak. "Leveraging datasets for effective mitigation of DDoS attacks in software-defined networking: significance and challenges." Radioelectronic and Computer Systems 2024, no. 2 (2024): 136–46. http://dx.doi.org/10.32620/reks.2024.2.11.
Full textVenkatachalam, Nallarasan, and Kottilingam Kottursamy. "Jamming Attack Mitigation in CR-IoT Using Game Theory." Revue d'Intelligence Artificielle 36, no. 4 (2022): 615–20. http://dx.doi.org/10.18280/ria.360414.
Full textGupta, Deepak, Ankita Sharma, Rashmi Pandey, Deshdeepak Shrivastava, Archana Acharya, and Madhukar Dubey. "ENHANCING COLLABORATIVE MITIGATION OF VOLUMETRIC DDOS ATTACKS AND FAILURE IN MULTI-SDN NETWORKS." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3165–72. http://dx.doi.org/10.21917/ijct.2024.0471.
Full textShankari, M. Uma, and Dr S. Rethinavalli. "Dynamic Duplication Attack Detection and Mitigation System (DDADMS)." Indian Journal Of Science And Technology 18, no. 18 (2025): 1452–64. https://doi.org/10.17485/ijst/v18i18.535.
Full textAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Full textZalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.
Full textDissertations / Theses on the topic "Attack mitigation"
Giannini, Beatrice. "Attack and Mitigation Modelling for Software-Defined Networks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/19817/.
Full textMohammadnia, Hamzeh. "IoT-NETZ: Spoong Attack Mitigation in IoT Network." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260250.
Full textSaied, Alan. "Distributed Denial of Service (DDoS) attack detection and mitigation." Thesis, King's College London (University of London), 2015. http://kclpure.kcl.ac.uk/portal/en/theses/distributed-denial-of-service-ddos-attack-detection-and-mitigation(eaa45e51-f602-46da-a37a-75c3ae71d2db).html.
Full textZaleski, Elisa Marie. "Mechanisms and Mitigation of CMAS Attack on Thermal Barrier Coatings." Thesis, University of California, Santa Barbara, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3559850.
Full textSriskandarajah, Shriparen. "Detection and mitigation of denial-of-service attacks against software-defined networking." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/226951/1/Shriparen_Sriskandarajah_Thesis.pdf.
Full textZhang, Yueqian. "Resource Clogging Attacks in Mobile Crowd-Sensing: AI-based Modeling, Detection and Mitigation." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40082.
Full textChen, Cong. "Side Channel Leakage Exploitation, Mitigation and Detection of Emerging Cryptosystems." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-dissertations/472.
Full textJang, Jae-Won. "Security of Non-Volatile Memories - Attack Models, Analyses, and Counter-Measures." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5709.
Full textLarsson, Niklas, and Josefsson Fredrik Ågren. "A study of slow denial of service mitigation tools and solutions deployed in the cloud." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157721.
Full textGoldschmidt, Patrik. "Potlačení DoS útoků s využitím strojového učení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449294.
Full textBooks on the topic "Attack mitigation"
Dzikansky, Mordecai Z. Terrorist suicide bombings: Attack interdiction, mitigation, and response. CRC Press, 2012.
Find full textDübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.
Find full textHersman, Rebecca K. C. DOD and consequence management: Mitigating the effects of chemical and biological attack. Institute for National Strategic Studies, National Defense University, 1999.
Find full textRaghavan, S. V., and E. Dawson, eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
Full textCasola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Full textE, Dawson, and SpringerLink (Online service), eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer India Pvt. Ltd., 2011.
Find full textAugustyn, Teresa. An evaluation of grizzly bear - human conflict in the northwest boreal region of Alberta (1991 to 2000) and potential mitigation. Fisheries & Wildlife Management Division, Resource Status and Assessment Branch, 2001.
Find full textAltvater, Elmar. Ablasshandel gegen Klimawandel?: Marktbasierte Instrumente in der globalen Klimapolitik und ihre Alternativen : Reader des Wissenschaftlichen Beirats von Attac. VSA-Verlag, 2008.
Find full textAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Mitigating catastrophic events through effective medical response: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, October 20, 2005. U.S. G.P.O., 2007.
Find full textRobert, Slater, Mordecai Dzikansky, and Gil Kleiman. Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response. Taylor & Francis Group, 2011.
Find full textBook chapters on the topic "Attack mitigation"
Brooks, Richard R., and İlker Özçelik. "Attack Mitigation." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-10.
Full textHaber, Morey J., Brian Chappell, and Christopher Hills. "Mitigation Strategies." In Cloud Attack Vectors. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8236-6_7.
Full textHasan, Nausherwan. "Sulfate Attack Mitigation." In Durability and Sustainability of Concrete. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51573-7_7.
Full textGrammatikakis, Konstantinos-Panagiotis, and Nicholas Kolokotronis. "Attack Graph Generation." In Cyber-Security Threats, Actors, and Dynamic Mitigation. CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-8.
Full textChen, Zhongtian, and Hao Han. "Attack Mitigation by Data Structure Randomization." In Foundations and Practice of Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51966-1_6.
Full textYildiz, Mürsel, Ahmet Cihat Toker, Fikret Sivrikaya, Seyit Ahmet Camtepe, and Sahin Albayrak. "User Facilitated Congestion and Attack Mitigation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30422-4_26.
Full textZou, Qingtian, Lan Zhang, Anoop Singhal, Xiaoyan Sun, and Peng Liu. "Attacks on ML Systems: From Security Analysis to Attack Mitigation." In Information Systems Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7_7.
Full textJadhav, Swati, Arjun Thakur, Shravani Nalbalwar, Shubham Shah, and Sankalp Chordia. "Detection and Mitigation of ARP Spoofing Attack." In International Conference on Innovative Computing and Communications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3010-4_33.
Full textAlghenaim, Mohammed Fahad, Nur Azaliah Abu Bakar, Fiza Abdul Rahim, Vanye Zira Vanduhe, and Gamal Alkawsi. "Phishing Attack Types and Mitigation: A Survey." In Data Science and Emerging Technologies. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0741-0_10.
Full textSzynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Full textConference papers on the topic "Attack mitigation"
Ali, Wasif, Ahthasham Sajid, Tanvi Ajit Ghodke, Rida Malik, Neeru Malik, and Keshav Kaushik. "Honeypot Comparison of Attack Detection and Mitigation of SSH Attack." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866522.
Full textIbrahim, Ahmed Jamal, and Sandor R. Repas. "DDOS Attack Mitigation Based on FPGA Implementation." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698517.
Full textJames, Gracious, Chris Abraham, Saurabh Dipte, Anushka Gaat, and Amroz Siddiqui. "Distributed Denial of Service Attack Mitigation Using Reinforcement Learning." In 2024 First International Conference on Electronics, Communication and Signal Processing (ICECSP). IEEE, 2024. http://dx.doi.org/10.1109/icecsp61809.2024.10698040.
Full textGilmary, Rosario, Kaviya N, Manvizhi N, Arunkumar M, and Arunkumar R. "Intelligent DDoS Attack Prevention and Mitigation in SDN Environment." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894440.
Full textKanter, Morgon, and Stephen Taylor. "Attack Mitigation through Diversity." In MILCOM 2013 - 2013 IEEE Military Communications Conference. IEEE, 2013. http://dx.doi.org/10.1109/milcom.2013.239.
Full textRoy, Sangita, and Ashok Singh Sairam. "Network Attack Detection and Mitigation." In 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2015. http://dx.doi.org/10.1109/sasow.2015.33.
Full textEzekiel, Sharon, Dinil Mon Divakaran, and Mohan Gurusamy. "Dynamic attack mitigation using SDN." In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2017. http://dx.doi.org/10.1109/atnac.2017.8215430.
Full textThen Zhao Xuan, Sean, and Vinesha Selvarajah. "Web Shell Attack and Mitigation." In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon). IEEE, 2022. http://dx.doi.org/10.1109/mysurucon55714.2022.9972572.
Full textGheorghe, Laura, Razvan Rughinis, and Nicolae Tapus. "Attack Evaluation and Mitigation Framework." In 2010 Sixth International Conference on Networking and Services (ICNS). IEEE, 2010. http://dx.doi.org/10.1109/icns.2010.63.
Full textKaushik, Keshav, Govind Sharma, Preeti Narooka, Gunjan Chhabra, and Ankit Vishnoi. "HTML Smuggling: Attack and Mitigation." In 2023 16th International Conference on Security of Information and Networks (SIN). IEEE, 2023. http://dx.doi.org/10.1109/sin60469.2023.10474837.
Full textReports on the topic "Attack mitigation"
Applegate, C., and A. Campbell. Best Practices for Timing Attack Mitigation. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1838256.
Full textSchaffer, Kim. CMVP approved non-invasive attack mitigation test metrics:. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.800-140f.
Full textLetchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1330190.
Full textSchaffer, Kim. CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.sp.800-140fr1-draft.
Full textSmythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.
Full textEddy, W. TCP SYN Flooding Attacks and Common Mitigations. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4987.
Full textNakibly, G., and F. Templin. Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6324.
Full textGodfrey, Jody. Transit Workforce Development Challenges and Mitigation Practices. Mineta Transportation Institute, 2024. http://dx.doi.org/10.31979/mti.2024.2361.
Full textMankins, David, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael Frentz. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada406438.
Full textKerber, Steve, and Robin Zevotek. Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety Released. UL Firefighter Safety Research Institute, 2014. http://dx.doi.org/10.54206/102376/lihb1439.
Full text