Academic literature on the topic 'Availability Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Availability Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Availability Attack"

1

Houmer, Meriem, and Moulay Lahcen Hasnaoui. "A risk and security assessment of VANET availability using attack tree concept." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6039. http://dx.doi.org/10.11591/ijece.v10i6.pp6039-6044.

Full text
Abstract:
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Researchers and interested authorities have therefore paid more attention to this issue. Therefore, robust approaches to protect this network's security and privacy against adversaries and attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk that faces this network. This paper focuses on the security threats in vehicular network especially on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack that the attacker can lead against the availability of VANET. We adopt a tree structure called attack tree to model the attacker's potential attack strategies. Based on this attack tree model, we can estimate the degree that a certain threat can lead to the VANET and identify possible attack sequences that an attacker may launch against the availability of this network. Then we utilize the multi-attribute utility theory to calculate the system’s total risk value also the probabilities of each attack sequence. The analysis results can provide support for decision-makers to make corresponding protection measures against the attack on the availability of this network.
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.

Full text
Abstract:
Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient confidentiality, integrity, and availability. The rapid development of network technologies helps increase network attacks and hides their malicious intentions. Attack intention is the ultimate attack goal that the attacker attempts to achieve by executing various intrusion methods or techniques. Recognizing attack intentions helps security administrator develop effective protection systems that can detect network attacks that have similar intentions. This paper analyses attack types and classifies them according to their malicious intent. An investigation approach based on similarity metric is proposed to recognize attacker plans and predict their intentions. The obtained results demonstrate that the proposed approach is capable of investigating similarity of attack signatures and recognizing the intentions of Network attack.
APA, Harvard, Vancouver, ISO, and other styles
3

D, Sheethal, and Chandrashekhar H.K. "A Novel Mechanism for Detecting DOS Attack in VANET Using EAPDA." International Journal of Emerging Research in Management and Technology 6, no. 7 (June 29, 2018): 286. http://dx.doi.org/10.23956/ijermt.v6i7.227.

Full text
Abstract:
Security is the major concern with respect to the critical information shared between the vehicles. Vehicular ad hoc network is a sub class of Mobile ad hoc network in which the vehicles move freely and communicate with each other and with the roadside unit (RSU) as well. Since the nodes are self organized, highly mobile and free to move therefore any nodes can interact with any other node which may or may not be trustworthy. This is the area of concern in the security horizon of VANETs. It is the responsibility of RSU to make the network available all the time to every node for secure communication of critical information. For this, network availability occurs as the major security requirement, which may be exposed to several threats or attacks. The vehicles and the RSU are prone to several security attacks such as masquerading, Sybil attack, alteration attack, Selfish driver attack, etc. Among these Denial of Service attack is the major threat to the availability of network. In order to shelter the VANET from DoS attack we have proposed Enhanced Attacked Packet Detection Algorithm which prohibits the deterioration of the network performance even under this attack. EAPDA not only verify the nodes and detect malicious nodes but also improves the throughput with minimized delay thus enhancing security. The simulation is done using NS2 and the results are compared with earlier done work.
APA, Harvard, Vancouver, ISO, and other styles
4

Aridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (October 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.

Full text
Abstract:
The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed Denial of Service attacks to degrade cloud server performance. Attack detection techniques are applied to the VMs that are used by malicious tenants to hold the cloud resources by launching DDoS attacks at data center subnets. Traditional dataflow-based attack detection methods rely on the similarities of incoming requests which consist of IP and TCP header information flows. The proposed approach classifies the status patterns of malicious VMs and ideal VMs to identify the attackers. In this article, information theory is used to calculate the entropy value of the malicious virtual machines for detecting attack behaviors. Experimental results prove that the proposed system works well against DDoS attacks in IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Thaper, Rohit, and Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing." Journal of Cases on Information Technology 17, no. 3 (July 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.

Full text
Abstract:
Cloud Computing is most widely used in current technology. It provides a higher availability of resources to greater number of end users. In the cloud era, security has develop a reformed source of worries. Distributed Denial of Service (DDoS) and Economical Denial of Sustainability (EDoS) are attacks that can affect the ‘pay-per-use' model. This model automatically scales the resources according to the demand of consumers. The functionality of this model is to mitigate the EDoS attack by some tactical attacker/s, group of attackers or zombie machine network (BOTNET) to minimize the availability of the target resources, which directly or indirectly reduces the profits and increase the cost for the cloud operators. This paper presents a model called Enhanced-APART which is step further of the authors' previous model (APART) that can be used to mitigate the EDoS attack from the cloud platform and shows the nature of the attack. Enhanced-APART model offers pre-shared security mechanism to ensure the access of legitimate users on the cloud services. It also performs pattern analysis in order to detect the EDoS caused by BOTNET mechanism and includes time-based and key-sharing post-setup authentication scheme to prevent the replication or replay attacks and thus results in mitigation of EDoS attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Klymash, M. M., O. M. Shpur, and N. V. Pelekh. "WEB SERVICE AVAILABILITY MONITORING IN DISTRIBUTED INFOCOMMUNICATION SYSTEMS." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 137–50. http://dx.doi.org/10.36994/2707-4110-2020-1-28-12.

Full text
Abstract:
In this paper has been improved technique of security of web services against DDOS attacks based on the analysis of service information, which is based on monitoring of session duration spelled out in log files. This will increase the effectiveness of monitoring the security of web applications in distributed information systems after the attack of the first stage of its protection. The algorithm for monitoring the status of system based on log messages that are written to a file during the firewall stage has been proposed. Each message receives information such as web service request time and ip address. Using the time of access to the web service, you can track the attendance, and in the case of sharp differences with the number of visits in the previous intervals, to say about a possible attack. IP addresses us by tracking the number of requests from each request source, tracking who is causing the attack. Investigation of the effectiveness developed web application security monitoring system in distributed information communications systems has shown that at a time when the number of visits is increasing dramatically, the schedule is growing rapidly. This indicates a possible attack. If the current number of visits increases 10 times more than the average per day, the system will notify you. To do this, the data on visits for the year were uploaded to the database and the system was checked when the load increased. From the test results, we were able to verify that as the number of visits for the current hour increased, the system reported an attack. To visually check the operation of the algorithm, a graphical interface was proposed, which shows the state of the system, and a schedule of visits at 3 intervals: per day, per month, per year. Visual inspection allows you to quickly make sure that the conclusion about the attack is not wrong
APA, Harvard, Vancouver, ISO, and other styles
7

Demarquay, G., A. Lothe, JP Royet, N. Costes, G. Mick, F. Mauguière, and P. Ryvlin. "Brainstem changes in 5-HT1A receptor availability during migraine attack." Cephalalgia 31, no. 1 (October 29, 2010): 84–94. http://dx.doi.org/10.1177/0333102410385581.

Full text
Abstract:
Background: Among serotonin receptors, 5-HT1A receptors are implicated in the regulation of central serotoninergic tone and could be involved in the abnormal brain 5-HT turnover suspected in migraineurs. The aim of this study was to investigate 5-HT1A receptors’ availability during migraine attacks. Methods: Ten patients suffering from odor-triggered migraine attacks and 10 control subjects were investigated using positron emission tomography (PET) and [18F]MPPF PET tracer, a selective 5-HT1A antagonist. All subjects underwent calibrated olfactory stimulations prior to the PET study. Results: Four patients developed a migraine attack during the PET study. In these patients, statistical parametrical mapping and region of interest analyses showed an increased [18F]MPPF binding potential (BPND) in the pontine raphe when compared to headache-free migraineurs and control subjects. This ictal change was confirmed at the individual level in each of the four affected patients. In comparison with the headache-free migraineurs, patients with a migraine attack also showed significantly increased [18F]MPPF BPND in the left orbitofrontal cortex, precentral gyrus and temporal pole. No significant change in [18F]MPPF BPND was observed between headache-free migraineurs and controls. Conclusions: Our results emphasize the role of 5HT1A receptors in the pontine raphe nuclei during the early stage of migraine attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Tavana, Madjid, Dawn A. Trevisani, and Dennis T. Kennedy. "A Fuzzy Cyber-Risk Analysis Model for Assessing Attacks on the Availability and Integrity of the Military Command and Control Systems." International Journal of Business Analytics 1, no. 3 (July 2014): 21–36. http://dx.doi.org/10.4018/ijban.2014070102.

Full text
Abstract:
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, the effectiveness of the availability and integrity countermeasure in eliminating the threats, and the financial impact of each attack on the availability and integrity of the assets). However, these measures are often uncertain in real-world problems. The source of uncertainty can be vagueness or ambiguity. Fuzzy logic and fuzzy sets can represent vagueness and ambiguity by formalizing inaccuracies inherent in human decision-making. In this paper, the authors extend the risk assessment literature by including fuzzy measures for the number of attacks on the availability and the integrity, the number of countermeasures for the availability and integrity attacks, and the effectiveness of the availability and integrity countermeasure in eliminating these threats. They analyze the financial impact of each attack on the availability and integrity of the assets and propose a comprehensive cyber-risk assessment system for the Military C2 in the fuzzy environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Naha, Bibek, Siddhartha Banerjee, and Sayanti Mondal. "A SURVEY ON CLOUD-DENIAL OF SERVICE." American Journal of Advanced Computing 1, no. 2 (April 1, 2020): 1–5. http://dx.doi.org/10.15864/ajac.1205.

Full text
Abstract:
Cloud Computing is one of the most nurtured as well as debated topic in today’s world. Billions of data of various fields ranging from personal users to large business enterprises reside in Cloud. Therefore, availability of this huge amount of data and services is of immense importance. The DOS (Denial of Service) attack is a well-known threat to the availability of data in a smaller premise. Whenever, it’s a Cloud environment this simple DOS attack takes the form of DDOS (Distributed Denial of Service) attack. This paper provides a generic insight into the various kinds of DOS as well as DDOS attacks. Moreover, a handful of countermeasures have also been depicted here. In a nutshell, it aims at raising an awareness by outlining a clear picture of the Cloud availability issues.Our paper gives a comparative study of different techniques of detecting DOS.
APA, Harvard, Vancouver, ISO, and other styles
10

Saravanan, A., S. SathyaBama, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "A new framework to alleviate DDoS vulnerabilities in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4163. http://dx.doi.org/10.11591/ijece.v9i5.pp4163-4175.

Full text
Abstract:
In the communication age, the Internet has growing very fast and most industries rely on it. An essential part of Internet, Web applications like online booking, e-banking, online shopping, and e-learning plays a vital role in everyday life. Enhancements have been made in this domain, in which the web servers depend on cloud location for resources. Many organizations around the world change their operations and data storage from local to cloud platforms for many reasons especially the availability factor. Even though cloud computing is considered a renowned technology, it has many challenges, the most important one is security. One of the major issue in the cloud security is Distributed Denial of Service attack (DDoS), which results in serious loss if the attack is successful and left unnoticed. This paper focuses on preventing and detecting DDoS attacks in distributed and cloud environment. A new framework has been suggested to alleviate the DDoS attack and to provide availability of cloud resources to its users. The framework introduces three screening tests VISUALCOM, IMGCOM, and AD-IMGCOM to prevent the attack and two queues with certain constraints to detect the attack. The result of our framework shows an improvement and better outcomes and provides a recovered from attack detection with high availability rate. Also, the performance of the queuing model has been analysed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Availability Attack"

1

Rozo, Osuna Maria Jose. "Mass Shootings and Gun Sales: A Study on the Influence of Red and Blue Power." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7914.

Full text
Abstract:
Mass shootings are one of the most discussed issues in American society. While it is evident who the main victims are, the impact of such an event reaches far beyond the lives that were directly impacted. One of the main effects mass shootings have been found to have is a spike in gun sales (Wallace, 2015; Studert et. al., 2017 ; Turchan et. al., 2017). This finding has been found time and time again by academic and non-academic researchers, and it is one of the most commonly believed ideas regarding the effects of mass shootings (Aish & Keller, 2016). The current study builds on previous research to determine whether a Democratic Government has a moderating effect on the mass shootings - gun sales relationship. There are two main hypotheses. Hypothesis one is that mass shootings increase gun sales. Hypothesis two predicts that when Democrats are in power, the increase in gun sales following a mass shooting is higher than when Republicans are in power. This hypothesis comes from the idea that gun enthusiasts will not only fear attacks, but they will also fear changes in gun regulation when Democrats are in power (Adams & Daniel, 2017). To test this hypothesis, a Democratic Government variable was created, and it measured which party controls the Presidency, and holds majority at the House of Representatives, and the Senate. Using FBI background check information as a proxy for gun sales, OLS regressions determined hypothesis one did not have support, while hypothesis two was partially supported, meaning the interaction between a Democratic Government and mass shootings is relevant to gun sales. It is worth noting that this relationship went in the opposite direction than what was expected, since it was found that Democrats holding office actually lead to a decrease in gun sales following a mass shooting. An explanation for why this might be the case, and why the first hypothesis was not supported is presented. Study limitations and future research directions are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

de, Souza Jaqueline. "Comparison of Liberty Alliance and OpenID regarding their ability to protect the confidentiality, integrity and availability of the users’ information : a study based on the analysis of resistance to common attacks." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4424.

Full text
Abstract:
It is essential to solve the problem due to password fatigue in order to increase the security of the transactions on the Web and secure the users’ account and information. Web Single Sign-On is one of the techniques that have been created to solve these issues. Unfortunately, this method creates new opportunities for hackers. The Liberty Alliance and OpenID are two of the most known Web Single Sign-On frameworks. This work intends to review the strengths and the weaknesses of both regarding their ability to protect the confidentiality, integrity and availability of the users’ information, by studying their aptitude to prevent some of the most dangerous attacks on the web. The analysis of the results shows that Liberty Alliance has created a strong infrastructure in order to mitigate those attacks. Consequently, this framework protects the confidentiality, integrity and availability of the users’ information more efficiently than OpenID. On the other hand, this latter shows significant weaknesses that compromises the confidentiality, integrity and availability of the users’ information.
APA, Harvard, Vancouver, ISO, and other styles
3

"A Model for Calculating Damage Potential in Computer Systems." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53889.

Full text
Abstract:
abstract: For systems having computers as a significant component, it becomes a critical task to identify the potential threats that the users of the system can present, while being both inside and outside the system. One of the most important factors that differentiate an insider from an outsider is the fact that the insider being a part of the system, owns privileges that enable him/her access to the resources and processes of the system through valid capabilities. An insider with malicious intent can potentially be more damaging compared to outsiders. The above differences help to understand the notion and scope of an insider. The significant loss to organizations due to the failure to detect and mitigate the insider threat has resulted in an increased interest in insider threat detection. The well-studied effective techniques proposed for defending against attacks by outsiders have not been proven successful against insider attacks. Although a number of security policies and models to deal with the insider threat have been developed, the approach taken by most organizations is the use of audit logs after the attack has taken place. Such approaches are inspired by academic research proposals to address the problem by tracking activities of the insider in the system. Although tracking and logging are important, it is argued that they are not sufficient. Thus, the necessity to predict the potential damage of an insider is considered to help build a stronger evaluation and mitigation strategy for the insider attack. In this thesis, the question that seeks to be answered is the following: `Considering the relationships that exist between the insiders and their role, their access to the resources and the resource set, what is the potential damage that an insider can cause?' A general system model is introduced that can capture general insider attacks including those documented by Computer Emergency Response Team (CERT) for the Software Engineering Institute (SEI). Further, initial formulations of the damage potential for leakage and availability in the model is introduced. The model usefulness is shown by expressing 14 of actual attacks in the model and show how for each case the attack could have been mitigated.
Dissertation/Thesis
Masters Thesis Computer Science 2019
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Lian, and 張利安. "Practical Attacks against LTE Availability with Low-cost Software-defined Radio." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/df674r.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊工程系
105
As a significant 4G communication technology in modern society, Long Term Evolution (LTE) provides better coverage, spectral efficiency, system capacity, lower latency, higher data rates, and enhanced security, comparing with previous generations, Global System for Mobile Communications and Universal Mobile Telecommunications System. The mutual authentication feature of LTE with cyphering communications basically prevent user equipment (UE) from being attacked by a rogue base station (BS), such as sniffing and spoofing. However, with a rogue BS, a malicious attacker could still leverage unencrypted and essential signaling messages to launch a Denial of Service (DoS) attack to a target UE. By examining all unencrypted signalings initialized before a mutual authentication procedure, this paper proposes a novel availability attack by exploiting reject messages for attach and tracking area update procedures. In particular, the victim UE will be enforced to disconnect with all BSs in the tracking area specified by the rogue BS. Please note that during our attack, the victim UE still searches for another allowed tracking area for connection, which makes our attack more unawareness comparing with existing availability attacks. We practically implement the attack by using open source project, OpenAirInterface (OAI) and low-cost software defined radio, Universal Software Radio Peripheral (USRP). From the observations of experimental results, we offer some suggestions to make such DoS attack more effective.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Availability Attack"

1

New York (State). Legislature. Assembly. Standing Committee on Insurance. Public hearing on insurance availability and affordability in the wake of September 11 and the impact on the region's recovery. [Mineola]: EN-DE Reporting, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

GOVERNMENT, US. An Act to Extend the Period of Availability of Unemployment Assistance under the Robert T. Stafford Disaster Relief and Emergency Assistance Act in the Case of Victims of the Terrorist Attacks of September 11, 2001. [Washington, D.C: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Geetha, S. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lloyd, Ian J. 10. Substantive criminal law provisions. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787556.003.0010.

Full text
Abstract:
This chapter examines the provisions of the Council of Europe’s Convention on Cybercrime to determine the major headings under which computer-related conduct might be prosecuted and to analyse the effectiveness of UK legislation in the field. The focus is on offences against the confidentiality, integrity, and availability of computer data and systems, which essentially refers to computer hacking and to attempts to impair the operation of computer systems through interception of communications, the promulgation of viruses, or the launching of denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Kusumawardhani, Niken, Rezanti Pramana, Nurmala Saputri, and Daniel Suryadarma. Heterogeneous impact of internet availability on female labour market outcomes in an emerging economy: Evidence from Indonesia. 49th ed. UNU-WIDER, 2021. http://dx.doi.org/10.35188/unu-wider/2021/987-7.

Full text
Abstract:
Greater female labour market participation has important positive implications not only for women’s empowerment and the well-being of their families but also for the economy they live in. In this paper, we examine the various effects of internet availability on women’s labour market outcomes in Indonesia. As each worker subgroup tends to respond differently to changes in technology, examining the heterogeneity in the impact of internet availability on female labour market outcomes is central to our research. By constructing a district-level longitudinal dataset covering the period 2007–18, we find that internet availability has only a small significant effect on the female labour force participation rate and no statistically significant effect on the employment rate. However, internet availability increases the probability of women having a full-time job, especially for women aged 15–45 and those with a low level of education. Our study shows that internet availability does not always bring favourable labour market outcomes for women. We find that internet availability lowers the probability of women with a low level of education working in a high-skilled job and in the formal sector. Our results are robust to several robustness checks. Analysis of our qualitative interviews with a subsample of recent mothers supports the conclusion that the ability to be prepared for and attain flexible working conditions are two important values provided by the internet. We argue that a women-friendly working environment and adequate IT infrastructure are crucial elements in maximizing the role of the internet in helping women to achieve more favourable labour market outcomes.
APA, Harvard, Vancouver, ISO, and other styles
6

David, Deirdre. Besieged. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198729617.003.0009.

Full text
Abstract:
In 1966 Pamela was asked by the Daily Telegraph to write about the infamous Moors murders trial in which Myra Hindley and Ian Brady were charged with the torture and murder of five children. Her experience of the trial was so powerful and her feelings about the social damage caused by pornography so strong that she expanded her newspaper article into her most controversial non-fiction work, On Iniquity, published in 1967. Some critics praised her strong moral insistence that the ready availability of pornography had led to the murders; but others attacked her as an enemy of free speech. At the end of the 1960s she visited Auschwitz with Snow and her son Philip and began her most ambitious novel to date: The Survival of the Fittest, which traces the lives of five friends over a period of thirty years—from the 1930s to the late 1960s.
APA, Harvard, Vancouver, ISO, and other styles
7

Greve, Carsten, and Graeme A. Hodge. Private Finance. Edited by Bent Flyvbjerg. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198732242.013.16.

Full text
Abstract:
Public–private partnerships are now well established around the globe, and private finance plays a significant role in long-term infrastructure contracts. Reasons for wanting private finance in megaprojects have varied between countries and changed over time, and it will continue to attract governments who are either unable or unwilling to publicly finance major projects. The availability of private finance has seen many megaprojects delivered when they would not otherwise have gone ahead. In the same way that a private credit card can be used with an inappropriately high interest rate to purchase today what is paid for tomorrow, so too can private finance amount to little more than a megacredit card for eager governments eyeing off a desirable, immediate, infrastructure transaction. There is increasing academic evidence about how well private finance works, but the verdict is still out because the evidence is not conclusive.
APA, Harvard, Vancouver, ISO, and other styles
8

Nielsen-Saines, Karin. Antiretroviral Therapy in Children and Newborns. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190493097.003.0027.

Full text
Abstract:
HIV-infected infants and children have a different, more progressive disease course compared to that of adults given that early infection leads to sustained, high-magnitude viremia with significant seeding of reservoirs in the first months of life. Early diagnosis of HIV infection is pivotal in the management of infants and prevention of HIV-associated morbidity and mortality. The availability of potent pediatric antiretroviral formulations encompassing different classes of drugs for infected infants and young children is limited. Significant advancements have been achieved in the area of infant post-exposure prophylaxis. Early antiretroviral treatment is still the mainstay of pediatric HIV infection, particularly for infants younger than age 12 months, but it is also highly recommended for older children. Early treatment of young infants diagnosed soon after birth appears to be the best approach to reduce the seeding of viral reservoirs and potentially attain prolonged periods of HIV remission off antiretrovirals.
APA, Harvard, Vancouver, ISO, and other styles
9

1953-, Bascetta Cynthia A., and United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on National Security and Foreign Affairs, eds. September 11: HHS needs to ensure the availability of health screening and monitoring for all responders : report to Congressional Requestors. Washington, D.C: U.S. Government Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chałubińska-Jentkiewicz, Katarzyna, Mirosław Karpiuk, and Jarosław Kostrubiec. The Legal Status of Public Entities in the Field of Cybersecurity in Poland. Institute for Local Self-Government Maribor, 2021. http://dx.doi.org/10.4335/2021.5.

Full text
Abstract:
This monograph provides an in-depth look at the organisation of the national cybersecurity system and the tasks and responsibilities of the entities operating within this system. The objective of the national cybersecurity system is to ensure cybersecurity at the national level, including the uninterrupted provision of essential services and digital services by achieving the appropriate level of security of the information systems used to provide these services and ensuring the handling of incidents. The EU legislators have been explicit in noting that the scale, frequency, and impact of cybersecurity incidents is growing, putting the functioning of information systems at a serious risk. These systems can be targeted by malicious attacks aimed at damaging or disrupting their operations. Such incidents can hamper the functioning of public administration and business, and cause substantial financial losses, undermine user confidence, and lead to considerable losses in national economies, as well as the EU economy at large. Defined as the resilience of information systems against actions which compromise the confidentiality, integrity, availability, and authenticity of processed data, or the related services provided by those information systems, cybersecurity is an area of concern for private and public entities alike. As far as the public-law sphere is concerned, cybersecurity tasks and powers are performed and exercised by government administration, both central and regional, as well as local and regional governments. At the core of the national cybersecurity system in Poland are the public entities which make Poland's cybersecurity policy with the aim of increasing the level of protection against cyberthreats. Despite having different statuses, tasks, and powers, and places in the public sphere, they share the objective of ensuring cyberspace security.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Availability Attack"

1

Pérez-Solà, Cristina, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joaquin Garcia-Alfaro. "LockDown: Balance Availability Attack Against Lightning Network Channels." In Financial Cryptography and Data Security, 245–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiong, Cheng-Jie, Yan-Fu Li, Min Xie, Szu-Hui Ng, and Thong-Ngee Goh. "Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack." In Advances in Software Engineering, 313–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10619-4_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Min, Byoung Joon, Seung Hwan Yoo, Jong Ho Ryu, and Dong Il Seo. "Return on Security Investment Against Cyber Attacks on Availability." In Computational Science and Its Applications - ICCSA 2006, 270–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751588_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Mingchao, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, and Pramod Viswanath. "Coded Merkle Tree: Solving Data Availability Attacks in Blockchains." In Financial Cryptography and Data Security, 114–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eckhardt, Jonas, Tobias Mühlbauer, Musab AlTurki, José Meseguer, and Martin Wirsing. "Stable Availability under Denial of Service Attacks through Formal Patterns." In Fundamental Approaches to Software Engineering, 78–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28872-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kharchenko, Vyacheslav, Alaa Mohammed Abdul-Hadi, Artem Boyarchuk, and Yurij Ponochovny. "Web Systems Availability Assessment Considering Attacks on Service Configuration Vulnerabilities." In Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland, 275–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07013-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sumra, Irshad Ahmed, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan. "Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey." In Advances in Intelligent Systems and Computing, 51–61. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-158-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kharchenko, Vyacheslav, Yuriy Ponochovnyi, Al-Khafaji Ahmed Waleed, Artem Boyarchuk, and Ievgen Brezhniev. "The Availability Models of Two-Zone Physical Security System Considering Cyber Attacks." In Theory and Applications of Dependable Computer Systems, 325–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48256-5_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jung, Sung-Min, Jun-Kwon Jung, Tae-Kyung Kim, and Tai-Myoung Chung. "A Study on the Resource Management against Availability Attacks in Cloud Computing." In Lecture Notes in Electrical Engineering, 479–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41671-2_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hewage, Kasun, and Thiemo Voigt. "Poster Abstract: An Experimental Study of Attacks on the Availability of Glossy." In Lecture Notes in Electrical Engineering, 103–7. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03071-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Availability Attack"

1

Mikhaylov, Konstantin, Radek Fujdiak, Ari Pouttu, Voznak Miroslav, Lukas Malina, and Petr Mlynek. "Energy Attack in LoRaWAN." In ARES '19: 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3339252.3340525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gallon, Laurent, and Jean Jacques Bascou. "Using CVSS in Attack Graphs." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deng, Xianglin, and Malcolm Shore. "Advanced Flooding Attack on a SIP Server." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allodi, Luca, and Fabio Massacci. "Attack Potential in Impact and Complexity." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3098965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Izu, Tetsuya, Masahiko Takenaka, and Takeshi Shimoyama. "Analysis on Bleichenbacher's Forgery Attack." In The Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Keynote 3: Topological Analysis of Network Attack Vulnerability." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Changwei, Anoop Singhal, and Duminda Wijesekera. "Using Attack Graphs in Forensic Examinations." In 2012 Seventh International Conference on Availability, Reliability and Security (ARES). IEEE, 2012. http://dx.doi.org/10.1109/ares.2012.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hacks, Simon, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, and Ariadni Michalitsi Psarrou. "Integrating Security Behavior into Attack Simulations." In ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3465481.3470475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Demir, Kubilay, and Neeraj Suri. "Towards DDoS Attack Resilient Wide Area Monitoring Systems." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3103164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mukherjee, Preetam, and Chandan Mazumdar. "Attack Difficulty Metric for Assessment of Network Security." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3232817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography