Academic literature on the topic 'CIA attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CIA attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CIA attacks"
Plummer, Frank. "Healthcare’s Biggest Cyber Attacks." ITNOW 65, no. 1 (2023): 12–13. http://dx.doi.org/10.1093/combul/bwad006.
Full textJeffreys-Jones, Rhodri, and Anne Hessing Cahn. "Killing Detente: The Right Attacks the CIA." American Historical Review 105, no. 2 (2000): 578. http://dx.doi.org/10.2307/1571542.
Full textZelikow, Philip, and Anne Hessing Cahn. "Killing Détente: The Right Attacks the CIA." Foreign Affairs 78, no. 3 (1999): 138. http://dx.doi.org/10.2307/20049308.
Full textHahn, Peter L., and Anne Hessing Cahn. "Killing Detente: The Right Attacks the CIA." Journal of American History 87, no. 1 (2000): 314. http://dx.doi.org/10.2307/2568067.
Full textMitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Full textAriffin, M. Zainal, and Hildhan Fauzul Hakim. "USE OF EXPERT SYSTEMS TO PREDICT ATTACKS ON WEB-BASED SERVERS." Jurnal Inovasi Teknologi dan Edukasi Teknik 4, no. 2 (2024): 3. http://dx.doi.org/10.17977/um068.v4.i2.2024.3.
Full textJasim Ali, Teba Ali, and Muna M. Taher Jawhar. "Detecting network attacks model based on a convolutional neural network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3072. http://dx.doi.org/10.11591/ijece.v13i3.pp3072-3078.
Full textTeba, Ali Jasim Ali, and M. Taher Jawhar Muna. "Detecting network attacks model based on a convolutional neural network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3072–78. https://doi.org/10.11591/ijece.v13i3.pp3072-3078.
Full textAmin, Raid W., Hakki Erhan Sevil, Salih Kocak, Guillermo Francia, and Philip Hoover. "The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study." Information 12, no. 1 (2020): 2. http://dx.doi.org/10.3390/info12010002.
Full textTahreem, Tahir. "Comparison of protocols to counter CIA attacks in crypto currency." Comparison of protocols to counter CIA attacks in crypto currency 1, no. 06/07/2021 (2021): 14. https://doi.org/10.5281/zenodo.5076174.
Full textDissertations / Theses on the topic "CIA attacks"
Oseku-Afful, Thomas. "The use of Big Data Analytics to protect Critical Information Infrastructures from Cyber-attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59779.
Full textKusakabe, Jiro. "Complement 5 inhibition ameliorates hepatic ischemia/reperfusion injury in mice, dominantly via the C5a-mediated cascade." Kyoto University, 2020. http://hdl.handle.net/2433/254516.
Full textSpiller, David C. "The Case of Weapons of Mass Destruction at the Outset of the Iraq War." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/54.
Full textAfonso, Eduardo José. "Para norte-americano ver. Adidos trabalhistas e operários brasileiros (1943/1952)." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/8/8138/tde-18042011-142219/.
Full textSt-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Full textMalmgren, Amelie, and Michelle Fabiana Palharini. "‘Martyrs and Heroines’ vs. ‘Victims and Suicide Attackers’. A Critical Discourse Analysis of YPJ’s and the UK media representations of the YPJ’s ideological agency." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23746.
Full textChen, Si-Wun, and 陳熙文. "The San Cai Sword 3D Interactive Educational Game Prototyping-A Case Study of Upper, Downward and Forward Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/3y4w96.
Full textBooks on the topic "CIA attacks"
Suárez, Carlos O. Gemelas-Pentágono & CIA, autoatentados: El pacto oscuro detrás del 11-S. Cartago, 2008.
Find full textThiessen, Marc A. Courting disaster: How the CIA kept America safe and how Barack Obama is inviting the next attack. Regnery Pub., 2010.
Find full textThiessen, Marc A. Courting disaster: How the CIA kept America safe and how Barack Obama is inviting the next attack. Regnery Pub., 2010.
Find full textThiessen, Marc A. Courting disaster: How the CIA kept America safe and how Barack Obama is inviting the next attack. Regnery Pub., 2010.
Find full textBülow, Andreas von. La CIA y el 11 de septiembre: El terrorismo internacional y el papel de los servicios secretos. Ellago Ediciones, 2006.
Find full textMiller, John. La célula terrorista: [la conspiración del 11 de septiembre, y por qué el FBI y la CIA no lograron frustrala]. Editorial Diana, 2004.
Find full textKeeley, Jennifer. Deterring and investigating attack: The role of the FBI and CIA. Lucent Books, 2004.
Find full textWeldon, Curt. Countdown to Terror: The Top Secret Information that Could Prevent the Next Terrorist Attack on America...And How the CIA has Ignored it. Regnery Publishing, Inc., 2005.
Find full textWeldon, Curt. Countdown to terror: The top-secret information that could prevent the next terrorist attack on America-- and how the CIA has ignored it. Regnery Pub., 2005.
Find full textBook chapters on the topic "CIA attacks"
Rahul, Sriramoju, U. Kumaran, Thippaluru Tharun Sai, Tripuramallu Pramodh, and Sundaravadivazhagn Balasubramanian. "Preventing SQL Injection Attacks on Web Applications for Enhanced Security and CIA Triad Compliance." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6103-6_8.
Full textCohen, Ronen A. "The CIA, SAVAK, and Mossad Connections with the Forqan." In Revolution Under Attack. Palgrave Macmillan US, 2015. http://dx.doi.org/10.1057/9781137502506_5.
Full textKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Full textChen, Long, Yanan Li, and Qiang Tang. "CCA Updatable Encryption Against Malicious Re-encryption Attacks." In Advances in Cryptology – ASIACRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64840-4_20.
Full textD’Anvers, Jan-Pieter, Qian Guo, Thomas Johansson, Alexander Nilsson, Frederik Vercauteren, and Ingrid Verbauwhede. "Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes." In Public-Key Cryptography – PKC 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17259-6_19.
Full textKumar Pandey, Sumit, Santanu Sarkar, and Mahabir Prasad Jhanwar. "Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack." In Security, Privacy, and Applied Cryptography Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34416-9_5.
Full textGuo, Qian, Thomas Johansson, and Jing Yang. "A Novel CCA Attack Using Decryption Errors Against LAC." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34578-5_4.
Full textZheng, Beilei, Jianan Gu, and Chuliang Weng. "CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29611-7_9.
Full textGuo, Qian, Thomas Johansson, and Paul Stankovski. "A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors." In Advances in Cryptology – ASIACRYPT 2016. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53887-6_29.
Full textJiang, Haodong, Zhi Ma, and Zhenfeng Zhang. "Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query." In Advances in Cryptology – ASIACRYPT 2023. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8730-6_14.
Full textConference papers on the topic "CIA attacks"
Kapil, Divya, Varsha Mittal, and DurgaPrasad Gangodkar. "Evaluating Machine Learning Approaches for DDoS Attack Detection Using CIC-DDoS2019." In 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech). IEEE, 2024. https://doi.org/10.1109/icacctech65084.2024.00127.
Full textLi, Mingyang, Wei Zhang, Yadong Wang, et al. "CFA: Consistent Feature Attribution for Black-Box Adversarial Attack Against Object Detection." In 2024 China Automation Congress (CAC). IEEE, 2024. https://doi.org/10.1109/cac63892.2024.10864831.
Full textDurr, C. L., and J. A. Beavers. "Immersion Studies of Candidate Container Alloys for the Tuff Repository." In CORROSION 1992. NACE International, 1992. https://doi.org/10.5006/c1992-92080.
Full textZhang, Beibei, Lang Li, Yuehan Xu, Tao Wang, and Guihua Zeng. "Light source attacks on CMOS-based QRNGs." In Fourth International Conference on Computational Imaging (CITA 2024), edited by Xiaopeng Shao. SPIE, 2025. https://doi.org/10.1117/12.3056304.
Full textKhurana, Shivam, Pooja Varma, Vishal B. Ambhore, C. Mukuntharaj, Himanshu Makhija, and A. Josphin Selsia. "A Novel Enhanced Cooperative Blackmailing Attack Detection System (Ebad) for SA-CBA Mitigation." In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET). IEEE, 2024. https://doi.org/10.1109/icraset63057.2024.10894769.
Full textZy, Ahmad Turmudi, Amali, Anggi Muhammad Rifa'i, Antika Zahrotul Kamalia, and Asep Arwan Sulaeman. "Detecting DDoS Attacks Through Decision Tree Analysis: An EDA Approach with the CIC DDoS 2019 Dataset." In 2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2024. http://dx.doi.org/10.1109/icitisee63424.2024.10730435.
Full textGao, Jie, and Hui-Ming Wang. "Detecting Ranging Spoofing Attacks on IEEE 802.15.4z." In 2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops). IEEE, 2024. http://dx.doi.org/10.1109/icccworkshops62562.2024.10693819.
Full textZhang, Yanan, Huan Huang, Hongliang Zhang, et al. "Disco Intelligent Omni-Surface Based Fully-Passive Jamming Attacks." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10682037.
Full textGu, Jiayi, Jiangrun Cai, and Chaoqun Yang. "Detecting Multiple Attacks in ISAC-CPS Via PMBM Filter." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10681805.
Full textKumar, Sathsh A. P., Danny DeJesus, and Fataneh Farahani. "Graph Neural Network-Based Edge Classification Approach for Detection of Cybersecurity Attacks." In 2025 IEEE Conference on Artificial Intelligence (CAI). IEEE, 2025. https://doi.org/10.1109/cai64502.2025.00174.
Full textReports on the topic "CIA attacks"
Preparation for and Response to a Ransomware Attack in the Organization: Cybersecurity Best Practices. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013317.
Full text