Academic literature on the topic 'CIA attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CIA attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CIA attacks"

1

Plummer, Frank. "Healthcare’s Biggest Cyber Attacks." ITNOW 65, no. 1 (2023): 12–13. http://dx.doi.org/10.1093/combul/bwad006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeffreys-Jones, Rhodri, and Anne Hessing Cahn. "Killing Detente: The Right Attacks the CIA." American Historical Review 105, no. 2 (2000): 578. http://dx.doi.org/10.2307/1571542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zelikow, Philip, and Anne Hessing Cahn. "Killing Détente: The Right Attacks the CIA." Foreign Affairs 78, no. 3 (1999): 138. http://dx.doi.org/10.2307/20049308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hahn, Peter L., and Anne Hessing Cahn. "Killing Detente: The Right Attacks the CIA." Journal of American History 87, no. 1 (2000): 314. http://dx.doi.org/10.2307/2568067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.

Full text
Abstract:
With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures deve
APA, Harvard, Vancouver, ISO, and other styles
6

Ariffin, M. Zainal, and Hildhan Fauzul Hakim. "USE OF EXPERT SYSTEMS TO PREDICT ATTACKS ON WEB-BASED SERVERS." Jurnal Inovasi Teknologi dan Edukasi Teknik 4, no. 2 (2024): 3. http://dx.doi.org/10.17977/um068.v4.i2.2024.3.

Full text
Abstract:
Cyber-attacks are on the rise, and various types of threats can compromise data confidentiality, integrity, and availability. Reports from the National Cyber and Crypto Agency (BSSN) and research by Check Point indicate a significant increase in cyber-attacks. These attacks often occur due to a lack of understanding and security testing of systems. In this context, the fundamental rules of the CIA (Confidentiality, Integrity, and Availability) become a crucial foundation for system security. Self-testing through penetration testing methods emerges as a solution to identify security vulnerabili
APA, Harvard, Vancouver, ISO, and other styles
7

Jasim Ali, Teba Ali, and Muna M. Taher Jawhar. "Detecting network attacks model based on a convolutional neural network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3072. http://dx.doi.org/10.11591/ijece.v13i3.pp3072-3078.

Full text
Abstract:
<p>Due to the increasing use of networks at present, Internet systems have raised many security problems, and statistics indicate that the rate of attacks or intrusions has increased excessively annually, and in the event of any malicious attack on network vulnerabilities or information systems, it may lead to serious disasters, violating policies on network security, i.e., “confidentiality, integrity, and availability” (CIA). Therefore, many detection systems, such as the intrusion detection system, appeared. In this paper, we built a system that detects network attacks using the latest
APA, Harvard, Vancouver, ISO, and other styles
8

Teba, Ali Jasim Ali, and M. Taher Jawhar Muna. "Detecting network attacks model based on a convolutional neural network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3072–78. https://doi.org/10.11591/ijece.v13i3.pp3072-3078.

Full text
Abstract:
Due to the increasing use of networks at present, Internet systems have raised many security problems, and statistics indicate that the rate of attacks or intrusions has increased excessively annually, and in the event of any malicious attack on network vulnerabilities or information systems, it may lead to serious disasters, violating policies on network security, i.e., “confidentiality, integrity, and availability” (CIA). Therefore, many detection systems, such as the intrusion detection system, appeared. In this paper, we built a system that detects network attacks using the lat
APA, Harvard, Vancouver, ISO, and other styles
9

Amin, Raid W., Hakki Erhan Sevil, Salih Kocak, Guillermo Francia, and Philip Hoover. "The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study." Information 12, no. 1 (2020): 2. http://dx.doi.org/10.3390/info12010002.

Full text
Abstract:
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators (URLs), which were classified into one of 5 categories: benign, phishing, malware, spam, or defacement. The disease surveillance software SaTScanTM was used to perform a spatial analysis of the country of origin for each cyber attack. It allowed the identification of spatial and space-time clusters of locations with unusually high counts or rate
APA, Harvard, Vancouver, ISO, and other styles
10

Tahreem, Tahir. "Comparison of protocols to counter CIA attacks in crypto currency." Comparison of protocols to counter CIA attacks in crypto currency 1, no. 06/07/2021 (2021): 14. https://doi.org/10.5281/zenodo.5076174.

Full text
Abstract:
Since crypto currency has become a real talk and there has been discussions on decentralization, secure data storage, transfer, and block chain security but none of the previous studies has talked about the main reason why attacks occur in crypto currency. The study in this paper systematically identifies what is the cause behind attacks and breaches in crypto currency. Our findings depict that how these breaches can be countered using single protocol algorithm. This study also sheds light on future directions of research, and practices in the crypto currency security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CIA attacks"

1

Oseku-Afful, Thomas. "The use of Big Data Analytics to protect Critical Information Infrastructures from Cyber-attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59779.

Full text
Abstract:
Unfortunately, cyber-attacks, which are the consequence of our increasing dependence on digital technology, is a phenomenon that we have to live with today. As technology becomes more advanced and complex, so have the types of malware that are used in these cyber-attacks. Currently, targeted cyber-attacks directed at CIIs such as financial institutions and telecom companies are on the rise. A particular group of malware known as APTs, which are used for targeted attacks, are very difficult to detect and prevent due to their sophisticated and stealthy nature. These malwares are able to attack a
APA, Harvard, Vancouver, ISO, and other styles
2

Kusakabe, Jiro. "Complement 5 inhibition ameliorates hepatic ischemia/reperfusion injury in mice, dominantly via the C5a-mediated cascade." Kyoto University, 2020. http://hdl.handle.net/2433/254516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spiller, David C. "The Case of Weapons of Mass Destruction at the Outset of the Iraq War." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/54.

Full text
Abstract:
My thesis looks into the events leading up to the 2003 U.S. invasion of Iraq. In particular I investigate the intelligence regarding the presence of weapons of mass destruction in Iraq and how that intelligence was interpreted by the Bush administration. Furthermore, I look at how the case for war was presented by the Bush administration to the rest of the world and whether or not the administration’s reasoning was justified. In conclusion I assess the underlying motive for the war in Iraq and whether or not it was in the best interest of the United States of America.
APA, Harvard, Vancouver, ISO, and other styles
4

Afonso, Eduardo José. "Para norte-americano ver. Adidos trabalhistas e operários brasileiros (1943/1952)." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/8/8138/tde-18042011-142219/.

Full text
Abstract:
Este trabalho analisa documentos restritos e secretos do Departamento de Estado norte-americano, principalmente os Relatórios Mensais do Trabalho, relatórios do FBI, da CIA e do Departamento do Trabalho dos Estados Unidos, e procura descrever a ação dos Adidos Trabalhistas Americanos e Ingleses no Brasil, no período de 1943 a 1952, como elementos-chave na política externa dos Estados Unidos, direcionada à possível intervenção em assuntos internos brasileiros. O presente estudo destaca, igualmente, a tarefa de líderes sindicais norte-americanos, ligados à Federação Americana do Trabalho e ao De
APA, Harvard, Vancouver, ISO, and other styles
5

St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.

Full text
Abstract:
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to th
APA, Harvard, Vancouver, ISO, and other styles
6

Malmgren, Amelie, and Michelle Fabiana Palharini. "‘Martyrs and Heroines’ vs. ‘Victims and Suicide Attackers’. A Critical Discourse Analysis of YPJ’s and the UK media representations of the YPJ’s ideological agency." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23746.

Full text
Abstract:
The present thesis compares media representations of Yekîneyên Parastina Jin (YPJ or the Women’s Protection Units), an all-female Kurdish military organisation, in British media versus the organisation’s own media outlets, with the aim to see how they differ, more specifically in terms of representations of their ideological agency. By utilizing critical discourse analysis (CDA) in combination with postcolonial theory, the media construction of four soldiers’ deaths have been scrutinized in 30 media texts in order to provide a deeper understanding of the hegemonic discourses and sociocultural
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Si-Wun, and 陳熙文. "The San Cai Sword 3D Interactive Educational Game Prototyping-A Case Study of Upper, Downward and Forward Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/3y4w96.

Full text
Abstract:
碩士<br>國立體育大學<br>運動科學研究所<br>102<br>The San Cai Sword is a treasure of Chinese sword forms. The form is valuable in self-defense, keeping health and artistry. This study dedicates in creating a game prototype of San Cai Jian with some game-factors like interactive, challenging and interesting contents to attract users. The development of this game uses Shiva 3D as the game engine and create 3D animations by 3Ds max 2013, Motion Builder and Vicon motion capture system to present the moves of San Cai Jian. This study emulates a real Chinese sword fighting environment with 3 dimensions. Users contr
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "CIA attacks"

1

Suárez, Carlos O. Gemelas-Pentágono & CIA, autoatentados: El pacto oscuro detrás del 11-S. Cartago, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thiessen, Marc A. Courting disaster: How the CIA kept America safe and how Barack Obama is inviting the next attack. Regnery Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thiessen, Marc A. Courting disaster: How the CIA kept America safe and how Barack Obama is inviting the next attack. Regnery Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thiessen, Marc A. Courting disaster: How the CIA kept America safe and how Barack Obama is inviting the next attack. Regnery Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bülow, Andreas von. La CIA y el 11 de septiembre: El terrorismo internacional y el papel de los servicios secretos. Ellago Ediciones, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, John. La célula terrorista: [la conspiración del 11 de septiembre, y por qué el FBI y la CIA no lograron frustrala]. Editorial Diana, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Keeley, Jennifer. Deterring and investigating attack: The role of the FBI and CIA. Lucent Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weldon, Curt. Countdown to Terror: The Top Secret Information that Could Prevent the Next Terrorist Attack on America...And How the CIA has Ignored it. Regnery Publishing, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weldon, Curt. Countdown to terror: The top-secret information that could prevent the next terrorist attack on America-- and how the CIA has ignored it. Regnery Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

King, Stephen. Historias fantásticas. Plaza & Janés Editores, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "CIA attacks"

1

Rahul, Sriramoju, U. Kumaran, Thippaluru Tharun Sai, Tripuramallu Pramodh, and Sundaravadivazhagn Balasubramanian. "Preventing SQL Injection Attacks on Web Applications for Enhanced Security and CIA Triad Compliance." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6103-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cohen, Ronen A. "The CIA, SAVAK, and Mossad Connections with the Forqan." In Revolution Under Attack. Palgrave Macmillan US, 2015. http://dx.doi.org/10.1057/9781137502506_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.

Full text
Abstract:
AbstractDetection of unknown attacks is challenging due to the lack of exemplary attack vectors. However, previously unknown attacks are a significant danger for systems due to a lack of tools for protecting systems against them, especially in fast-evolving Internet of Things (IoT) technology. The most widely used approach for malicious behaviour of the monitored system is detecting anomalies. The vicious behaviour might result from an attack (both known and unknown) or accidental breakdown. We present a Net Anomaly Detector (NAD) system that uses one-class classification Machine Learning tech
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Long, Yanan Li, and Qiang Tang. "CCA Updatable Encryption Against Malicious Re-encryption Attacks." In Advances in Cryptology – ASIACRYPT 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64840-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

D’Anvers, Jan-Pieter, Qian Guo, Thomas Johansson, Alexander Nilsson, Frederik Vercauteren, and Ingrid Verbauwhede. "Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes." In Public-Key Cryptography – PKC 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17259-6_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar Pandey, Sumit, Santanu Sarkar, and Mahabir Prasad Jhanwar. "Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack." In Security, Privacy, and Applied Cryptography Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34416-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Qian, Thomas Johansson, and Jing Yang. "A Novel CCA Attack Using Decryption Errors Against LAC." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34578-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zheng, Beilei, Jianan Gu, and Chuliang Weng. "CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29611-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guo, Qian, Thomas Johansson, and Paul Stankovski. "A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors." In Advances in Cryptology – ASIACRYPT 2016. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53887-6_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Haodong, Zhi Ma, and Zhenfeng Zhang. "Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query." In Advances in Cryptology – ASIACRYPT 2023. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8730-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CIA attacks"

1

Kapil, Divya, Varsha Mittal, and DurgaPrasad Gangodkar. "Evaluating Machine Learning Approaches for DDoS Attack Detection Using CIC-DDoS2019." In 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech). IEEE, 2024. https://doi.org/10.1109/icacctech65084.2024.00127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Mingyang, Wei Zhang, Yadong Wang, et al. "CFA: Consistent Feature Attribution for Black-Box Adversarial Attack Against Object Detection." In 2024 China Automation Congress (CAC). IEEE, 2024. https://doi.org/10.1109/cac63892.2024.10864831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Durr, C. L., and J. A. Beavers. "Immersion Studies of Candidate Container Alloys for the Tuff Repository." In CORROSION 1992. NACE International, 1992. https://doi.org/10.5006/c1992-92080.

Full text
Abstract:
Abstract Immersion corrosion studies, funded by The Nuclear Regulatory Commission, were performed on candidate container alloys for the Tuff Repository. Two copper-base alloys (CDA 102 and CDA 715) and two Fe-Cr-Ni alloys (304L and 825) were evaluated in simulated J-13 well water for periods of three and eighteen months. The general, pitting, crevice, and stress-corrosion behavior were evaluated by electrochemical, gravimetric, and metallographic techniques. Results of the three-month immersion studies at 90°C showed low general corrosion rates for each of the alloys. Incipient pits were found
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Beibei, Lang Li, Yuehan Xu, Tao Wang, and Guihua Zeng. "Light source attacks on CMOS-based QRNGs." In Fourth International Conference on Computational Imaging (CITA 2024), edited by Xiaopeng Shao. SPIE, 2025. https://doi.org/10.1117/12.3056304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khurana, Shivam, Pooja Varma, Vishal B. Ambhore, C. Mukuntharaj, Himanshu Makhija, and A. Josphin Selsia. "A Novel Enhanced Cooperative Blackmailing Attack Detection System (Ebad) for SA-CBA Mitigation." In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET). IEEE, 2024. https://doi.org/10.1109/icraset63057.2024.10894769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zy, Ahmad Turmudi, Amali, Anggi Muhammad Rifa'i, Antika Zahrotul Kamalia, and Asep Arwan Sulaeman. "Detecting DDoS Attacks Through Decision Tree Analysis: An EDA Approach with the CIC DDoS 2019 Dataset." In 2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2024. http://dx.doi.org/10.1109/icitisee63424.2024.10730435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Jie, and Hui-Ming Wang. "Detecting Ranging Spoofing Attacks on IEEE 802.15.4z." In 2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops). IEEE, 2024. http://dx.doi.org/10.1109/icccworkshops62562.2024.10693819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yanan, Huan Huang, Hongliang Zhang, et al. "Disco Intelligent Omni-Surface Based Fully-Passive Jamming Attacks." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10682037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gu, Jiayi, Jiangrun Cai, and Chaoqun Yang. "Detecting Multiple Attacks in ISAC-CPS Via PMBM Filter." In 2024 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2024. http://dx.doi.org/10.1109/iccc62479.2024.10681805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Sathsh A. P., Danny DeJesus, and Fataneh Farahani. "Graph Neural Network-Based Edge Classification Approach for Detection of Cybersecurity Attacks." In 2025 IEEE Conference on Artificial Intelligence (CAI). IEEE, 2025. https://doi.org/10.1109/cai64502.2025.00174.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CIA attacks"

1

Preparation for and Response to a Ransomware Attack in the Organization: Cybersecurity Best Practices. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013317.

Full text
Abstract:
This document presents a series of best practices for improving the organizations ability to prepare for and respond to a ransomware event. The text is intended to assist the Chief Information Security Officer (CISO) and decision-makers within the organization in preparing for and coping with a ransomware event in the organization. Other actors that may gain added value from this document are the Chief Information Officer (CIO), a Cybersecurity Methodologies Specialist, a Cybersecurity Implementer Specialist, a Cybersecurity Technology Specialist (Cybersecurity Architect), and data/teleprocess
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!