Academic literature on the topic 'Computer attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer attack"
Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, and Muhammad Nur Faiz. "A Classification Data Packets Using the Threshold Method for Detection of DDoS." Journal of Innovation Information Technology and Application (JINITA) 6, no. 1 (June 28, 2024): 28–36. http://dx.doi.org/10.35970/jinita.v6i1.2224.
Full textvan Heerden, R. P., B. Irwin, I. D. Burke, and L. Leenen. "A Computer Network Attack Taxonomy and Ontology." International Journal of Cyber Warfare and Terrorism 2, no. 3 (July 2012): 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.
Full textParadise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (January 28, 2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.
Full textRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Full textGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Full textWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Full textSun, Fei Xian. "Danger Theory Based Risk Evaluation Model for Smurf Attacks." Key Engineering Materials 467-469 (February 2011): 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.
Full textKhaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (August 18, 2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.
Full textLi, Biao. "Research on Computer Network Security and Prevention Strategy." Applied Mechanics and Materials 608-609 (October 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.
Full textMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Full textDissertations / Theses on the topic "Computer attack"
Mowery, Keaton. "Beneath the Attack Surface." Thesis, University of California, San Diego, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3712726.
Full textComputer systems are often analyzed as purely virtual artifacts, a collection of software operating on a Platonic ideal of a computer. When software is executed, it runs on actual hardware: an increasingly complex web of analog physical components and processes, cleverly strung together to present an illusion of pure computation. When an abstract software system is combined with individual hardware instances to form functioning systems, the overall behavior varies subtly with the hardware. These minor variations can change the security and privacy guarantees of the entire system, in both beneficial and harmful ways. We examine several such security effects in this dissertation.
First, we look at the fingerprinting capability of JavaScript and HTML5: when invoking existing features of modern browsers, such as JavaScript execution and 3-D graphics, how are the results affected by underlying hardware, and how distinctive is the resulting fingerprint?
Second, we discuss AES side channel timing attacks, a technique to extract information from AES encryption running on hardware. We present several reasons why we were unable to reproduce this attack against modern hardware and a modern browser.
Third, we examine positive uses of hardware variance: namely, seeding Linux's pseudorandom number generator at kernel initialization time with true entropy gathered during early boot. We examine the utility of these techniques on a variety of embedded devices, and give estimates for the amount of entropy each can generate.
Lastly, we evaluate a cyberphysical system: one which combines physical processes and analog sensors with software control and interpretation. Specifically, we examine the Rapiscan Secure~1000 backscatter X-ray full-body scanner, a device for looking under a scan subject's clothing, discovering any contraband secreted about their person. We present a full security analysis of this system, including its hardware, software, and underlying physics, and show how an adaptive, motivated adversary can completely subvert the scan to smuggle contraband, such as knives, firearms, and plastic explosives, past a Secure~1000 checkpoint. These attacks are entirely based upon understanding the physical processes and sensors which underlie this cyberphysical system, and involve adjusting the contraband's location and shape until it simply disappears.
Hersén, Nicklas. "Measuring Coverage of Attack Simulations on MAL Attack Graphs." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292640.
Full textÖvergången från traditionella medier till digitala plattformar har lett till en ökad hotbild mot digital infrastruktur. Vikten av att designa säkra plattformar och enheter för att skydda känslig information har lett till framkomsten av nya strängare säkerhetskrav. Hotmodellering är en process med syfte att förebygga att svagheter i ett system utnyttjas av externa parter genom att identifiera brister i systemet. Meta Attack Language är ett hotmodelleringsspråk med stöd för simulering av specifika attack scenarion genom attacksimuleringar. I nuläget finns inget stöd för insamling av täckningsdata från dessa simuleringar. Syftet med detta arbete är att utveckla en tilläggstjänst för insamling av täckningsdata i syfte att underlätta hotmodelleringsprocessen. Den utvecklade tillägstjänsten kan ge en uppskattning av hur väl en modell täcks av en mängd simuleringar. Täckningsvärderna som används av tilläggstjänsten är anpassningar av befintliga mätvärden som används inom uppskattning av källkods- och modelltäckning. Nuvarande implementation har ett flertal begränsningar gällande presentationen av viss typ av data, till exempel exponentiellt växande mätvärden. Detta beror på att modellerna inte är anpassade för denna typ av testning.
Fang, Pengcheng. "REPTRACKER:TOWARDS AUTOMATIC ATTACK INVESTIGATION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1550696995596089.
Full textTajdini, M. "Developing an advanced IPv6 evasion attack detection framework." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9864/.
Full textVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Full textCullum, James J. "Performance analysis of automated attack graph generation software." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FCullum.pdf.
Full textThesis Advisor(s): Cynthia Irvine, Timothy Levin. "December 2006." Includes bibliographical references (p. 137- 138). Also available in print.
Harris, Rae. "Spectre: Attack and Defense." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.
Full textAlmohri, Hussain. "Security risk prioritization for logical attack graphs." Thesis, Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/1114.
Full textJafarian, Jafar Haadi. "Cyber Agility for Attack Deterrence and Deception." Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.
Full textIn recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either identifying and patching exploits, or detecting and filtering them. These techniques are only effective when intrusions are known or detectable. However, unknown (zero-day) vulnerabilities are constantly being discovered, and known vulnerabilities are not often patched promptly. Even worse, while defenders need to patch all vulnerabilities and intrusions paths against unknown malicious entities, the attackers only need to discover only one successful intrusion path in a system that is known and static. These asymmetric advantages have constantly kept attackers one step ahead of defenders.
To reverse this asymmetry in cyber warfare, we aim to propose new proactive defense paradigms that can deter or deceive cyber attackers without relying on intrusion detection and prevention and by offering cyber agility as a system property. Cyber agility allows for system configuration to be changed dynamically without jeopardizing operational and mission requirements of the system. In this thesis, we introduce two novel cyber agility techniques based on two paradigms of cyber deterrence and cyber deception. Cyber deterrence techniques aim to deter cyber threats by changing system configurations randomly and frequently. In contrast, cyber deception techniques aim to deflect attacks to fake targets by misrepresenting system configurations strategically and adaptively.
In the first part of this dissertation, we propose a multi-strategy, multi-parameter and multi-dimensional host identity mutation technique for deterring reconnaissance attacks. This deterrence is achieved by mutating IP addresses and anonymizing fingerprints of network hosts both proactively and adaptively. Through simulation and analytical investigation, we show that our approach significantly increases the attack cost for coordinated scanning worms, advanced network reconnaissance techniques, and multi-stage APT attacks.
In the second part, we propose a formal framework to construct active cyber deception plans that are goal-oriented and dynamic. Our framework introduces a deception logic that models consistencies and conflicts among various deception strategies (e.g., lies) and quantifies the benefit and cost of potential deception plans.
In the third part, we demonstrate and evaluate our deception planning framework by constructing an effective deception plan against multi-stage attacks. Through our experimentation, we show that the generated deception plans are effective and economical, and outperform existing or random deception plans.
Ong, Hoang. "Semantic attack on transaction data anonymised by set-based generalisation." Thesis, Cardiff University, 2015. http://orca.cf.ac.uk/74553/.
Full textBooks on the topic "Computer attack"
Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.
Find full textCollege), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.
Find full textE, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford: Oxford University Press, 2003.
Find full textRooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.
Find full textMesley, Wendy. Can you hack it?: The attack on personal information. Princeton, NJ: Films for the Humanities & Sciences, 2007.
Find full textCobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.
Find full textJelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.
Find full textStevens, Cara J. Redstone Junior High: When Endermen attack. New York: Sky Pony, 2018.
Find full textBook chapters on the topic "Computer attack"
Weik, Martin H. "attack." In Computer Science and Communications Dictionary, 72. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_968.
Full textWeik, Martin H. "text attack." In Computer Science and Communications Dictionary, 1773. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19457.
Full textWeik, Martin H. "analytical attack." In Computer Science and Communications Dictionary, 49. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_649.
Full textWeik, Martin H. "exhaustion attack." In Computer Science and Communications Dictionary, 549. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6545.
Full textWeik, Martin H. "NAK attack." In Computer Science and Communications Dictionary, 1067. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12053.
Full textWeik, Martin H. "attack time." In Computer Science and Communications Dictionary, 72. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_969.
Full textOe, Issa, Keiichiro Yamamura, Hiroki Ishikura, Ryo Hamahira, and Katsuki Fujisawa. "Superpixel Attack." In Lecture Notes in Computer Science, 141–52. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8388-9_12.
Full textBaksi, Anubhab. "Fault Attack." In Computer Architecture and Design Methodologies, 59–98. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6_3.
Full textAbdoli, F., N. Meibody, and R. Bazoubandi. "An Attacks Ontology for computer and networks attack." In Innovations and Advances in Computer Sciences and Engineering, 473–76. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_83.
Full textNishihara, Hideaki, Yasuyuki Kawanishi, Daisuke Souma, and Hirotaka Yoshida. "On Validating Attack Trees with Attack Effects." In Lecture Notes in Computer Science, 309–24. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54549-9_21.
Full textConference papers on the topic "Computer attack"
Dadkhah, Pouria, Siavash Ahmadi, and Mohammad Reza Aref. "GenAtt NIDS Attack: A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems." In 2025 29th International Computer Conference, Computer Society of Iran (CSICC), 1–7. IEEE, 2025. https://doi.org/10.1109/csicc65765.2025.10967427.
Full textFares, Samar, and Karthik Nandakumar. "Attack To Defend: Exploiting Adversarial Attacks for Detecting Poisoned Models." In 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 24726–35. IEEE, 2024. http://dx.doi.org/10.1109/cvpr52733.2024.02335.
Full textAl Kader Hammoud, Hasan Abed, Shuming Liu, Mohammed Alkhrashi, Fahad AlBalawi, and Bernard Ghanem. "Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition." In 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 3439–50. IEEE, 2024. http://dx.doi.org/10.1109/cvprw63382.2024.00348.
Full textAmenu, Edwin Xorsenyo, and Sridaran Rajagopal. "Mitigating Address Resolution Protocol (ARP) Attack on Computer System." In 2024 International Conference on Intelligent & Innovative Practices in Engineering & Management (IIPEM), 1–6. IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925724.
Full textTahat, Majd Z., William B. Glisson, and Baker Al Smadi. "VR Headset Ransomware Attack Vulnerability." In 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 740–45. IEEE, 2024. http://dx.doi.org/10.1109/ccece59415.2024.10667339.
Full textLopuhaä-Zwakenberg, Milan. "Attack Tree Metrics are Operad Algebras." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 665–79. IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00005.
Full textFezooni, Abdulhady Younes, Ehab Ahmad Ghannoum, Malek Ahmad Ayesh, and Qutaibah Malluhi. "How to Attack a Disconnected Computer." In Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0251.
Full textKotenko, Igor, and Andrey Chechulin. "Computer attack modeling and security evaluation based on attack graphs." In 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6662998.
Full textIngols, Kyle, Matthew Chu, Richard Lippmann, Seth Webster, and Stephen Boyer. "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.21.
Full textMa, Jian, and Da Luo. "Audio adversarial attack: HIS attack." In International Conference on Computer Network Security and Software Engineering (CNSSE 2022), edited by Wenshun Sheng and Yongquan Yan. SPIE, 2022. http://dx.doi.org/10.1117/12.2640809.
Full textReports on the topic "Computer attack"
Lenderman, Curtis C. Computer Network Attack: An Operational Tool? Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada415427.
Full textBusby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377624.
Full textWilliamson, Jennie M. Information Operations: Computer Network Attack in the 21st Century. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada402018.
Full textPepyne, David L., and Yu-Chi Ho. Modeling and Analysis of Information Attack in Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, March 2003. http://dx.doi.org/10.21236/ada416393.
Full textRolston, Bri. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks. Office of Scientific and Technical Information (OSTI), June 2005. http://dx.doi.org/10.2172/911827.
Full textHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Fort Belvoir, VA: Defense Technical Information Center, March 2009. http://dx.doi.org/10.21236/ada500822.
Full textPresby, Timothy D. Computer Network Attack and Its Effectiveness against Non-State Actors. Fort Belvoir, VA: Defense Technical Information Center, February 2006. http://dx.doi.org/10.21236/ada463692.
Full textYounes, Paul R. Follow the Money: Using Computer Network Attack to Enforce Economic Sanctions. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada390083.
Full textBest, Carole N. Computer Network Defense and Attack: Information Warfare in the Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada394187.
Full textPharmer, James, Kevin Cropper, Jennifer McKneely, and Earl Williams. Tactical Tomahawk Weapon Control System v6 Land Attack Combat System Prototype Human-Computer Interface. Fort Belvoir, VA: Defense Technical Information Center, July 2004. http://dx.doi.org/10.21236/ada426346.
Full text