Academic literature on the topic 'Cybernetic attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybernetic attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybernetic attacks"
Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile, and Nurettin Erginoz. "Massive Cyber-Attacks Patterns Implemented with BDI Agents." Applied Mechanics and Materials 811 (November 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.
Full textMoga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu, and Ramona Lile. "Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures." Applied Mechanics and Materials 841 (June 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.
Full textKubanov, E. V. "Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration." Public administration aspects 6, no. 8 (2018): 49–55. http://dx.doi.org/10.15421/151846.
Full textDudek, Wojciech, and Wojciech Szynkiewicz. "Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.
Full textAkhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova, and Sh Sagyndykova. "Decision support system for assessing the consequences of cyber attacks." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, no. 1 (2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.
Full textOsak, Alexey, Daniil Panasetsky, and Elena Buzina. "Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization." E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.
Full textLaktionov, Illia, Andrii Kmit, Ivan Opirskyy, and Oleh Harasymchuk. "RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR." Cybersecurity: Education, Science, Technique 1, no. 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.
Full textShukla, Prashant Kumar. "An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things." International Journal of Wireless and Ad Hoc Communication 7, no. 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.
Full textYuyukin, I. V. "Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness." Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, no. 3 (2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.
Full textDhirani, Lubna Luxmi, та Thomas Newe. "Securing industry 5.0 using 6σ CYBERNETIC framework". Mehran University Research Journal of Engineering and Technology 43, № 2 (2024): 220. http://dx.doi.org/10.22581/muet1982.3202.
Full textDissertations / Theses on the topic "Cybernetic attacks"
Amoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication." Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.
Full textHložanka, Filip. "Simulace správy informační bezpečnosti ve fakultním prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417806.
Full textChabak, Kelson D. "Conceptual study of rotary-wing microrobotics." Wright-Patterson: Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA487086.
Full textBooks on the topic "Cybernetic attacks"
Department of Defense. Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory. Independently Published, 2017.
Find full textBook chapters on the topic "Cybernetic attacks"
Sokolov, Sergei, Anatoly Nyrkov, Tatiana Knysh, and Yaroslav Demakov. "Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare." In Lecture Notes in Civil Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-6208-6_8.
Full textGao, Jian, and Yingjun Chen. "Detecting DOS/DDOS Attacks Under Ipv6." In Proceedings of the 2012 International Conference on Cybernetics and Informatics. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3872-4_110.
Full textCholakoska, Ana, Martina Karanfilovska, and Danijela Efnusheva. "Survey of Security Issues, Requirements, Challenges and Attacks in Internet of Things." In Informatics and Cybernetics in Intelligent Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_55.
Full textNg, Wing W. Y., Aki P. F. Chan, Daniel S. Yeung, and Eric C. C. Tsang. "Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure." In Advances in Machine Learning and Cybernetics. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11739685_89.
Full textXylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "Detecting DDoS Attacks on Multiple Network Hosts." In Developments in Information Security and Cybernetic Wars. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch006.
Full textHotchkiss, Michael Bennett. "Russian Information Warfare and 9/11 Conspiracism." In Developments in Information Security and Cybernetic Wars. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch010.
Full textSallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, and Majdi Ben Saad. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework." In Privacy Solutions and Security Frameworks in Information Protection. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch016.
Full textFarouk, Amr. "Critical Infrastructure Protection in Developing Countries." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch054.
Full textFarouk, Amr. "Critical Infrastructure Protection in Developing Countries." In Advances in Finance, Accounting, and Economics. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2361-1.ch002.
Full textGil, Daniel Juan. "Epilogue: Resurrection and Zombies." In Fate of the Flesh. Fordham University Press, 2021. http://dx.doi.org/10.5422/fordham/9780823290048.003.0007.
Full textConference papers on the topic "Cybernetic attacks"
Kuo, Wen-Chung, and Yung-Cheng Lee. "Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks." In 2007 International Conference on Machine Learning and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icmlc.2007.4370461.
Full textCarta, Kévin, André Huynh, Stéfane Mouille, Nadia El Mrabet, Claude Barral, and Sébastien Brangoulo. "How Video Injection Attacks Can Even Challenge State-of-the-Art Face Presentation Attack Detection Systems." In 14th International Multi-Conference on Complexity, Informatics and Cybernetics. International Institute of Informatics and Cybernetics, 2023. http://dx.doi.org/10.54808/imcic2023.01.105.
Full textChien, Sheng-Hui, Erh-Hsien Chang, Chih-Yung Yu, and Cheng-Seen Ho. "Attack Subplan-Based Attack Scenario Correlation." In 2007 International Conference on Machine Learning and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icmlc.2007.4370455.
Full textMedina, Brandon, Elena Acevedo, Antonio Acevedo, and Sandra Orantes. "Network Attacks Classification Using Computational Intelligence." In 17th International Multi-Conference on Society, Cybernetics and Informatics. International Institute of Informatics and Cybernetics, 2023. http://dx.doi.org/10.54808/imsci2023.01.156.
Full textCao, Lai-cheng. "Detecting Web-Based Attacks by Machine Learning." In 2006 International Conference on Machine Learning and Cybernetics. IEEE, 2006. http://dx.doi.org/10.1109/icmlc.2006.258990.
Full textOtomo, Takuto, Hiroshi Kera, and Kazuhiko Kawamoto. "Adversarial joint attacks on legged robots." In 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2022. http://dx.doi.org/10.1109/smc53654.2022.9945546.
Full textChan, Patrick P. K., Fei Zhang, Wing W. Y. Ng, Daniel S. Yeung, and Jinshan Jiang. "A novel defend against good word attacks." In 2011 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2011. http://dx.doi.org/10.1109/icmlc.2011.6016935.
Full textGao, C., C. Seatzu, Z. Li, and A. Giua. "Multiple Attacks Detection on Discrete Event Systems." In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2019. http://dx.doi.org/10.1109/smc.2019.8914035.
Full textWang, Ling, Cheng Zhang, and Jie Liu. "Deep Learning Defense Method Against Adversarial Attacks." In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9283255.
Full textViet, Khanh, Brajendra Panda, and Yi Hu. "Detecting collaborative insider attacks in information systems." In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377774.
Full text