Academic literature on the topic 'Defense/attack strategies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defense/attack strategies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Defense/attack strategies"
Mr., Ajas K. S1, Fares Rahman Mr., Joel Deleep Mr., Joemon Johnson 4. Mr., and Shejina N. M. K. A5 Ms. "PENETRATION TESTING AND DEFENSE STRATEGIES." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 11–19. https://doi.org/10.5281/zenodo.10774423.
Full textLiu, Jing, Yuchen Zhang, Hao Hu, Jinglei Tan, Qiang Leng, and Chaowen Chang. "Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory." Mathematical Problems in Engineering 2020 (August 11, 2020): 1–12. http://dx.doi.org/10.1155/2020/9302619.
Full textGong, Xiaopeng, Wanchun Chen, and Zhongyuan Chen. "Intelligent Game Strategies in Target-Missile-Defender Engagement Using Curriculum-Based Deep Reinforcement Learning." Aerospace 10, no. 2 (2023): 133. http://dx.doi.org/10.3390/aerospace10020133.
Full textHu, Yongjin, Han Zhang, Yuanbo Guo, Tao Li, and Jun Ma. "A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice." Wireless Communications and Mobile Computing 2020 (October 12, 2020): 1–10. http://dx.doi.org/10.1155/2020/8850356.
Full textChen, Jun, Xin Sun, Wen Tian, and Guangjie Liu. "A Bayesian game approach for node-based attribution defense against asymmetric information attacks in IoT networks." PLOS ONE 20, no. 3 (2025): e0316091. https://doi.org/10.1371/journal.pone.0316091.
Full textTan, Hao, Le Wang, Huan Zhang, Junjian Zhang, Muhammad Shafiq, and Zhaoquan Gu. "Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey." Electronics 11, no. 14 (2022): 2183. http://dx.doi.org/10.3390/electronics11142183.
Full textUrbina Escobar, Tomás. "Self-Defense Strategies Against Cyber- Attacks by Non-State Actors." Revista de Relaciones Internacionales, Estrategia y Seguridad 18, no. 2 (2023): 61–72. http://dx.doi.org/10.18359/ries.6639.
Full textGonzález-Landero, Franks, Iván García-Magariño, Raquel Lacuesta, and Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices." Wireless Communications and Mobile Computing 2018 (June 24, 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.
Full textZhu, Yuwen, Lei Yu, Houhua He, and Yitong Meng. "A Defense Strategy Selection Method Based on the Cyberspace Wargame Model." Security and Communication Networks 2021 (October 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/4292670.
Full textBi, Chuanxiang, Shang Shi, and Jian Qu. "Enhancing Autonomous Driving: A Novel Approach of Mixed Attack and Physical Defense Strategies." ASEAN Journal of Scientific and Technological Reports 28, no. 1 (2024): e254093. https://doi.org/10.55164/ajstr.v28i1.254093.
Full textDissertations / Theses on the topic "Defense/attack strategies"
Ding, Sze Yi. "On Distributed Strategies in Defense of a High Value Unit (HVU) Against a Swarm Attack." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17356.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textCzarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.
Full textMitchell, A'Shawn Lora. "Corporate Image Branding Strategies to Attract Engineering Talent." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7561.
Full textPapadopoulos, Panagiotis [Verfasser]. "Hostile Takeovers - The use of Attack and Defence Strategies : A Literature Review of possible theoretical approaches / Panagiotis Papadopoulos." München : GRIN Verlag, 2011. http://d-nb.info/1182342531/34.
Full textMelin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.
Full textIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textChen, Ying-Ju, and 陳瀅如. "Resource Allocation Strategies under Attack-Defense Dual-Role and Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/46594802438344396740.
Full textChan, Hsun-Lin, and 詹勳麟. "The Study of Attack and Defense Strategies for Soccer Robot." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9mpsaj.
Full textMei-ChunChen and 陳玫君. "A Study on Genders and Debating Roles on Uses of Defense Attack Strategies." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44311681012380892684.
Full textBooks on the topic "Defense/attack strategies"
Kumar, K. Ravi. Attack-defense marketing strategies: A full equilibrium analysis based on response function models. College of Commerce and Business Administration, University of Illinois at Urbana-Champaign, 1985.
Find full textNIDS International Forum on War History (2008 Tokyo). The Japan strategies of the allies during the road to Pearl Harbor: 2008 International Forum on War History : proceedings : September 18, 2008, NS Sky Conference, Shinjuku, Tokyo, National Institute for Defense Studies. National Institute for Defense Studies, 2008.
Find full textJorge A. De Vasconcellos e Sá. Strategy plays: Attack and defence strategies for business. Financial Times Prentice Hall, 2005.
Find full textBaryshnikov, Nikolay. Fundamentals of professional intercultural communication. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1391408.
Full textSandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. Bantam Books, 1992.
Find full textHaber, Morey J., and Brad Hibbert. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. Apress, 2017.
Find full textHaber, Morey J. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. Apress, 2020.
Find full textHills, Christopher, Brian Chappell, and Morey J. Haber. Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources. Apress L. P., 2022.
Find full textEnglund, Tony. Ulitmate Book of Soccer Set-Pieces: Strategies for Attack and Defense Restarts. Meyer & Meyer Fachverlag und Buchhandel GmbH, 2022.
Find full textCybersecurity - Attack and Defense Strategies: Infrastructure Security with Red Team and Blue Team Tactics. de Gruyter GmbH, Walter, 2018.
Find full textBook chapters on the topic "Defense/attack strategies"
Potharaju, Rahul, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang. "Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28166-2_11.
Full textChen, Pei-Yu, Ying-Ju Chen, and Frank Yeong-Sung Lin. "Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55038-6_107.
Full textKantabutra, Sanpawat. "Adiabatic Quantum Computation for Cyber Attack and Defense Strategies." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-9582-8_9.
Full textSarang, Arpita Dinesh, Sang-Hoon Choi, and Ki-Woong Park. "Plotting OSS-Based Supply Chain Attack Strategies and the Defense Failure." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1624-4_24.
Full textSalas-Fernández, Agustín, Broderick Crawford, Ricardo Soto, and Sanjay Misra. "Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review." In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72236-4_18.
Full textAzaiez, M. Naceur. "A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies." In Game Theoretic Risk Analysis of Security Threats. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_5.
Full textSrivastava, Aviral, Priyansh Sanghavi, Viral Parmar, and Seema Rani. "Zero-Shot Learning in Cybersecurity: A Paradigm Shift in Attack and Defense Strategies." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-70906-7_13.
Full textDelmail, David, and Pascal Labrousse. "Heavy-Metal Attack on Freshwater Side: Physiological Defense Strategies of Macrophytes and Ecotoxicological Ops." In Physiological Mechanisms and Adaptation Strategies in Plants Under Changing Environment. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8600-8_2.
Full textZhang, Haibo, and Kouichi Sakurai. "Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies." In Advanced Information Networking and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57870-0_14.
Full textCicek, Didem, Murat Simsek, and Burak Kantarci. "AI-Driven Attack Modeling and Defense Strategies in Mobile Crowdsensing: A Special Case Study on Fake Tasks." In Wireless Networks. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32397-3_11.
Full textConference papers on the topic "Defense/attack strategies"
Gaffan, Renaud Horacio, Issa Moussa Diop, Ndeye Khady Aidara, Cherif Diallo, and Hocine Cherifi. "Assessing Centrality Measures as Attack and Defense Strategies in the Global Air Transportation Network." In 2024 IEEE Workshop on Complexity in Engineering (COMPENG). IEEE, 2024. http://dx.doi.org/10.1109/compeng60905.2024.10741475.
Full textChristina Deva Kirubai, J., and S. Silvia Priscila. "MLP-Based Defense Mechanisms Against Cyber Crime: Insights from Dataset-Driven Attack Prevention Strategies." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691068.
Full textJohnson, Dale, and Ronald Koontz. "Apache Mission Processor Software Architecture: Future Airborne Capability Environment Considerations." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9470.
Full textFan, Wei, Bingnan Shi, and Cheng Peng. "A Novel 5G Key Reinstallation Attack and Defensive Strategies." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978705.
Full textNie, Kai, Xiao Zhang, and Jinge Wang. "Mitigating transient execution attacks: enhancing security through branch predictor defense strategies." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038288.
Full textJin, Chen, Xi Chen, Junyu Pu, and Boyu Fan. "Research on distributed machine learning defence strategies under Byzantine attacks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00378.
Full textNeethu, M. R., P. Remyakrishnan, Sa Mukesh, J. Barath Kumar, and Ala Manas Royal. "Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725911.
Full textMatta, Venkata Durga Rao, V. V. R. Maheswara Rao, Venkata Sai Jayasurya Battula, and Mahesh Babu Addagatla. "Mitigating Security Challenges in Edge Computing: Attacks, Defence Strategies, and Algorithms." In 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2025. https://doi.org/10.1109/idciot64235.2025.10914902.
Full textYin, Junhong, and Kyungtae Kang. "Defense and Recovery Strategies for Flash-Based Storage Under Ransomware Attacks: A Survey." In 2025 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2025. https://doi.org/10.1109/iceic64972.2025.10879685.
Full textKhalid, Hafsa, and Cem Direkoglu. "Brain Tumor Classification using Deep Learning: Robustness Against Adversarial Attacks and Defense Strategies." In 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA). IEEE, 2025. https://doi.org/10.1109/ichora65333.2025.11017313.
Full textReports on the topic "Defense/attack strategies"
Saalman, Lora. Navigating Chinese–Russian Nuclear and Space Convergence and Divergence. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/rxgl6272.
Full textHansch, Heidi. Designing and Assessing the Efficacy of Protein Inhibitors of IscB Endonucleases. Montana State University, 2025. https://doi.org/10.15788/1751903932.
Full text