Academic literature on the topic 'Defense/attack strategies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defense/attack strategies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Defense/attack strategies"

1

Mr., Ajas K. S1, Fares Rahman Mr., Joel Deleep Mr., Joemon Johnson 4. Mr., and Shejina N. M. K. A5 Ms. "PENETRATION TESTING AND DEFENSE STRATEGIES." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 11–19. https://doi.org/10.5281/zenodo.10774423.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; <strong>Objective- </strong>Penetration testing helps to secure networks, and highlights the security issues. In this paper investigate different aspects of penetration testing including tools, attack methodologies, and defense strategies.&nbsp; More specifically, we performed different penetration tests using a private networks, devices, and virtualized systems and tools. We predominately used tools within the Kali Linux suite. The attacks we performed included: Smartphone penetration testing, hacking phones Bluetooth, traffic sniffing, hacking WPA Protected
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Jing, Yuchen Zhang, Hao Hu, Jinglei Tan, Qiang Leng, and Chaowen Chang. "Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory." Mathematical Problems in Engineering 2020 (August 11, 2020): 1–12. http://dx.doi.org/10.1155/2020/9302619.

Full text
Abstract:
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, but the uncertainty about his adversary prevents him from taking the favorable actions. How to select the best strategy from the candidate strategies to maximize the defense payoff becomes the core issue. For this purpose, the paper innovatively designs a game theory model from the point of network survivability in combination with the attribute attack graph. The attack graph is created based on the network connectivity and known vulnerabilities using the MulVAL toolkit, which gives the full vie
APA, Harvard, Vancouver, ISO, and other styles
3

Gong, Xiaopeng, Wanchun Chen, and Zhongyuan Chen. "Intelligent Game Strategies in Target-Missile-Defender Engagement Using Curriculum-Based Deep Reinforcement Learning." Aerospace 10, no. 2 (2023): 133. http://dx.doi.org/10.3390/aerospace10020133.

Full text
Abstract:
Aiming at the attack and defense game problem in the target-missile-defender three-body confrontation scenario, intelligent game strategies based on deep reinforcement learning are proposed, including an attack strategy applicable to attacking missiles and active defense strategy applicable to a target/defender. First, based on the classical three-body adversarial research, the reinforcement learning algorithm is introduced to improve the purposefulness of the algorithm training. The action spaces the reward and punishment conditions of both attack and defense confrontation are considered in t
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Yongjin, Han Zhang, Yuanbo Guo, Tao Li, and Jun Ma. "A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice." Wireless Communications and Mobile Computing 2020 (October 12, 2020): 1–10. http://dx.doi.org/10.1155/2020/8850356.

Full text
Abstract:
Increasingly, more administrators (defenders) are using defense strategies with deception such as honeypots to improve the IoT network security in response to attacks. Using game theory, the signaling game is leveraged to describe the confrontation between attacks and defenses. However, the traditional approach focuses only on the defender; the analysis from the attacker side is ignored. Moreover, insufficient analysis has been conducted on the optimal defense strategy with deception when the model is established with the signaling game. In our work, the signaling game model is extended to a n
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Jun, Xin Sun, Wen Tian, and Guangjie Liu. "A Bayesian game approach for node-based attribution defense against asymmetric information attacks in IoT networks." PLOS ONE 20, no. 3 (2025): e0316091. https://doi.org/10.1371/journal.pone.0316091.

Full text
Abstract:
In the rapidly evolving landscape of the Internet of Things (IoT), traditional defense mechanisms struggle to counter sophisticated attribution attacks, especially under asymmetric information conditions. This paper introduces a novel Bayesian game framework—the Node-Based Attribution Attack-Defense Bayesian Game (NAADBG) Model—to address these challenges in IoT networks. The model incorporates a comprehensive set of attacker and defender profiles, capturing the complexities of real-world security scenarios. We develop a refined method for quantifying the payoffs of node-level attack-defense a
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Hao, Le Wang, Huan Zhang, Junjian Zhang, Muhammad Shafiq, and Zhaoquan Gu. "Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey." Electronics 11, no. 14 (2022): 2183. http://dx.doi.org/10.3390/electronics11142183.

Full text
Abstract:
Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances in deep learning have considerably boosted the development of speech signal processing techniques. Speaker or speech recognition has been widely adopted in such applications as smart locks, smart vehicle-mounted systems, and financial services. However, deep neural network-based speaker recognition systems (SRSs) are susceptible to adversarial attacks, which fool the system to make wrong decisions by small perturbations, and this has drawn the attention of researchers to the security of SRSs. Unf
APA, Harvard, Vancouver, ISO, and other styles
7

Urbina Escobar, Tomás. "Self-Defense Strategies Against Cyber- Attacks by Non-State Actors." Revista de Relaciones Internacionales, Estrategia y Seguridad 18, no. 2 (2023): 61–72. http://dx.doi.org/10.18359/ries.6639.

Full text
Abstract:
This article aims to analyze and provide a state-of-the-art conceptualization of the notion of self-defense within international law and the cyber realm. In the first section, the paper explores the concepts of self-defense, attack, and the use of force in international law, followed by their application in the cyberspace. The subsequent section, specifically applies the concept of self-defense in the event of a cyber-attack perpetrated by a non-state actors. The conclusion highlights that the cyber realm context introduces the possibility that aggressions from non-state actors can yield conse
APA, Harvard, Vancouver, ISO, and other styles
8

González-Landero, Franks, Iván García-Magariño, Raquel Lacuesta, and Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices." Wireless Communications and Mobile Computing 2018 (June 24, 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.

Full text
Abstract:
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, sensing in smart homes, precision agriculture, underwater monitoring in aquaculture, and ambient-assisted living for healthcare. Efficient and secure data forwarding is essential to maintain seamless communications and to provide fast services. However, IoT devices and sensors usually have low processing capabilities and vulnerabilities. For example, attacks such as the Distributed Denial of Service (DDoS) can easily hinder sensor networks and IoT devices. In this context, the current approach p
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Yuwen, Lei Yu, Houhua He, and Yitong Meng. "A Defense Strategy Selection Method Based on the Cyberspace Wargame Model." Security and Communication Networks 2021 (October 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/4292670.

Full text
Abstract:
Network defenders always face the problem of how to use limited resources to make the most reasonable decision. The network attack-defense game model is an effective means to solve this problem. However, existing network attack-defense game models usually assume that defenders will no longer change defense strategies after deploying them. However, in an advanced network attack-defense confrontation, defenders usually redeploy defense strategies for different attack situations. Therefore, the existing network attack-defense game models are challenging to accurately describe the advanced network
APA, Harvard, Vancouver, ISO, and other styles
10

Bi, Chuanxiang, Shang Shi, and Jian Qu. "Enhancing Autonomous Driving: A Novel Approach of Mixed Attack and Physical Defense Strategies." ASEAN Journal of Scientific and Technological Reports 28, no. 1 (2024): e254093. https://doi.org/10.55164/ajstr.v28i1.254093.

Full text
Abstract:
Adversarial attacks are a significant threat to autonomous driving safety, especially in the physical world where there is a prevalence of "sticker-paste" attacks on traffic signs. However, most of these attacks are single-category attacks with little interference effect. This paper builds an autonomous driving platform and conducts extensive experiments on five single-category attacks. Moreover, we proposed a new physical attack - a mixed attack consisting of different single-category physical attacks. The proposed method outperforms existing methods and can reduce the accuracy of traffic sig
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Defense/attack strategies"

1

Ding, Sze Yi. "On Distributed Strategies in Defense of a High Value Unit (HVU) Against a Swarm Attack." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17356.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Swarm attacks are of great concern to the U.S. Navy as well as to navies around the world and commercial ships transiting through waters with high volume of marine traffic. A large group of hostile ships can hide themselves among various other small ships, like pleasure crafts, fishing boats and transport vessels, and can make a coordinated attack against a High Value Unit (HVU) while it passes by. The HVU can easily be overwhelmed by the numbers and sustain heavy damage or risk being taken over. The objective of this thesis is to devel
APA, Harvard, Vancouver, ISO, and other styles
2

Bellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Full text
Abstract:
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati.
APA, Harvard, Vancouver, ISO, and other styles
3

Czarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mitchell, A'Shawn Lora. "Corporate Image Branding Strategies to Attract Engineering Talent." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7561.

Full text
Abstract:
Aerospace and defense leaders need corporate image branding strategies to improve their attraction of engineering talent to the industry. The purpose of this single case study was to explore corporate image branding strategies leaders use at an aerospace and defense company to attract talent and increase competitive advantage. The framework for this study was the recruitment equity model. The sample population consisted of 5 marketing leaders and 5 talent acquisition leaders of an aerospace and defense company in the eastern region of the United States. The study participants had a minimum of
APA, Harvard, Vancouver, ISO, and other styles
5

Papadopoulos, Panagiotis [Verfasser]. "Hostile Takeovers - The use of Attack and Defence Strategies : A Literature Review of possible theoretical approaches / Panagiotis Papadopoulos." München : GRIN Verlag, 2011. http://d-nb.info/1182342531/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Melin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.

Full text
Abstract:
The purpose of this thesis to to investigate if the complex and ambiguous means of a hybrid warfare strategy in the context of the ‘armed attack’ threshold. The ‘armed attack’ threshold sits within the UN Charter article 51 and it constitutes the legal provision that the right to self-defence, both unilaterally and collectively, is only triggered in the event of an ‘armed attack’. It is therefore important to determine if this threshold can through the ambiguous and complex structure of hybrid warfare be circumvented or obfuscated to prevent, delay or weaken a State’s ability to act in self- d
APA, Harvard, Vancouver, ISO, and other styles
7

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Full text
Abstract:
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need t
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Ying-Ju, and 陳瀅如. "Resource Allocation Strategies under Attack-Defense Dual-Role and Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/46594802438344396740.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>100<br>In the past, individuals and enterprises are usually the main subjects in the area of information security. Now the issue about information warfare between nation-sates is getting much attention. When discussing the resource allocation based on the subject of a nation-state, except for the allocation of defense resources, the resources allocated on attack should also be concerned. Historically, preventive strike and the corresponding retaliation from another nation-state are common in the war between two nation-states. In addition, there would be various info
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Hsun-Lin, and 詹勳麟. "The Study of Attack and Defense Strategies for Soccer Robot." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9mpsaj.

Full text
Abstract:
碩士<br>萬能科技大學<br>資訊管理研究所<br>107<br>Robotic technology has advanced rapidly in recent years, and the focus of robot development in various fields has shifted toward Industry 4.0. Various types of robots have gradually been introduced to everyday life, including interactive robots, robot vacuum cleaners, and rescue robots. In recent years, the Taiwanese government has actively promoted the cultivation of programming ability and decided to incorporate courses related to programming and algorithm in the Curriculum Guidelines of 12-year Basic Education. The government also plans to introduce courses
APA, Harvard, Vancouver, ISO, and other styles
10

Mei-ChunChen and 陳玫君. "A Study on Genders and Debating Roles on Uses of Defense Attack Strategies." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44311681012380892684.

Full text
Abstract:
碩士<br>國立成功大學<br>外國語文學系<br>102<br>In debate, the debaters use different strategies to achieve defense and attack goals. Previous studies focused on specific linguistic features as in Lin (2014), and strategy use as in Jin (2000) and Metsämäki (2012). These studies did not consider the dynamic interaction of strategies in the debate process. The current study scrutinizes the influences of variables, including debating roles, genders, winning or losing a debate, and debating stages, on strategy uses, as well as how the debaters use the macro- and micro-strategies in the debating process. The data
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Defense/attack strategies"

1

Kumar, K. Ravi. Attack-defense marketing strategies: A full equilibrium analysis based on response function models. College of Commerce and Business Administration, University of Illinois at Urbana-Champaign, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

NIDS International Forum on War History (2008 Tokyo). The Japan strategies of the allies during the road to Pearl Harbor: 2008 International Forum on War History : proceedings : September 18, 2008, NS Sky Conference, Shinjuku, Tokyo, National Institute for Defense Studies. National Institute for Defense Studies, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jorge A. De Vasconcellos e Sá. Strategy plays: Attack and defence strategies for business. Financial Times Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baryshnikov, Nikolay. Fundamentals of professional intercultural communication. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1391408.

Full text
Abstract:
The textbook examines the fundamental problems of professional intercultural communication, outlines the main components of the professional competence of a specialist in intercultural communication, his personal qualities necessary for successful professional activity.&#x0D; The author's concept of attack strategies and self-defense strategies in the communicative battles of professionals is presented.&#x0D; Meets the requirements of the federal state educational standards of higher education of the latest generation.&#x0D; For students studying in the areas of training and specialties: 45.03
APA, Harvard, Vancouver, ISO, and other styles
5

Sandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. Bantam Books, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haber, Morey J., and Brad Hibbert. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. Apress, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Haber, Morey J. Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. Apress, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hills, Christopher, Brian Chappell, and Morey J. Haber. Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources. Apress L. P., 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Englund, Tony. Ulitmate Book of Soccer Set-Pieces: Strategies for Attack and Defense Restarts. Meyer & Meyer Fachverlag und Buchhandel GmbH, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cybersecurity - Attack and Defense Strategies: Infrastructure Security with Red Team and Blue Team Tactics. de Gruyter GmbH, Walter, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Defense/attack strategies"

1

Potharaju, Rahul, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang. "Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28166-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Pei-Yu, Ying-Ju Chen, and Frank Yeong-Sung Lin. "Resource Allocation Strategies under Attack-Defense Dual-Role and Malicious Attacks." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55038-6_107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kantabutra, Sanpawat. "Adiabatic Quantum Computation for Cyber Attack and Defense Strategies." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-9582-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sarang, Arpita Dinesh, Sang-Hoon Choi, and Ki-Woong Park. "Plotting OSS-Based Supply Chain Attack Strategies and the Defense Failure." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-1624-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salas-Fernández, Agustín, Broderick Crawford, Ricardo Soto, and Sanjay Misra. "Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review." In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72236-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Azaiez, M. Naceur. "A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies." In Game Theoretic Risk Analysis of Security Threats. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Srivastava, Aviral, Priyansh Sanghavi, Viral Parmar, and Seema Rani. "Zero-Shot Learning in Cybersecurity: A Paradigm Shift in Attack and Defense Strategies." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-70906-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Delmail, David, and Pascal Labrousse. "Heavy-Metal Attack on Freshwater Side: Physiological Defense Strategies of Macrophytes and Ecotoxicological Ops." In Physiological Mechanisms and Adaptation Strategies in Plants Under Changing Environment. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8600-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Haibo, and Kouichi Sakurai. "Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies." In Advanced Information Networking and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57870-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cicek, Didem, Murat Simsek, and Burak Kantarci. "AI-Driven Attack Modeling and Defense Strategies in Mobile Crowdsensing: A Special Case Study on Fake Tasks." In Wireless Networks. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32397-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Defense/attack strategies"

1

Gaffan, Renaud Horacio, Issa Moussa Diop, Ndeye Khady Aidara, Cherif Diallo, and Hocine Cherifi. "Assessing Centrality Measures as Attack and Defense Strategies in the Global Air Transportation Network." In 2024 IEEE Workshop on Complexity in Engineering (COMPENG). IEEE, 2024. http://dx.doi.org/10.1109/compeng60905.2024.10741475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christina Deva Kirubai, J., and S. Silvia Priscila. "MLP-Based Defense Mechanisms Against Cyber Crime: Insights from Dataset-Driven Attack Prevention Strategies." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Dale, and Ronald Koontz. "Apache Mission Processor Software Architecture: Future Airborne Capability Environment Considerations." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9470.

Full text
Abstract:
Open Systems Architecture (OSA) applied to rotorcraft avionics has continued to mature and evolve during the past decade. The Apache attack helicopter Mission Processor software architecture, Networked Common Operating Real-time Environment (NCORE), was originally architected to reduce life-cycle costs, minimize the time to incorporate and field new capabilities, take advantage of new software technologies and improve the organization of existing functional capabilities. The Open Group’s Future Airborne Capability Environment (FACE™) consortium is an ongoing joint industry, academia, Departmen
APA, Harvard, Vancouver, ISO, and other styles
4

Fan, Wei, Bingnan Shi, and Cheng Peng. "A Novel 5G Key Reinstallation Attack and Defensive Strategies." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nie, Kai, Xiao Zhang, and Jinge Wang. "Mitigating transient execution attacks: enhancing security through branch predictor defense strategies." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning. SPIE, 2024. http://dx.doi.org/10.1117/12.3038288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jin, Chen, Xi Chen, Junyu Pu, and Boyu Fan. "Research on distributed machine learning defence strategies under Byzantine attacks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neethu, M. R., P. Remyakrishnan, Sa Mukesh, J. Barath Kumar, and Ala Manas Royal. "Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matta, Venkata Durga Rao, V. V. R. Maheswara Rao, Venkata Sai Jayasurya Battula, and Mahesh Babu Addagatla. "Mitigating Security Challenges in Edge Computing: Attacks, Defence Strategies, and Algorithms." In 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2025. https://doi.org/10.1109/idciot64235.2025.10914902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yin, Junhong, and Kyungtae Kang. "Defense and Recovery Strategies for Flash-Based Storage Under Ransomware Attacks: A Survey." In 2025 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2025. https://doi.org/10.1109/iceic64972.2025.10879685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khalid, Hafsa, and Cem Direkoglu. "Brain Tumor Classification using Deep Learning: Robustness Against Adversarial Attacks and Defense Strategies." In 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA). IEEE, 2025. https://doi.org/10.1109/ichora65333.2025.11017313.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Defense/attack strategies"

1

Saalman, Lora. Navigating Chinese–Russian Nuclear and Space Convergence and Divergence. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/rxgl6272.

Full text
Abstract:
Following the release of a China–Russia joint statement in February 2022, analysts have argued that the two countries have become strategically aligned. While both share security concerns and even use similar terminology on ‘active defence’, the manner in which they address these concerns and operationalize these concepts is not the same—at least not yet. When applied to nuclear deterrence, the Chinese version of active defence suggests retaliatory action against a nuclear attack while the Russian version indicates pre-emption in the face of either non-nuclear or nuclear aggression. In terms o
APA, Harvard, Vancouver, ISO, and other styles
2

Hansch, Heidi. Designing and Assessing the Efficacy of Protein Inhibitors of IscB Endonucleases. Montana State University, 2025. https://doi.org/10.15788/1751903932.

Full text
Abstract:
Many bacteria and archaea possess Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) and CRISPR-associated (Cas) proteins, forming a CRISPR-Cas system that defends against viral infection. These microbes incorporate fragments of viral DNA as spacers between short DNA repeats, then transcribe these regions of alternating spacers and repeat units into guide RNA (gRNA) sequences that form complexes with Cas proteins. Upon subsequent viral attack, the gRNA sequences bind regions of complementary viral DNA, and the Cas proteins act as endonucleases, cleaving the DNA to curb the infe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!