Dissertations / Theses on the topic 'Defense/attack strategies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Defense/attack strategies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ding, Sze Yi. "On Distributed Strategies in Defense of a High Value Unit (HVU) Against a Swarm Attack." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17356.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textCzarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.
Full textMitchell, A'Shawn Lora. "Corporate Image Branding Strategies to Attract Engineering Talent." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7561.
Full textPapadopoulos, Panagiotis [Verfasser]. "Hostile Takeovers - The use of Attack and Defence Strategies : A Literature Review of possible theoretical approaches / Panagiotis Papadopoulos." München : GRIN Verlag, 2011. http://d-nb.info/1182342531/34.
Full textMelin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.
Full textIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textChen, Ying-Ju, and 陳瀅如. "Resource Allocation Strategies under Attack-Defense Dual-Role and Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/46594802438344396740.
Full textChan, Hsun-Lin, and 詹勳麟. "The Study of Attack and Defense Strategies for Soccer Robot." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9mpsaj.
Full textMei-ChunChen and 陳玫君. "A Study on Genders and Debating Roles on Uses of Defense Attack Strategies." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44311681012380892684.
Full textChi, Jen-Hua, and 紀人華. "Optimal Resource Allocation Strategies Under Collaborative Defense and Collaborative Attack in Multiple Rounds." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/34443894435342723819.
Full textSU, SHU-PING, and 蘇淑萍. "A Study of Attack and Defense Strategies of Hostile Takeover in Taiwan Enterprises." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63483655110508257129.
Full textLo, Hsueh-yu, and 羅學禹. "Attack and Defense Strategies of Hostile Takeover :A Case of China Development Financial Holding Company(CDFHC)Hostile Takeover Taiwan International Securities Corporation(TISC)." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/60044928929793929494.
Full textChung, Hui-Yu, and 鍾蕙宇. "Effective Defense Strategies to Assure Service Continuity against Collaborative and Epidemic Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/41355663140388013579.
Full text"Strategies for asset defense with precursor attacks on the command and control system." Laboratory for Information and Decision Systems, Massachusetts Institute of Technology], 1989. http://hdl.handle.net/1721.1/3141.
Full textChang, Yao-Yuan, and 張耀元. "Network Defense and Recovery Strategies for Maximization of Network Survivability under Malicious Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88861509387291225501.
Full textHsieh, Tzu-Chen, and 謝孜謙. "Near Optimal Network Planning and Defense Resource Allocation Strategies for Minimizing Quality-of-Service (QoS) Violations under Attacks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/95581312436904504758.
Full textHsieh, Tzu-Chen. "Near Optimal Network Planning and Defense Resource Allocation Strategies for Minimizing Quality-of-Service (QoS) Violations under Attacks." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2407200819471400.
Full textChen, Quen-Ting, and 陳冠廷. "Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93188278162261584891.
Full textShih, I.-Ju, and 施怡如. "Maximization of Multi-Round Network Survivability under Considerations of Defensive Messaging Strategies and Incomplete Information for Both the Attacker and the Defender." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/00228176573859078892.
Full textFanChiang, Chun-Wei, and 范姜竣韋. "Near-optimal Joint Defense Strategies against DDoS Attacks Based upon Packet Filtering and Blocking Enabled by Packet Marking Mechanism." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41392958894997801740.
Full textChih-Hao, Su, and 蘇至浩. "Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/19113779985732747071.
Full textSu, Chih-Hao. "Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2607200817422600.
Full textSmalec, Łukasz. "Siła zbrojna w kulturze strategicznej Stanów Zjednoczonych po zakończeniu zimnej wojny (ciągłość i zmiana)." Doctoral thesis, 2014.
Find full text