To see the other types of publications on this topic, follow the link: Defense/attack strategies.

Dissertations / Theses on the topic 'Defense/attack strategies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 dissertations / theses for your research on the topic 'Defense/attack strategies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ding, Sze Yi. "On Distributed Strategies in Defense of a High Value Unit (HVU) Against a Swarm Attack." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17356.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Swarm attacks are of great concern to the U.S. Navy as well as to navies around the world and commercial ships transiting through waters with high volume of marine traffic. A large group of hostile ships can hide themselves among various other small ships, like pleasure crafts, fishing boats and transport vessels, and can make a coordinated attack against a High Value Unit (HVU) while it passes by. The HVU can easily be overwhelmed by the numbers and sustain heavy damage or risk being taken over. The objective of this thesis is to devel
APA, Harvard, Vancouver, ISO, and other styles
2

Bellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Full text
Abstract:
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati.
APA, Harvard, Vancouver, ISO, and other styles
3

Czarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mitchell, A'Shawn Lora. "Corporate Image Branding Strategies to Attract Engineering Talent." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7561.

Full text
Abstract:
Aerospace and defense leaders need corporate image branding strategies to improve their attraction of engineering talent to the industry. The purpose of this single case study was to explore corporate image branding strategies leaders use at an aerospace and defense company to attract talent and increase competitive advantage. The framework for this study was the recruitment equity model. The sample population consisted of 5 marketing leaders and 5 talent acquisition leaders of an aerospace and defense company in the eastern region of the United States. The study participants had a minimum of
APA, Harvard, Vancouver, ISO, and other styles
5

Papadopoulos, Panagiotis [Verfasser]. "Hostile Takeovers - The use of Attack and Defence Strategies : A Literature Review of possible theoretical approaches / Panagiotis Papadopoulos." München : GRIN Verlag, 2011. http://d-nb.info/1182342531/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Melin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.

Full text
Abstract:
The purpose of this thesis to to investigate if the complex and ambiguous means of a hybrid warfare strategy in the context of the ‘armed attack’ threshold. The ‘armed attack’ threshold sits within the UN Charter article 51 and it constitutes the legal provision that the right to self-defence, both unilaterally and collectively, is only triggered in the event of an ‘armed attack’. It is therefore important to determine if this threshold can through the ambiguous and complex structure of hybrid warfare be circumvented or obfuscated to prevent, delay or weaken a State’s ability to act in self- d
APA, Harvard, Vancouver, ISO, and other styles
7

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Full text
Abstract:
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need t
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Ying-Ju, and 陳瀅如. "Resource Allocation Strategies under Attack-Defense Dual-Role and Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/46594802438344396740.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>100<br>In the past, individuals and enterprises are usually the main subjects in the area of information security. Now the issue about information warfare between nation-sates is getting much attention. When discussing the resource allocation based on the subject of a nation-state, except for the allocation of defense resources, the resources allocated on attack should also be concerned. Historically, preventive strike and the corresponding retaliation from another nation-state are common in the war between two nation-states. In addition, there would be various info
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Hsun-Lin, and 詹勳麟. "The Study of Attack and Defense Strategies for Soccer Robot." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9mpsaj.

Full text
Abstract:
碩士<br>萬能科技大學<br>資訊管理研究所<br>107<br>Robotic technology has advanced rapidly in recent years, and the focus of robot development in various fields has shifted toward Industry 4.0. Various types of robots have gradually been introduced to everyday life, including interactive robots, robot vacuum cleaners, and rescue robots. In recent years, the Taiwanese government has actively promoted the cultivation of programming ability and decided to incorporate courses related to programming and algorithm in the Curriculum Guidelines of 12-year Basic Education. The government also plans to introduce courses
APA, Harvard, Vancouver, ISO, and other styles
10

Mei-ChunChen and 陳玫君. "A Study on Genders and Debating Roles on Uses of Defense Attack Strategies." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44311681012380892684.

Full text
Abstract:
碩士<br>國立成功大學<br>外國語文學系<br>102<br>In debate, the debaters use different strategies to achieve defense and attack goals. Previous studies focused on specific linguistic features as in Lin (2014), and strategy use as in Jin (2000) and Metsämäki (2012). These studies did not consider the dynamic interaction of strategies in the debate process. The current study scrutinizes the influences of variables, including debating roles, genders, winning or losing a debate, and debating stages, on strategy uses, as well as how the debaters use the macro- and micro-strategies in the debating process. The data
APA, Harvard, Vancouver, ISO, and other styles
11

Chi, Jen-Hua, and 紀人華. "Optimal Resource Allocation Strategies Under Collaborative Defense and Collaborative Attack in Multiple Rounds." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/34443894435342723819.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>102<br>Many corporations and organizations conduct daily business through Internet. With the accumulating population using network, the problems of information security become a critical issue. Nowadays, the problems of network security have been extended from personal to organizational. Furthermore, the attack events bring more threat to business than before. Therefore, it is a significant problems to detect attack preference, prevent attack events and even deter the attackers in advance with limited resources for the corporations. The not only have to deploy the n
APA, Harvard, Vancouver, ISO, and other styles
12

SU, SHU-PING, and 蘇淑萍. "A Study of Attack and Defense Strategies of Hostile Takeover in Taiwan Enterprises." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63483655110508257129.

Full text
Abstract:
碩士<br>輔仁大學<br>金融與國際企業學系金融碩士在職專班<br>104<br>Enterprise Transformation cannot be achieved only through internal growth, means such as merger or acquisition shall be used to accelerate the process of restructuring, integrating, dividing or extending its business scale, to adapt to the rapidly changing global business environment. In Taiwan, there were several M&A transactions in the past few years, where most of the transactions were friendly. This is mainly because majority of the companies in Taiwan are family-owned. However, in August 2015, the Advanced semiconductor manufacturing Corporation L
APA, Harvard, Vancouver, ISO, and other styles
13

Lo, Hsueh-yu, and 羅學禹. "Attack and Defense Strategies of Hostile Takeover :A Case of China Development Financial Holding Company(CDFHC)Hostile Takeover Taiwan International Securities Corporation(TISC)." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/60044928929793929494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chung, Hui-Yu, and 鍾蕙宇. "Effective Defense Strategies to Assure Service Continuity against Collaborative and Epidemic Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/41355663140388013579.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>101<br>Technology progress and network infrastructure expands scalability and connectivity of the Internet. This phenomenon makes enterprises and organizations rely more on the Internet when providing services and engaging in electronic commerce. However, these services on the Internet gradually become the target of malicious attackers. To achieve the goals of service disruption or stealing confidential information, attackers continuously exploit network vulnerabilities and advance their attack strategies. In addition to independent attacks, the attackers could also
APA, Harvard, Vancouver, ISO, and other styles
15

"Strategies for asset defense with precursor attacks on the command and control system." Laboratory for Information and Decision Systems, Massachusetts Institute of Technology], 1989. http://hdl.handle.net/1721.1/3141.

Full text
Abstract:
James T. Walton and Michael Athans.<br>Caption title. "To appear in Proc. 1989 Symposium on C2 research, Washington, D.C.<br>Includes bibliographical references.<br>Research supported by the Office of Naval Research. ONR/N00014-85-K-0519 Research supported by the Joint Directors of Laboratories (JDL), Basic Research Group on C3, under contract with the Office of Naval Research. ONR/N00014-85-K-0782
APA, Harvard, Vancouver, ISO, and other styles
16

Chang, Yao-Yuan, and 張耀元. "Network Defense and Recovery Strategies for Maximization of Network Survivability under Malicious Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88861509387291225501.

Full text
Abstract:
碩士<br>臺灣大學<br>資訊管理學研究所<br>98<br>Because of the rapid advancement of computer and telecommunication technologies in recent years, smaller, less expensive and high performance devices are available for companies and individuals, which accelerate the growth of the Internet and make available to users a variety of new network applications/services. However, our dependency on the Internet has made the PCs and servers connected to the network more vulnerable to attacks, causing great losses to enterprises and individuals. Moreover, an increasing number of new threats, evolution of attack tactics and
APA, Harvard, Vancouver, ISO, and other styles
17

Hsieh, Tzu-Chen, and 謝孜謙. "Near Optimal Network Planning and Defense Resource Allocation Strategies for Minimizing Quality-of-Service (QoS) Violations under Attacks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/95581312436904504758.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>96<br>With the convenience of Internet, the problem of information security has caught more and more attentions. Events of witting or unwitting cybercrimes emerge in an endless stream in past years. Among them, to compromise particular servers and then degrade their process capability is one of the most popular cybercrimes in order to further affect the Quality-of-Service (QoS) of the network. For taking precautions against such attacks, we should develop effective defense strategies such as defense resources allocation. Besides, the network planning has to be consi
APA, Harvard, Vancouver, ISO, and other styles
18

Hsieh, Tzu-Chen. "Near Optimal Network Planning and Defense Resource Allocation Strategies for Minimizing Quality-of-Service (QoS) Violations under Attacks." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2407200819471400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Quen-Ting, and 陳冠廷. "Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93188278162261584891.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>99<br>The Internet enriches our lives, but it also brings lots of threats to individuals and cooperates from information security. It is difficult to keep network safe forever because cyber attacker could launch attack through the network unlimited by time and space. Consequently, it is a more and more important and critical issue about how to efficiently evaluate network survivability. In this thesis, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contes
APA, Harvard, Vancouver, ISO, and other styles
20

Shih, I.-Ju, and 施怡如. "Maximization of Multi-Round Network Survivability under Considerations of Defensive Messaging Strategies and Incomplete Information for Both the Attacker and the Defender." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/00228176573859078892.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>100<br>With Internet rapidly expanding, we can connect to Internet at anytime in anywhere. Internet brings many businesses for enterprises, but Internet also lets enterprises face many challenges. In order to serve their customers at all day, enterprises should keep operation continuously. With attack toolkits become easily to obtain, cyber attacks are not hackers’ specialization. So, enterprises face many challenges of cyber security. Therefore, how to efficiently allocate defensive resources to reduce damages which was caused by cyber attackers and how to evaluate
APA, Harvard, Vancouver, ISO, and other styles
21

FanChiang, Chun-Wei, and 范姜竣韋. "Near-optimal Joint Defense Strategies against DDoS Attacks Based upon Packet Filtering and Blocking Enabled by Packet Marking Mechanism." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41392958894997801740.

Full text
Abstract:
碩士<br>臺灣大學<br>資訊管理學研究所<br>98<br>In recent years, DDoS has become one of the acute threaten to the Internet. During the DDoS attack, huge amount of attack traffic not only heavily consumes the network bandwidth but seriously depletes the victim server’s key resource, which, for the legitimate user, leads to service inaccessibility. To defense against this type of attack, joint defense strategies are proposed, requiring the cooperation between the ISP and the ASP, which combine packet marking, packet filtering strategy and packet blocking policy. With packet marking the approximation of legitim
APA, Harvard, Vancouver, ISO, and other styles
22

Chih-Hao, Su, and 蘇至浩. "Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/19113779985732747071.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>96<br>Information technology has been increasingly progressing, and the storage cost has been reducing. Thus, individuals, enterprises and government organizations are likely to store secret data through electronic way. Moreover, along with the rise of the use of network and the prevalence of e-commerce, the crime of information theft through network has grown in high-speed. Cyber crimes, like phishing or installing Trojan horse in victims’ computers to steal information, will cause serious damage to individuals or enterprises. From the above reasons, to protect sec
APA, Harvard, Vancouver, ISO, and other styles
23

Su, Chih-Hao. "Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2607200817422600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Smalec, Łukasz. "Siła zbrojna w kulturze strategicznej Stanów Zjednoczonych po zakończeniu zimnej wojny (ciągłość i zmiana)." Doctoral thesis, 2014.

Find full text
Abstract:
Zamachy terrorystyczne z 11 września 2001 r., otworzyły szeroko zakrojoną debatę na temat właściwego kursu, jaki powinny obrać Stany Zjednoczone w polityce zagranicznej i obronnej, jak również strategii bezpieczeństwa narodowego. Niektórzy krytycy strategii administracji G. W. Busha oskarżali ją o sięganie po szkodliwy, z punktu widzenia prestiżu USA, unilateralizm. Według nich, administracja Busha odwróciła się z od tradycyjnej, powszechnie akceptowanej, a nawet podziwianej amerykańskiej liberalnej polityki zagranicznej. Fala niekończącej się krytyki wobec tej administracji wynikała z błędnej
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!