Academic literature on the topic 'Digital attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Digital attacks"
Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.
Full textJimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.
Full textDugyala, Raman, N. Hanuman Reddy, Raghuram G, and J. Lakshminarayana. "Decentralized Secure Online Digital Data Registrations." International Journal of Engineering & Technology 7, no. 4.6 (2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.6.20231.
Full textNwaocha, Vivian O., and Ayodele Oloyede. "Averting DDOS Attacks in Web-Based Applications." Advances in Multidisciplinary and scientific Research Journal Publication 11, no. 1 (2023): 51–63. http://dx.doi.org/10.22624/aims/digital/v11n1p4.
Full textStein, Zvi, Adir Hazan, and Adrian Stern. "Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks." Sensors 25, no. 7 (2025): 2301. https://doi.org/10.3390/s25072301.
Full textKpieleh, Ferdinand. "A Review of Ddos Attack Detection in Iot Networks." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 43–54. http://dx.doi.org/10.22624/aims/digital/v10n4p6.
Full textKansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.
Full textBeny Abukhaer Tatara, Bisma Abdurachman, Desta Lesmana Mustofa, and David Yacobus. "The Potential of Cyber Attacks in Indonesia's Digital Economy Transformation." NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam 20, no. 1 (2023): 19–37. http://dx.doi.org/10.19105/nuansa.v20i1.7362.
Full textChen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.
Full textThomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.
Full textDissertations / Theses on the topic "Digital attacks"
Liu, Yan. "Digital Video Watermarking Robust to Geometric Attacks and Compressions." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20281.
Full textCerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textSu, Karen. "Digital video watermarking principles for resistance to collusion and interpolation attacks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63030.pdf.
Full textOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textHolm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.
Full textSteiner, Hrafn. "Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5273.
Full textHuang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.
Full textGe, Shizun. "Design of reliable and secure devices by algebraic manipulation codes." Thesis, Boston University, 2012. https://hdl.handle.net/2144/21153.
Full textMouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Full textKeskinarkaus, A. (Anja). "Digital watermarking techniques for printed images." Doctoral thesis, Oulun yliopisto, 2013. http://urn.fi/urn:isbn:9789526200583.
Full textBooks on the topic "Digital attacks"
Su, Karen. Digital video watermarking principles for resistance to collusion and interpolation attacks. National Library of Canada, 2001.
Find full textDavis, Mark W. (Mark William), 1955-, ed. Digital assassination: Protecting your reputation, brand, or business against online attacks. St. Martin's Press, 2011.
Find full textRusskevich, Evgeniy. Criminal law and "digital crime": problems and solutions. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.
Full textProject, American Social History, and George Mason University. Center for History and New Media., eds. The September 11 digital archive: Saving the histories of September 11, 2001. s.n.], 2001.
Find full textKim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [publisher not identified], 2021.
Find full textHoneker, Kenneth S. An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN). Naval Postgraduate School, 1997.
Find full textMark, Davis, and Richard Torrenzano. Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks. St. Martin's Press, 2011.
Find full textThakkar, Dhanya. Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks. Packt Publishing - ebooks Account, 2017.
Find full textHybrid Media Events: The Charlie Hebdo Attacks and Global Circulation of Terrorist Violence. Emerald Publishing Limited, 2017.
Find full textDepartment of Defense. Cyber Attacks, Attribution, and Deterrence: Case Studies - Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure As Vital to National Security. Independently Published, 2017.
Find full textBook chapters on the topic "Digital attacks"
Bhardwaj, Akashdeep. "Supply chain attacks." In Insecure Digital Frontiers. CRC Press, 2024. http://dx.doi.org/10.1201/9781003515395-6.
Full textSzynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Full textVenturini, Ilaria. "Oracle Attacks and Covert Channels." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_14.
Full textVila-Forcén, J. E., S. Voloshynovskiy, O. Koval, F. Pérez-González, and T. Pun. "Practical Data-Hiding: Additive Attacks Performance Analysis." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_19.
Full textHolt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Malware and Automated Computer Attacks." In Cybercrime and Digital Forensics. Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-4.
Full textBabamir, Seyed Morteza, Reyhane Nowrouzi, and Hadi Naseri. "Mining Bluetooth Attacks in Smart Phones." In Networked Digital Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14292-5_26.
Full textKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Full textDoërr, Gwenaël, and Jean-Luc Dugelay. "Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_17.
Full textManasa, Sanyasi, and Kukatlapalli Pradeep Kumar. "Digital Forensics Analysis for Adversarial Attacks in Ai-Based Systems." In Attacks on Artificial Intelligence. Apple Academic Press, 2025. https://doi.org/10.1201/9781003498827-3.
Full textJenkinson, A. J. "Domain Name System (DNS) Attacks." In Digital Blood on Their Hands. CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-5.
Full textConference papers on the topic "Digital attacks"
Ali Khan, Mohammed Rauf, and Ahmad Almulhem. "Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack Attribution." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012042.
Full textAlharthi, Naif Wasel, and Martim Brandão. "Physical and Digital Adversarial Attacks on Grasp Quality Networks." In 2024 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2024. http://dx.doi.org/10.1109/icra57147.2024.10610886.
Full textJares, Garrett, and Chyna Lane. "Secure Development of Machine Learning Against Poisoning Attacks." In 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC). IEEE, 2024. http://dx.doi.org/10.1109/dasc62030.2024.10748747.
Full textMatholia, Hardi, and Oluwasola Mary Adedayo. "Investigating NoSQL Injection Attacks on MongoDB Web Applications." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011969.
Full textQuénéhervé, Kévin, William Pensec, Philippe Tanguy, Rachid Dafali, and Vianney Lapôtre. "Exploring Fault Injection Attacks on CVA6 PMP Configuration Flow." In 2024 27th Euromicro Conference on Digital System Design (DSD). IEEE, 2024. http://dx.doi.org/10.1109/dsd64264.2024.00015.
Full textSucith, R., P. Mathiazhagan, M. Ajith, and G. Lingesh. "Deep Learning Approaches for Detecting Forgery Attacks on Digital Images." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035693.
Full textOuazza, Hajra, Fadoua Khennou, and Abderrahim Abdellaoui. "Adversarial Retraining and White-Box Attacks for Robust Malware Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012053.
Full textLiu, Yujie, and Wenze Shao. "The clean sample matters to transferable attacks on object detection models." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073073.
Full textFang, Hao, Ajian Liu, Haocheng Yuan, et al. "Unified Physical-Digital Face Attack Detection." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/83.
Full textMoser, Daniel, Vincent Lenders, and Srdjan Capkun. "Digital radio signal cancellation attacks." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3319720.
Full textReports on the topic "Digital attacks"
Wiratraman, Herlambang Perdana. How can Indonesian journalists be best protected from digital attacks? Edited by Ria Ernunsari and Suzannah Lyons. Monash University, 2023. http://dx.doi.org/10.54377/e39a-8802.
Full textSpirito, Christopher, Fan Zhang, and Md Hossain. M3CT-23IN1105035 - Protecting and Defending against Autonomous Control Systems and Digital Twin Cyber Attacks (Final). Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2331253.
Full textLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca013.
Full textAlmorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, 2024. http://dx.doi.org/10.26735/orro4624.
Full textIhsan, Yilmaz, and Raja Ali M. Saleem. The nexus of religious populism and digital authoritarianism in Pakistan. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/pp0016.
Full textKemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.
Full textScrivens, Ryan, Steven M. Chermak, Joshua D. Freilich, Thomas W. Wojciechowski, and Richard Frank. Detecting Extremists Online: Examining Online Posting Behaviors of Violent and Non-Violent Right-Wing Extremists. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.21.remve.
Full textBelcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2113.
Full textYilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, 2022. http://dx.doi.org/10.55271/5jchdy.
Full textYilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/rp0001.
Full text