Academic literature on the topic 'Endpoint Detection and Response'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Endpoint Detection and Response.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Endpoint Detection and Response"

1

Kaur, Harmionee, and Richa Tiwari. "Endpoint detection and response using machine learning." Journal of Physics: Conference Series 2062, no. 1 (2021): 012013. http://dx.doi.org/10.1088/1742-6596/2062/1/012013.

Full text
Abstract:
Abstract The need for cybersecurity has increased manifold over the past decade due to an unprecedented shift towards digital. With the increase in the number and sophistication of threats, cybersecurity experts have been forced to seek out new and efficient ways to secure endpoints on a network. Machine learning provides one such solution. This paper discusses how IoT devices are threatened and the need for endpoint security. It overviews different Machine learning-based intrusion detection systems that are currently in use e.g., STAT, Haystack, etc., and other Endpoint Detection and Response
APA, Harvard, Vancouver, ISO, and other styles
2

Mohammed, Mujtaba, A. Omair Aseel, A. Zowaid Rawan, and S. Ahmed Zaki. "Enhance Cyber Security with EDR and XDR Solutions." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 128–32. https://doi.org/10.5281/zenodo.8285623.

Full text
Abstract:
<strong>Abstract:</strong> Endpoint security is a critical aspect of modern cybersecurity, as endpoints are often the primary targets for malicious attacks, and organizations are continuously seeking innovative approaches to strengthen their security defenses. Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) solutions have shown significant improvements in enhancing endpoint security. This review paper provides few important guidelines while selecting these tools, planning the implementation, few limitation and recommendations based on general industry observatio
APA, Harvard, Vancouver, ISO, and other styles
3

Kodituwakku, Angel, and Jens Gregor. "InMesh: A Zero-Configuration Agentless Endpoint Detection and Response System." Electronics 14, no. 7 (2025): 1292. https://doi.org/10.3390/electronics14071292.

Full text
Abstract:
Endpoint Detection and Response (EDR) systems play a crucial role in continuously monitoring endpoint activities to detect, analyze, and respond to cybersecurity threats in real time. Traditional agent-based EDR systems rely on software agents installed on endpoints for data collection, which can be impractical due to the large number of devices, their mobility, and privacy concerns. In contrast, agentless EDR systems aim to overcome these limitations by remotely collecting network and host data, but they face challenges in precise data attribution because of the transient nature of network ad
APA, Harvard, Vancouver, ISO, and other styles
4

Shtonda, Roman, Yuliya Chernish, Irina Maltseva, Yurii Tsykalo, Yevhen Chaika, and Serhiy Polishchuk. "PRACTICAL APPROACHES TO CYBER PROTECTION OF MOBILE DEVICES WITH THE HELP OF A SOLUTION ENDPOINT DETECTION AND RESPONSE." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 17–31. http://dx.doi.org/10.28925/2663-4023.2023.21.1731.

Full text
Abstract:
In this article, practical approaches to cyber protection of mobile devices using the Endpoint Detection and Response solution are considered and the results of the work carried out are given. In order to reliably protect mobile devices, the authors of the article conducted testing of CrowdStrike Falcon software; Sophos Intercept X; Palo Alto Cortex XDR included in the Endpoint Detection and Response solution. The research was conducted on personal mobile devices of employees of our institution, which work on the basis of Android and iOS operating systems. Comprehensive collection of monitorin
APA, Harvard, Vancouver, ISO, and other styles
5

Shtonda, Roman, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii, and Pavlo Kutsaiev. "METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 380–89. https://doi.org/10.28925/2663-4023.2025.27.737.

Full text
Abstract:
In the conditions of modern cyberspace, Endpoint Detection and Response (Extended Detection and Response) software solutions are the key to cyber protection. These solutions play a key role in the cyber protection of end devices operating in information and communication systems and electronic communication networks. However, the effectiveness of these solutions can vary significantly. That is why a comprehensive approach to testing their capabilities is necessary, which will allow them to be effectively evaluated. This article discusses the methodology for testing the capabilities of Endpoint
APA, Harvard, Vancouver, ISO, and other styles
6

Gundaboina, Anjan Kumar. "Endpoint Detection and Response (EDR) in Healthcare: Mitigating Threats on Critical Devices." Journal of Technology and Systems 7, no. 4 (2025): 50–65. https://doi.org/10.47941/jts.2878.

Full text
Abstract:
Purpose: This paper aims to identify the strategies for designing, implementing, and evaluating EDR in the safety of mission-critical medical devices and workstations in healthcare environments. Methodology: The exercise involved installing EDR elements throughout a sample of health organization’s endpoints and using bots to stage select cyber threats. This way, the methodology provides controlled exposure to real-life attack scenarios to assess the detection, response time and impact on the system. Findings: Endpoint Detection and Response (EDR) solutions are gradually rising as preventive se
APA, Harvard, Vancouver, ISO, and other styles
7

A.Shaji, George, S.Sagayarajan, T.Baskar, and George A.S.Hovan. "Extending Detection and Response: How MXDR Evolves Cybersecurity." Partners Universal International Innovation Journal (PUIIJ) 01, no. 04 (2023): 268–85. https://doi.org/10.5281/zenodo.8284342.

Full text
Abstract:
As cyber threats grow more advanced, organizations need security solutions that can provide extensive visibility, rapid detection, and coordinated response across their entire IT environment. Managed Extended Detection and Response (MXDR) represents the next evolution in security, building on previous platforms like MDR and XDR to offer a more holistic detection and response approach. This white paper examines how MXDR enhances cybersecurity through continuous monitoring, advanced analytics, threat hunting, and other capabilities. It outlines the components of MXDR, including 24/7 monitoring,
APA, Harvard, Vancouver, ISO, and other styles
8

Sabeeruddin, shaik. "Impact of Endpoint Detection and Response (EDR) Tools on SOC Efficiency." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 5 (2024): 1–6. https://doi.org/10.5281/zenodo.14762654.

Full text
Abstract:
Endpoint Detection and Response (EDR) systems have become crucial in modern cybersecurity operations, especially in improving the effectiveness of Security Operations centers (SOC). This study analyses the transformative impact of EDR technologies on SOC operations, incident response, and overall security posture. This paper utilizes a synthesis of literature and practical case studies to explain the advantages and challenges of EDR technologies, ultimately providing strategic recommendations for effective integration. The article outlines key metrics and standards for assessing the effectiven
APA, Harvard, Vancouver, ISO, and other styles
9

Park, So-Hyun, Sun-Woo Yun, So-Eun Jeon, et al. "Performance Evaluation of Open-Source Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection." IEEE Access 10 (2022): 20259–69. http://dx.doi.org/10.1109/access.2022.3152574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sholeh, Muchammad, and Almima Monalisa. "MEMBANGUN AGENT ENDPOINT DETECTION AND RESPONSE (EDR) MENGGUNAKAN WAZUH DAN VIRUSTOTAL SEBAGAI SISTEM DETEKSI SERANGAN RANSOMWARE LOCKBIT 3.0." Infotech: Journal of Technology Information 10, no. 2 (2024): 279–88. https://doi.org/10.37365/jti.v10i2.320.

Full text
Abstract:
Internet users who are still public with cyber threats can be the main target of cyber criminals who want to take away a variety of things that Internet users own, one of which is personal data. Ransomware is one of the most widely used types of cyber attacks today to lock data on the victim's computer and then ask for ransom in the amount of money so that the data can be reopened. The aim of this study is to detect the threat on the server from the LockBit 3.0 ransomware attack using the Wazuh open source platform with the VirusTotal API integration as well as to know the effectiveness of End
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Endpoint Detection and Response"

1

Goodlin, Brian E. 1974. "Multivariate endpoint detection of plasma etching processes." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8498.

Full text
Abstract:
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Chemical Engineering, 2002.<br>Includes bibliographical references.<br>In plasma etching process it is critical to know when the film being etched has cleared to the underlying film, i.e. to detect endpoint, in order to achieve the desired device performance in the resulting integrated circuit. The most highly utilized sensor technology for determining endpoint has historically been optical emission spectroscopy (OES), because it is both non-invasive and highly sensitive to chemical changes in the reactor. Historically, the intens
APA, Harvard, Vancouver, ISO, and other styles
2

Nam, Jamie (Jamie Hyun) 1975. "Optical endpoint detection for the chemical mechanical polishing process." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9014.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2000.<br>Includes bibliographical references (leaves 92-95).<br>This thesis covers the design and implementation of a mechanism for detecting the endpoint for the Chemical Mechanical Polishing process of copper wafers. The proposed mechanism will detect the reflectance difference found in semiconductor materials to trigger the stop of the polishing process. This will prevent over polishing of the wafer while ensuring the optimal removal of excess materials. The mechanism is intended to run in-situ, while the
APA, Harvard, Vancouver, ISO, and other styles
3

Le, Minh Sy. "Variation reduction in plasma etching via run-to-run process control and endpoint detection." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Hui. "Response Adaptive Randomization using Surrogate and Primary Endpoints." VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4517.

Full text
Abstract:
In recent years, adaptive designs in clinical trials have been attractive due to their efficiency and flexibility. Response adaptive randomization procedures in phase II or III clinical trials are proposed to appeal ethical concerns by skewing the probability of patient assignments based on the responses obtained thus far, so that more patients will be assigned to a superior treatment group. General response-adaptive randomizations usually assume that the primary endpoint can be obtained quickly after the treatment. However, in real clinical trials, the primary outcome is delayed, making it un
APA, Harvard, Vancouver, ISO, and other styles
5

Ibrahim, Tarik Mohamed Abdel-Kader. "Improving intrusion prevention, detection and response." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/479.

Full text
Abstract:
In the face of a wide range of attacks, Intrusion Detection Systems (IDS) and other Internet security tools represent potentially valuable safeguards to identify and combat the problems facing online systems. However, despite the fact that a variety of commercial and open source solutions are available across a range of operating systems and network platforms, it is notable that the deployment of IDS is often markedly less than other well-known network security countermeasures and other tools may often be used in an ineffective manner. This thesis considers the challenges that users may face w
APA, Harvard, Vancouver, ISO, and other styles
6

Dincal, Selcuk. "Structural damage detection using frequency response functions." Thesis, Texas A&M University, 2005. http://hdl.handle.net/1969.1/3129.

Full text
Abstract:
This research investigates the performance of an existing structural damage detection method (SDIM) when only experimentally-obtained measurement information can be used to calculate the frequency response functions used to detect damage. The development of a SDIM that can accurately identify damage while processing measurements containing realistic noise levels and overcoming experimental modeling errors would provide a robust method for identifying damage in the larger, more complex structures found in practice. The existing SDIM program, GaDamDet, uses an advanced genetic algorithm, along w
APA, Harvard, Vancouver, ISO, and other styles
7

Shakiba, Mohammad Hossein. "Analog Viterbi detection for partial-response signaling." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ27719.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mason, S. M. "Objective waveform detection in electric response audiometry." Thesis, University of Nottingham, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.353922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hermansson, Albin. "View-Dependent Collision Detection and Response Using Octrees." Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12751.

Full text
Abstract:
Context. Collision is a basic necessity in most simulated environments, especially video games, which demand user interaction. Octrees are a way to divide the simulated environments into smaller, more manageable parts,and is a hierarchical tree-structure, where each node has eight children. Octrees and similar tree-structural methods have been used frequently to optimize collision calculations and partition the objects in the 3D space. Objectives. The aim of this thesis is to find a way to further improve upon the octree structure, by using a two-level octree structure, and simplify the collis
APA, Harvard, Vancouver, ISO, and other styles
10

ul, Haq M. Anwar. "White rot of onion-plant response and detection." Thesis, University of Liverpool, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.367806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Endpoint Detection and Response"

1

Shakiba, Mohammad Hossein. Analog Viterbi detection for partial-response signaling. National Library of Canada = Bibliothèque nationale du Canada, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flammini, Francesco. Critical infrastructure security: Assessment, prevention, detection, response. WIT Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Department of Homeland Security. Office of Inspector General. DHS' Domestic Nuclear Detection Office progress in integrating detection capabilities and response protocols. U.S. Dept. of Homeland Security, Office of Inspector General, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Apikyan, Samuel, David Diamond, and Ralph Way, eds. Prevention, Detection and Response to Nuclear and Radiological Threats. Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-6658-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bullock, Barbara F. Surveillance and detection: A public health response to bioterrorism. USAF Counterproliferation Center, Air War College, Air University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

NATO, Advanced Study Institute on Data Fusion for Situation Monitoring Incident Detection Alert and Response Management (2003 Yerevan Armenia). Data fusion for situation monitoring, incident detection, alert and response management. IOS Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Chengke. Novel approaches to alternator transient response prediction and rotor interturn fault detection. University of Manchester, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meijer, Rob R. Detection of advance item knowledge using response times in computer adaptive testing. Law School Admission Council, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Endpoint Detection and Response"

1

Deshpande, Dhananjay S., Abhijit Anil Tathe, Akshay Lahe, Bhushan Rathi, and Ghanshyam Parkhade. "Endpoint Detection and Response System: Emerging Cyber Security Technology." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5504-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Katulić, Filip, Stjepan Groš, Damir Sumina, and Igor Erceg. "Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools." In Smart Technologies for a Sustainable Future. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61891-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Qi. "Robust Endpoint Detection." In Speaker Authentication. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23731-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

van Roosmalen, A. J., J. A. G. Baggerman, and S. J. H. Brader. "Diagnostics and Endpoint Detection." In Dry Etching for VLSI. Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-2566-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guenat, O. T., Ph Arquint, W. E. Morf, B. H. van der Schoot, and N. F. de Rooij. "Coulometric Nanotitrators with Potentiometric Endpoint Detection." In Microreaction Technology. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72076-5_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ouzounov, Atanas. "Noisy Speech Endpoint Detection using Robust Feature." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

May, Oliver, and Paul Curwell. "Detection and response." In Terrorist Diversion. Routledge, 2020. http://dx.doi.org/10.4324/9780429441929-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shi, Zhangsong, and Zhonghong Wu. "Maneuver Target Detection Method with Iterative Endpoint Fitting Assisted." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38466-0_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alvi, Shaista. "Endpoint Security and Artificial Intelligence in the Financial Sector." In Handbook of AI-Driven Threat Detection and Prevention. CRC Press, 2025. https://doi.org/10.1201/9781003521020-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McLaughlin, Kevin Lynn. "Detection, Response, and Remediation." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Endpoint Detection and Response"

1

Harish, R., and M. P. Swapna. "Endpoint Detection and Response for Fileless Malware and LOLBin Threats." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Yingjing, Dustin Maas, and Jacobus Van der Merwe. "SigDetect: Collaborative Endpoint-based Signal Injection Attack Detection based on Channel Frequency Response." In 2025 IEEE 26th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2025. https://doi.org/10.1109/wowmom65615.2025.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prasad, Medisetti Durga, Mantha Sri N. V. R. Snigdha Sindusha, Nadendla Jahnavi, Mohammed Waajid Ali, and S. Anjali Devi. "Enabling Cybersecurity Defenses: Advanced Endpoint Detection, Data Breach Identification, and Anomaly Resolution." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sjarif, Nilam Nur Amir, Suriayati Chuprat, Mohd Naz'ri Mahrin, et al. "Endpoint Detection and Response: Why Use Machine Learning?" In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arfeen, Asad, Saad Ahmed, Muhammad Asim Khan, and Syed Faraz Ali Jafri. "Endpoint Detection & Response: A Malware Identification Solution." In 2021 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2021. http://dx.doi.org/10.1109/iccws53234.2021.9703010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hassan, Wajih Ul, Adam Bates, and Daniel Marino. "Tactical Provenance Analysis for Endpoint Detection and Response Systems." In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020. http://dx.doi.org/10.1109/sp40000.2020.00096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Purnomo, Yunianto, and Eliando Eliando. "Analysis of ransomware as a service using endpoint detection, response technology and mitigation techniques." In THE 1ST INTERNATIONAL CONFERENCE ON CONTROL, OPTIMIZATION AND MATHEMATICAL ENGINEERING 2021 (ICOCOME 2021). AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0237294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Feng, Shaofei Li, Peng Jiang, et al. "Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools." In CCS '23: ACM SIGSAC Conference on Computer and Communications Security. ACM, 2023. http://dx.doi.org/10.1145/3576915.3616580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Agarwal, Shubham, Arjun Sable, Devesh Sawant, Sunil Kahalekar, and Manjesh K. Hanawal. "Threat Detection and Response in Linux Endpoints." In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2022. http://dx.doi.org/10.1109/comsnets53615.2022.9668567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Fei, Anis N. Nordin, Fang Li, and Ioana Voiculescu. "A Sensitive Multiparametric Biosensor With Capabilities of Rapid Toxicity Detection of Drinking Water." In ASME 2013 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/imece2013-62281.

Full text
Abstract:
Recently, there has been interest to develop biosensors based on live mammalian cells to monitor the toxicity of water. The cell viability after exposure to toxic water can be monitored by electric cell-substrate impedance sensing (ECIS) of the cell membrane. However, these impedance based toxicity sensors can only provide one single sensing endpoint (impedance measurement), and many toxicants cannot be detected at the concentration between Military Exposure Guideline levels and estimated Human Lethal Concentrations. The goal of this paper is to provide a rapid and sensitive sensing platform f
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Endpoint Detection and Response"

1

Lee, Wenke. Next-Generation Botnet Detection and Response. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reilly, Mark E. Scalable Intrusion Detection and Response Framework. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Myers, Steven Charles. Radiation Detection Overview for Nuclear Emergency Response. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1333119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lakis, Rollin Evan. UAV Applications in Radiation Detection and Emergency Response. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1253522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jansen, Wayne, Peter Mell, Tom Karygiannis, and Don Marks. Applying mobile agents to intrusion detection and response. National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chumfong, Isabelle T., Ann S. Yoshimura, Todd H. West, Heidi R. Ammerlahn, and Lynn I. Yang. Earlier detection in emergency response to an anthrax attack. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/883130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tan, Pang-Ning, and Anil K. Jain. Information Assurance: Detection & Response to Web Spam Attacks. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada535002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Inderieden, R. S., H. R. Everett, T. A. Heath-Pastore, and R. P. Smurlo. Overview of the Mobile Detection Assessment and Response System. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada422465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ralston, James M. Impulse Response of Alternative Synthetic Apertures for Subsurface Detection. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada385875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mukhopadhyay, Sanjoy, Richard Maurer, and Mark Biery. Networked radiation detection system for rapid tactical response [Slides]. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1832151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!