Academic literature on the topic 'Endpoint Detection and Response'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Endpoint Detection and Response.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Endpoint Detection and Response"
Kaur, Harmionee, and Richa Tiwari. "Endpoint detection and response using machine learning." Journal of Physics: Conference Series 2062, no. 1 (2021): 012013. http://dx.doi.org/10.1088/1742-6596/2062/1/012013.
Full textMohammed, Mujtaba, A. Omair Aseel, A. Zowaid Rawan, and S. Ahmed Zaki. "Enhance Cyber Security with EDR and XDR Solutions." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 128–32. https://doi.org/10.5281/zenodo.8285623.
Full textKodituwakku, Angel, and Jens Gregor. "InMesh: A Zero-Configuration Agentless Endpoint Detection and Response System." Electronics 14, no. 7 (2025): 1292. https://doi.org/10.3390/electronics14071292.
Full textShtonda, Roman, Yuliya Chernish, Irina Maltseva, Yurii Tsykalo, Yevhen Chaika, and Serhiy Polishchuk. "PRACTICAL APPROACHES TO CYBER PROTECTION OF MOBILE DEVICES WITH THE HELP OF A SOLUTION ENDPOINT DETECTION AND RESPONSE." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 17–31. http://dx.doi.org/10.28925/2663-4023.2023.21.1731.
Full textShtonda, Roman, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii, and Pavlo Kutsaiev. "METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 380–89. https://doi.org/10.28925/2663-4023.2025.27.737.
Full textGundaboina, Anjan Kumar. "Endpoint Detection and Response (EDR) in Healthcare: Mitigating Threats on Critical Devices." Journal of Technology and Systems 7, no. 4 (2025): 50–65. https://doi.org/10.47941/jts.2878.
Full textA.Shaji, George, S.Sagayarajan, T.Baskar, and George A.S.Hovan. "Extending Detection and Response: How MXDR Evolves Cybersecurity." Partners Universal International Innovation Journal (PUIIJ) 01, no. 04 (2023): 268–85. https://doi.org/10.5281/zenodo.8284342.
Full textSabeeruddin, shaik. "Impact of Endpoint Detection and Response (EDR) Tools on SOC Efficiency." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 5 (2024): 1–6. https://doi.org/10.5281/zenodo.14762654.
Full textPark, So-Hyun, Sun-Woo Yun, So-Eun Jeon, et al. "Performance Evaluation of Open-Source Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection." IEEE Access 10 (2022): 20259–69. http://dx.doi.org/10.1109/access.2022.3152574.
Full textSholeh, Muchammad, and Almima Monalisa. "MEMBANGUN AGENT ENDPOINT DETECTION AND RESPONSE (EDR) MENGGUNAKAN WAZUH DAN VIRUSTOTAL SEBAGAI SISTEM DETEKSI SERANGAN RANSOMWARE LOCKBIT 3.0." Infotech: Journal of Technology Information 10, no. 2 (2024): 279–88. https://doi.org/10.37365/jti.v10i2.320.
Full textDissertations / Theses on the topic "Endpoint Detection and Response"
Goodlin, Brian E. 1974. "Multivariate endpoint detection of plasma etching processes." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8498.
Full textNam, Jamie (Jamie Hyun) 1975. "Optical endpoint detection for the chemical mechanical polishing process." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9014.
Full textLe, Minh Sy. "Variation reduction in plasma etching via run-to-run process control and endpoint detection." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43565.
Full textWang, Hui. "Response Adaptive Randomization using Surrogate and Primary Endpoints." VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4517.
Full textIbrahim, Tarik Mohamed Abdel-Kader. "Improving intrusion prevention, detection and response." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/479.
Full textDincal, Selcuk. "Structural damage detection using frequency response functions." Thesis, Texas A&M University, 2005. http://hdl.handle.net/1969.1/3129.
Full textShakiba, Mohammad Hossein. "Analog Viterbi detection for partial-response signaling." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ27719.pdf.
Full textMason, S. M. "Objective waveform detection in electric response audiometry." Thesis, University of Nottingham, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.353922.
Full textHermansson, Albin. "View-Dependent Collision Detection and Response Using Octrees." Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12751.
Full textul, Haq M. Anwar. "White rot of onion-plant response and detection." Thesis, University of Liverpool, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.367806.
Full textBooks on the topic "Endpoint Detection and Response"
Shakiba, Mohammad Hossein. Analog Viterbi detection for partial-response signaling. National Library of Canada = Bibliothèque nationale du Canada, 1997.
Find full textFlammini, Francesco. Critical infrastructure security: Assessment, prevention, detection, response. WIT Press, 2012.
Find full textWayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textWayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. DHS' Domestic Nuclear Detection Office progress in integrating detection capabilities and response protocols. U.S. Dept. of Homeland Security, Office of Inspector General, 2007.
Find full textApikyan, Samuel, David Diamond, and Ralph Way, eds. Prevention, Detection and Response to Nuclear and Radiological Threats. Springer Netherlands, 2008. http://dx.doi.org/10.1007/978-1-4020-6658-0.
Full textBullock, Barbara F. Surveillance and detection: A public health response to bioterrorism. USAF Counterproliferation Center, Air War College, Air University, 2002.
Find full textNATO, Advanced Study Institute on Data Fusion for Situation Monitoring Incident Detection Alert and Response Management (2003 Yerevan Armenia). Data fusion for situation monitoring, incident detection, alert and response management. IOS Press, 2005.
Find full textZhou, Chengke. Novel approaches to alternator transient response prediction and rotor interturn fault detection. University of Manchester, 1994.
Find full textMeijer, Rob R. Detection of advance item knowledge using response times in computer adaptive testing. Law School Admission Council, 2006.
Find full textBook chapters on the topic "Endpoint Detection and Response"
Deshpande, Dhananjay S., Abhijit Anil Tathe, Akshay Lahe, Bhushan Rathi, and Ghanshyam Parkhade. "Endpoint Detection and Response System: Emerging Cyber Security Technology." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5504-2_24.
Full textKatulić, Filip, Stjepan Groš, Damir Sumina, and Igor Erceg. "Enhancing Industrial Automation and Control Systems Cybersecurity Using Endpoint Detection and Response Tools." In Smart Technologies for a Sustainable Future. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61891-8_18.
Full textLi, Qi. "Robust Endpoint Detection." In Speaker Authentication. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23731-7_5.
Full textvan Roosmalen, A. J., J. A. G. Baggerman, and S. J. H. Brader. "Diagnostics and Endpoint Detection." In Dry Etching for VLSI. Springer US, 1991. http://dx.doi.org/10.1007/978-1-4899-2566-4_7.
Full textGuenat, O. T., Ph Arquint, W. E. Morf, B. H. van der Schoot, and N. F. de Rooij. "Coulometric Nanotitrators with Potentiometric Endpoint Detection." In Microreaction Technology. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72076-5_41.
Full textOuzounov, Atanas. "Noisy Speech Endpoint Detection using Robust Feature." In Biometric Authentication. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13386-7_9.
Full textMay, Oliver, and Paul Curwell. "Detection and response." In Terrorist Diversion. Routledge, 2020. http://dx.doi.org/10.4324/9780429441929-9.
Full textShi, Zhangsong, and Zhonghong Wu. "Maneuver Target Detection Method with Iterative Endpoint Fitting Assisted." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38466-0_93.
Full textAlvi, Shaista. "Endpoint Security and Artificial Intelligence in the Financial Sector." In Handbook of AI-Driven Threat Detection and Prevention. CRC Press, 2025. https://doi.org/10.1201/9781003521020-8.
Full textMcLaughlin, Kevin Lynn. "Detection, Response, and Remediation." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-9.
Full textConference papers on the topic "Endpoint Detection and Response"
Harish, R., and M. P. Swapna. "Endpoint Detection and Response for Fileless Malware and LOLBin Threats." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725289.
Full textWu, Yingjing, Dustin Maas, and Jacobus Van der Merwe. "SigDetect: Collaborative Endpoint-based Signal Injection Attack Detection based on Channel Frequency Response." In 2025 IEEE 26th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2025. https://doi.org/10.1109/wowmom65615.2025.00022.
Full textPrasad, Medisetti Durga, Mantha Sri N. V. R. Snigdha Sindusha, Nadendla Jahnavi, Mohammed Waajid Ali, and S. Anjali Devi. "Enabling Cybersecurity Defenses: Advanced Endpoint Detection, Data Breach Identification, and Anomaly Resolution." In 2024 8th International Conference on Inventive Systems and Control (ICISC). IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00084.
Full textSjarif, Nilam Nur Amir, Suriayati Chuprat, Mohd Naz'ri Mahrin, et al. "Endpoint Detection and Response: Why Use Machine Learning?" In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939836.
Full textArfeen, Asad, Saad Ahmed, Muhammad Asim Khan, and Syed Faraz Ali Jafri. "Endpoint Detection & Response: A Malware Identification Solution." In 2021 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2021. http://dx.doi.org/10.1109/iccws53234.2021.9703010.
Full textHassan, Wajih Ul, Adam Bates, and Daniel Marino. "Tactical Provenance Analysis for Endpoint Detection and Response Systems." In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020. http://dx.doi.org/10.1109/sp40000.2020.00096.
Full textPurnomo, Yunianto, and Eliando Eliando. "Analysis of ransomware as a service using endpoint detection, response technology and mitigation techniques." In THE 1ST INTERNATIONAL CONFERENCE ON CONTROL, OPTIMIZATION AND MATHEMATICAL ENGINEERING 2021 (ICOCOME 2021). AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0237294.
Full textDong, Feng, Shaofei Li, Peng Jiang, et al. "Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools." In CCS '23: ACM SIGSAC Conference on Computer and Communications Security. ACM, 2023. http://dx.doi.org/10.1145/3576915.3616580.
Full textAgarwal, Shubham, Arjun Sable, Devesh Sawant, Sunil Kahalekar, and Manjesh K. Hanawal. "Threat Detection and Response in Linux Endpoints." In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2022. http://dx.doi.org/10.1109/comsnets53615.2022.9668567.
Full textLiu, Fei, Anis N. Nordin, Fang Li, and Ioana Voiculescu. "A Sensitive Multiparametric Biosensor With Capabilities of Rapid Toxicity Detection of Drinking Water." In ASME 2013 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/imece2013-62281.
Full textReports on the topic "Endpoint Detection and Response"
Lee, Wenke. Next-Generation Botnet Detection and Response. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500564.
Full textReilly, Mark E. Scalable Intrusion Detection and Response Framework. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408445.
Full textMyers, Steven Charles. Radiation Detection Overview for Nuclear Emergency Response. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1333119.
Full textLakis, Rollin Evan. UAV Applications in Radiation Detection and Emergency Response. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1253522.
Full textJansen, Wayne, Peter Mell, Tom Karygiannis, and Don Marks. Applying mobile agents to intrusion detection and response. National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6416.
Full textChumfong, Isabelle T., Ann S. Yoshimura, Todd H. West, Heidi R. Ammerlahn, and Lynn I. Yang. Earlier detection in emergency response to an anthrax attack. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/883130.
Full textTan, Pang-Ning, and Anil K. Jain. Information Assurance: Detection & Response to Web Spam Attacks. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada535002.
Full textInderieden, R. S., H. R. Everett, T. A. Heath-Pastore, and R. P. Smurlo. Overview of the Mobile Detection Assessment and Response System. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada422465.
Full textRalston, James M. Impulse Response of Alternative Synthetic Apertures for Subsurface Detection. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada385875.
Full textMukhopadhyay, Sanjoy, Richard Maurer, and Mark Biery. Networked radiation detection system for rapid tactical response [Slides]. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1832151.
Full text