Academic literature on the topic 'Network attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network attack"
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textWinda Andrini Wulandari. "THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 3, no. 1 (2018): 18–25. http://dx.doi.org/10.20527/jtiulm.v3i1.24.
Full textQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Full textPark, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (2020): 8079. http://dx.doi.org/10.3390/app10228079.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Full textGandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.
Full textMoskal, Stephen, Shanchieh Jay Yang, and Michael E. Kuhl. "Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (2017): 13–29. http://dx.doi.org/10.1177/1548512917725408.
Full textPodobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.
Full textYan, Yao, and Rui Xu. "DDoS Attacks for Ad Hoc Network Based on Attack Cluster." Advanced Materials Research 546-547 (July 2012): 1371–76. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1371.
Full textDissertations / Theses on the topic "Network attack"
Avidan, Lenoy. "Dynamic Shifting of Virtual Network Topologies for Network Attack Prevention." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/1986.
Full textKaraaslan, Ibrahim. "Anti-sensor Network: Distortion-based Distributed Attack In Wireless Sensor Networks." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609276/index.pdf.
Full textGerbert, Oscar. "Attack on the Chaos Sensor Network Protocol." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480.
Full textVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Full textTan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Full textHamid, Thaier K. A. "Attack graph approach to dynamic network vulnerability analysis and countermeasures." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/576432.
Full textSchuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.
Full textKlaus, Christian. "Network design for reliability and resilience to attack." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41406.
Full textMohammadnia, Hamzeh. "IoT-NETZ: Spoong Attack Mitigation in IoT Network." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260250.
Full textKenar, Serkan. "An Extensible Framework For Automated Network Attack Signature Generation." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611418/index.pdf.
Full textBooks on the topic "Network attack"
College), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Naval War College, 2002.
Find full textHarrison, R. F. Neur al networks,heart attack and bayesian decisions: An application oof the Boltzmann perceptron network. University of Sheffield, Dept. of Automatic Control & Systems Engineering, 1994.
Find full textKarppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. VTT Technical Research Centre of Finland, 2005.
Find full textMonte, Matthew. Network Attacks & Exploitation. John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183440.
Full textPerez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Syngress, 2010.
Find full textZhou, Qing, Long Gao, Ruifang Liu, and Shuguang Cui. Network Robustness under Large-Scale Attacks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-4860-0.
Full textBook chapters on the topic "Network attack"
Wang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Attack Graph and Network Hardening." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_3.
Full textMendel, Florian, Tomislav Nad, and Martin Schläffer. "Collision Attack on Boole." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_23.
Full textYang, Qing, and Lin Huang. "Mobile Network Security." In Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8_8.
Full textTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-6170-8_348.
Full textTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_348.
Full textTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4614-7163-9_348-1.
Full textLee, Heejo, and Jong Kim. "Attack Resiliency of Network Topologies." In Parallel and Distributed Computing: Applications and Technologies. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30501-9_123.
Full textYu, Hongbo, Gaoli Wang, Guoyan Zhang, and Xiaoyun Wang. "The Second-Preimage Attack on MD4." In Cryptology and Network Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599371_1.
Full textTodo, Yosuke, and Kazumaro Aoki. "FFT Key Recovery for Integral Attack." In Cryptology and Network Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_5.
Full textYang, Lin, Meiqin Wang, and Siyuan Qiao. "Side Channel Cube Attack on PRESENT." In Cryptology and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10433-6_25.
Full textConference papers on the topic "Network attack"
Alzubi, Saif, Frederic T. Stahl, and Mohamed M. Gaber. "Towards Intrusion Detection Of Previously Unknown Network Attacks." In 35th ECMS International Conference on Modelling and Simulation. ECMS, 2021. http://dx.doi.org/10.7148/2021-0035.
Full textChen, Yu, Shahin Jabbari, Michael Kearns, Sanjeev Khanna, and Jamie Morgenstern. "Network Formation under Random Attack and Probabilistic Spread." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/26.
Full textIngols, Kyle, Matthew Chu, Richard Lippmann, Seth Webster, and Stephen Boyer. "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.21.
Full textLei, Jie, and Zhi-tang Li. "Using Network Attack Graph to Predict the Future Attacks." In 2007 Second International Conference on Communications and Networking in China. IEEE, 2007. http://dx.doi.org/10.1109/chinacom.2007.4469413.
Full textLi, Man, and Jinjing Cao. "Network Attack Defense Awareness." In Next Generation Computer and Information Technology 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.111.34.
Full textWang, Weifeng, Xinyu Zhang, Likai Dong, Yuling Fan, Xinyi Diao, and Tao Xu. "Network Attack Detection based on Domain Attack Behavior Analysis." In 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2020. http://dx.doi.org/10.1109/cisp-bmei51763.2020.9263663.
Full textRoy, Sangita, and Ashok Singh Sairam. "Network Attack Detection and Mitigation." In 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2015. http://dx.doi.org/10.1109/sasow.2015.33.
Full textMarechal, Emeline, and Benoit Donnet. "Network Fingerprinting: Routers under Attack." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00086.
Full textVykopal, Jan, Tomas Plesnik, and Pavel Minarik. "Network-Based Dictionary Attack Detection." In 2009 International Conference on Future Networks, ICFN. IEEE, 2009. http://dx.doi.org/10.1109/icfn.2009.36.
Full textToth, Rudolf, Zoltan Faigl, Mate Szalay, and Sandor Imre. "An Advanced Timing Attack Scheme on RSA." In 2008 13th International Telecommunications Network Strategy and Planning Symposium (NETWORKS). IEEE, 2008. http://dx.doi.org/10.1109/netwks.2008.4763727.
Full textReports on the topic "Network attack"
May, Jack, and James Petersen. Network Attack Program. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada387940.
Full textLenderman, Curtis C. Computer Network Attack: An Operational Tool? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada415427.
Full textBusby, Daniel J. Peacetime Use of Computer Network Attack. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada377624.
Full textSalowey, J., and S. Hanna. The Network Endpoint Assessment (NEA) Asokan Attack Analysis. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6813.
Full textKahn, Russell L. Attack Analyzer: A Network Analysis and Visualization Tool. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada464353.
Full textFU, Fabian. End-to-End and Network-wide Attack Defense Solution -Overhaul Carrier Network Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas006.
Full textWilliamson, Jennie M. Information Operations: Computer Network Attack in the 21st Century. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402018.
Full textHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500822.
Full textPresby, Timothy D. Computer Network Attack and Its Effectiveness against Non-State Actors. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada463692.
Full textYounes, Paul R. Follow the Money: Using Computer Network Attack to Enforce Economic Sanctions. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada390083.
Full text