Academic literature on the topic 'Network Threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network Threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network Threats"

1

Saddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Full text
Abstract:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. E
APA, Harvard, Vancouver, ISO, and other styles
2

Novokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (2019): 1506. http://dx.doi.org/10.3390/sym11121506.

Full text
Abstract:
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections b
APA, Harvard, Vancouver, ISO, and other styles
3

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.

Full text
Abstract:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO, and other styles
4

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.

Full text
Abstract:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO, and other styles
5

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.

Full text
Abstract:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO, and other styles
6

Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, and Olukunle Oladipupo Amoo. "A comprehensive review of machine learning's role in enhancing network security and threat detection." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 877–86. http://dx.doi.org/10.30574/wjarr.2024.21.2.0501.

Full text
Abstract:
As network security threats continue to evolve in complexity and sophistication, there is a growing need for advanced solutions to enhance network security and threat detection capabilities. Machine learning (ML) has emerged as a powerful tool in this context, offering the potential to detect and mitigate threats in real-time by analyzing vast amounts of network data. This comprehensive review explores the role of machine learning in enhancing network security and threat detection. The review begins by providing an overview of the current landscape of network security threats and the challenge
APA, Harvard, Vancouver, ISO, and other styles
7

Akoh, Atadoga, Oluwademilade Sodiya Enoch, Joseph Umoga Uchenna, and Oladipupo Amoo Olukunle. "A comprehensive review of machine learning's role in enhancing network security and threat detection." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 877–86. https://doi.org/10.5281/zenodo.14008462.

Full text
Abstract:
As network security threats continue to evolve in complexity and sophistication, there is a growing need for advanced solutions to enhance network security and threat detection capabilities. Machine learning (ML) has emerged as a powerful tool in this context, offering the potential to detect and mitigate threats in real-time by analyzing vast amounts of network data. This comprehensive review explores the role of machine learning in enhancing network security and threat detection. The review begins by providing an overview of the current landscape of network security threats and the challenge
APA, Harvard, Vancouver, ISO, and other styles
8

K, Pramod, and Aswathy Venu. "Self-Defending Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2330–37. http://dx.doi.org/10.22214/ijraset.2023.49894.

Full text
Abstract:
Abstract: As the nature of the threat in networks evolves daily, it is vitally important that defense techniques evolve as well. Earlier threats from both internal and external sources were gradual and can be easily tracked and destroyed. But now Internet worms are spread all over the world, so it is essential for protection systems and the network itself to respond immediately to threats. The basis of community self-defense is the importance of countering threats in the community. Every device found in a community plays a vital role in keeping the community safe. This guarantees the security
APA, Harvard, Vancouver, ISO, and other styles
9

Kwubeghari, Anthony, Lucy Ifeyinwa Ezigbo, and Francis Amaechi Okoye. "Modelling of Cyber Attack Detection and Response System for 5G Network Using Machine Learning Technique." ABUAD Journal of Engineering Research and Development (AJERD) 7, no. 2 (2024): 297–307. http://dx.doi.org/10.53982/ajerd.2024.0702.29-j.

Full text
Abstract:
The rapid increase in the adoption of 5G networks has revolutionized communication technologies, enabling high-speed data transmission and connectivity across various domains. However, the advent of 5G technology comes with an increased risk of cyber-attacks and security breaches, necessitating the development of robust defence mechanisms to safeguard network infrastructure and mitigate potential threats. The work presents a novel approach for modelling a cyber-attack response system tailored specifically for 5G networks, leveraging machine learning techniques to enhance threat detection and r
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.

Full text
Abstract:
With the wide application of network technology, the Internet of Things (IoT) systems are facing the increasingly serious situation of network threats; the network threat situation assessment becomes an important approach to solve these problems. Aiming at the traditional methods based on data category tag that has high modeling cost and low efficiency in the network threat situation assessment, this paper proposes a network threat situation assessment model based on unsupervised learning for IoT. Firstly, we combine the encoder of variational autoencoder (VAE) and the discriminator of generat
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Network Threats"

1

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
APA, Harvard, Vancouver, ISO, and other styles
2

Berthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.

Full text
Abstract:
Thesis (Ph.D.) -- University of Maryland, College Park, 2009.<br>Thesis research directed by: Reliability Engineering Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
3

Stojanov, Martin. "eHealth and IT in Network Healthcare : Threats and Opportunities." Thesis, Uppsala universitet, Avdelningen för visuell information och interaktion, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-262195.

Full text
Abstract:
Stockholm's healthcare system faces increasing strains on its resources. In order to address these issues, the Stockholm county council has devised a plan for future healthcare, as well as a strategy for IT to accompany this future vision. This master’s thesis investigates inhibitors and facilitators facing this IT-strategy and subsequently evaluates its efficacy based on interviews with individuals with extensive knowledge of Health IT in Sweden. This study employs a holistic and socio-technical perspective on eHealth and healthcare IT, regarding the object of study as an information infrastr
APA, Harvard, Vancouver, ISO, and other styles
4

Denison, Stephen. "The accessibility of insider threats on a corporate network." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604807.

Full text
Abstract:
<p> Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization&rsquo;s critical assets, physical access to computers, and more privileges than their outside counterparts. This paper will outline three different areas of accessibility issues that insiders can take advantage of in order to leak sensitive information; exfiltration methods, encryption, and corporate considerations of best practices. Data exfiltration focuses on the different techniques that insiders can use to transfer sensiti
APA, Harvard, Vancouver, ISO, and other styles
5

Lysenko, Julia Vladimirovna, and Юлія Володимирівна Лисенко. "5G-technology: social advantaged and threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51667.

Full text
Abstract:
References: 1. Understanding 5G [Electronicresource]. − Retrievedfrom:http://www. 2.Perspekty`vy` rozvy`tku 5G zv’yazku.Olejnikova A.V., Nurtaj M.D., Shmanov N.M. Suchasnimaterialy`, texnika i texnologiyi. [Перспективи розвитку 5G зв’язку. Олейнікова А.В., Нуртай М.Д., Шманов Н.М. Сучасні матеріали, техніка і технології.] 2015. № 2 (2). С. 233- 2<br>The development of information technology in the modern world is one of the most important factors that significantly affects the pace and achievement of scientific and technological progress. All spheres of human activity are considered only d
APA, Harvard, Vancouver, ISO, and other styles
6

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

Full text
Abstract:
This paper examines the possibilities of performing tests with the aim to ensure that devices in a SCADA network can be deemed secure before deployment. SCADA systems are found in most industries and have recently seen an increased use in building automation, most importantly the healthcare sector, which means that a successful attack toward such a system could endanger lives of patients and healthcare professionals.The method of testing was created to examine whether devices conflicted with the security flaws identified by OWASP IoT Top 10 list, meaning that OWASP IoT Top 10 was the foundatio
APA, Harvard, Vancouver, ISO, and other styles
7

Ekwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Full text
Abstract:
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Dakun. "Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7938.

Full text
Abstract:
This dissertation includes three approaches we have been designed to tackle threats and challenges in network, software, and mobile security. The first approach demonstrates a new class of content masking attacks against the Adobe PDF standard, causing documents to appear to humans dissimilar to the underlying content extracted by information-based services. The second work protects sensitive data in binaries from being corrupted by cyber attackers. The last work proposes a mechanism which utilizes the unique walking patterns inherent to humans and differentiate our work from other walking beh
APA, Harvard, Vancouver, ISO, and other styles
10

Clementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.

Full text
Abstract:
<p>Client-side computers connected to the Internet today are exposed to a lot malicious activity. Browsing the web can easily result in malware infection even if the user only visits well known and trusted sites. Attackers use website vulnerabilities and ad-networks to expose their malicious code to a large user base. The continuing trend of the attackers seems to be botnet construction that collects large amounts of data which could be a serious threat to company secrets and personal integrity. Meanwhile security researches are using a technology known as honeypots/honeyclients to find and an
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Network Threats"

1

Cameron, Debra. Global network security: Threats and countermeasures. Computer Technology Research Corp., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Denning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Philippe, B. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Denning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Research Institute for Advanced Computer Science (U.S.), ed. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1967-, Wright Rebecca N., and Neumann Peter 1932-, eds. Network threats: DIMCS workshop, December 2-4, 1996. American Mathematical Society, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hubbard, Douglas W. Pulse: The new science of harnessing Internet buzz to track threats and opportunities. Wiley, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sturmer, Richard Von. A network of dissolving threads. Auckland University Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ari, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Network Threats"

1

Grammatikis, Panagiotis Radoglou, and Panagiotis Sarigiannidis. "Network Threats." In Cyber-Security Threats, Actors, and Dynamic Mitigation. CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meadows, Catherine. "A representation of protocol attacks for risk assessment." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Dan, and Shiu-Kai Chin. "Verifying privacy enhanced mail functions with higher order logic." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Joye, Marc, and Jean-Jacques Quisquater. "Cryptanalysis of RSA-type cryptosystems: A visit." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patel, Sarvar. "Information leakage in encrypted key exchange." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shostack, Adam. "Observed weaknesses in security dynamics’ client/server protocol." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dean, Drew. "Web security: A high level view." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wallach, Dan, Jim Roskind, and Edward Felten. "Flexible, extensible Java security using digital signature." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Burmester, Mike, Yvo Desmedt, and Grigori Kabatianski. "Trust and security: A new look at the Byzantine generals problem." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hall, Robert. "Channels: Avoiding unwanted electronic mail." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/09.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network Threats"

1

Dhabliya, Dharmesh, N. Thangarasu, Shivam Khurana, X. Mercilin Raajini, Shobhit Goyal, and D. T. Arunkumar. "Vehicular Network Security: Threats, Vulnerabilities and Countermeasures." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qin, Qiu, Xu Sijia, Liu Shenglan, Xu Tianni, and Zhao Bei. "Network Virtualization Security: Threats, Measures, and Use Cases." In 2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K). IEEE, 2024. https://doi.org/10.23919/ituk62727.2024.10772977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Zhida, Xiaoli Li, Haobin Shen, Xiaolu Zhang, Wanji Wang, and Dehua Xie. "Detecting advanced persistent threats via casual graph neural network." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3052125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uzair, Muhammad, Husnain Mushtaq, Zafran Waheed, Irshad Ullah, and Adeel Ahmed Abbasi. "Comprehensive Analysis of Computer Network Threats and Security Measures." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thummala, Venkata Reddy, Phanindra Kumar Kankanampati, Pratik Agarwal, Swethasri Kavuri, Ravi Mandliya, and Arpit Goel. "Network Security Threats and Mitigation Strategies in Mobile Networks: A Machine Learning Perspective." In 2025 International Conference on Pervasive Computational Technologies (ICPCT). IEEE, 2025. https://doi.org/10.1109/icpct64145.2025.10940458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Francis, Georges, Majed Sanan, Makram Hatoum, Nader Bakir, and Khouloud Samrouth. "Detecting Advanced Persistent Threats on a Network Using Machine Learning." In 2024 International Conference on Smart Systems and Power Management (IC2SPM). IEEE, 2024. https://doi.org/10.1109/ic2spm62723.2024.10841340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xia, Tao, Menglin Wang, Jun He, Hai Guo, Zhiqiang Qu, and Jianguo Yuan. "Research on Drone Network Security Issues under Quantum Attack Threats." In 2024 4th International Conference on Communication Technology and Information Technology (ICCTIT). IEEE, 2024. https://doi.org/10.1109/icctit64404.2024.10928461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harsha Vardhan, S., Mahesh Kumar Jha, Raveesh Hegde, Monika Singh, P. Rubini, and Amar Choudhary. "Security and Threats in Aviation: Cryptographic Based Network Security System." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10828771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guan, Shan, Francois Ayello, Narasi Sridhar, Jianping Liu, and Qingshan Feng. "Development of a Probabilistic Model for Assessing Pipeline Third Party Damage Threats." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12719.

Full text
Abstract:
Abstract Third Party Damage (TPD) represents the largest threat to the integrity of onshore oil and gas pipelines. There exist needs for developing reliable models that can quantify the probability of pipeline exposure to TPD threats. Bayesian networks (BN) modeling possesses the advantage to quantify the uncertainties and identify where the reduction of these uncertainties has the greatest benefit in terms of the overall failure. This paper reports a modeling approach using Bayesian Network to quantify the Mechanical damage (a major form of TPD) threats to pipeline. Case studies to exam excav
APA, Harvard, Vancouver, ISO, and other styles
10

Kulkarni, G., P. Khatawkar, K. Gaikwad, V. Solanke, R. Shelk, and S. Gujar. "Wireless sensor network security threats." In Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2225.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Network Threats"

1

Heckathorn, Matthew. Network Monitoring for Web-Based Threats. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada537060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vogt, C., and J. Kempf. Security Threats to Network-Based Localized Mobility Management (NETLMM). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hranov, Nikolay Naydenov. Evaluation techniques for cyber threats in network management systems. Procon, 2023. http://dx.doi.org/10.11610/it4sec.0151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lippmann, R. P., J. F. Riordan, T. H. Yu, and K. K. Watson. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada565825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sentz, Kari, and Jacob Green. Threat Network: Network of Networks Graphic. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1162150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wilson, A. M., and M. C. Kelman. Assessing the relative threats from Canadian volcanoes. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328950.

Full text
Abstract:
This report presents an analysis of the threat posed by active volcanoes in Canada and outlines directives to bring Canadian volcano monitoring and research into alignment with global best practices. We analyse 28 Canadian volcanoes in terms of their relative threat to people, aviation and infrastructure. The methodology we apply to assess volcanic threat was developed by the United States Geological Survey (USGS) as part of the 2005 National Volcano Early Warning System (NVEWS). Each volcano is scored on a number of hazard and exposure factors, producing an overall threat score. The overall t
APA, Harvard, Vancouver, ISO, and other styles
7

Wilson, A. M., and M. C. Kelman. Assessing the relative threats from Canadian volcanoes. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328950.

Full text
Abstract:
This report presents an analysis of the threat posed by active volcanoes in Canada and outlines directives to bring Canadian volcano monitoring and research into alignment with global best practices. We analyse 28 Canadian volcanoes in terms of their relative threat to people, aviation and infrastructure. The methodology we apply to assess volcanic threat was developed by the United States Geological Survey (USGS) as part of the 2005 National Volcano Early Warning System (NVEWS). Each volcano is scored on a number of hazard and exposure factors, producing an overall threat score. The overall t
APA, Harvard, Vancouver, ISO, and other styles
8

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
9

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
10

Guthrie, Richard. PR-676-233801-R08 Geohazard Program Considerations. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000076.

Full text
Abstract:
This document, titled Geohazard Program Considerations - PR-676-233801-R03, as part of the PRCI NDE-4-24 program, intends to provide operators an overview of the threats which geohazards can present to oil and gas pipelines, as well as introduce the various management options available to manage those geohazard threats. Operators will be provided with definitions of geohazards, the various ways which geohazards can cause negative effect and "interact" with pipelines, as well as a better understanding of the tools available to create and implement a robust geohazard management program for their
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!