Academic literature on the topic 'Threats and Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threats and Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threats and Attacks"
Sarkunavathi, A., and V. Srinivasan. "A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat." Asian Journal of Computer Science and Technology 7, S1 (2018): 90–95. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1797.
Full textRajeev, Gautham K. "Identifying Vulnerabilities and Reducing Cyber Risks and Attacks Using a Cyber Security Lab Environment." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1625–34. http://dx.doi.org/10.22214/ijraset.2022.46468.
Full textAkash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.
Full textWang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Full textWu, Qi, Qiang Li, Dong Guo, and Xiangyu Meng. "Exploring the vulnerability in the inference phase of advanced persistent threats." International Journal of Distributed Sensor Networks 18, no. 3 (2022): 155013292210804. http://dx.doi.org/10.1177/15501329221080417.
Full textViswanathan, Ganesh, and Prabhu J. "A hybrid threat model for system-centric and attack-centric for effective security design in SDLC." Web Intelligence 19, no. 1-2 (2021): 1–11. http://dx.doi.org/10.3233/web-210452.
Full textSylvester, F. Ley. "Mobile Device Users’ Susceptibility to Phishing Attacks." International Journal of Computer Science and Information Technology 14, no. 1 (2022): 1–18. http://dx.doi.org/10.5121/ijcsit.2022.14101.
Full textYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Full textPalaniappan, Sellappan, Rajasvaran Logeswaran, Shapla Khanam, and Pulasthi Gunawardhana. "Social Engineering Threat Analysis Using Large-Scale Synthetic Data." Journal of Informatics and Web Engineering 4, no. 1 (2025): 70–80. https://doi.org/10.33093/jiwe.2025.4.1.6.
Full textLi, Jiawei, Ru Zhang, Jianyi Liu, and Gongshen Liu. "LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering." Security and Communication Networks 2022 (September 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/4577141.
Full textDissertations / Theses on the topic "Threats and Attacks"
Inci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.
Full textLomne, Victor. "Power and Electro-Magnetic Side-Channel Attacks : threats and countermeasures." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20220.
Full textKour, Jawdat, and Hasan Ahmed. "Email attacks : Investigation about the vulnerability of the Swedish organizations against email threats." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97020.
Full textZhang, Ge. "Unwanted Traffic and Information Disclosure in VoIP Networks : Threats and Countermeasures." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13408.
Full textWolverton, Katherine Gray. "A Qualitative Study on the Experiences of Therapists who Have Been Threatened with Harm or Attacked by a Client or a Relative of a Client During the Course of Treatment in a Non-Residential Setting." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/73337.
Full textPečeňa, Jan. "Systém pro analýzu dat z infikovaných počítačů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237047.
Full textCamurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.
Full textMunir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.
Full textMontes, Larios Jose Manuel, and Hernández Manuel Antonio Iturrizaga. "Diseño de arquitectura de seguridad perimetral para una empresa dedicada a la actividad inmobiliaria." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1285.
Full textLeikvangen, Aleksander. "Empty threats? : A game-theoretic analysis of the credibility of Israel's threat to attack Iran's nuctear facilities." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for sosiologi og statsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25717.
Full textBooks on the topic "Threats and Attacks"
Nardone, Massimo. Cybersecurity Threats and Attacks in the Gaming Industry. Apress, 2025. https://doi.org/10.1007/979-8-8688-1492-1.
Full textSambănth Khmaer Jaṃrẏan niṅ Kārbārsiddhi Manuss. Attacks & threats against human rights defenders in Cambodia 2007. LICADHO, 2008.
Find full textSambănth Khmaer Jaṃrẏan niṅ Kārbārsiddhi Manuss. Attacks & threats against human rights defenders in Cambodia 2010-2012. Cambodian League for the Promotion and Defense of Human Rights, 2012.
Find full textW, Frazier Thomas, Richardson Drew C, and International Conference on Food and Agricultural Security (1998), eds. Food and agricultural security: Guarding against natural threats and terrorist attacks affecting health, national food supplies, and agricultural economics. New York Academy of Sciences, 1999.
Find full textUnited States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities. Able Danger program: Joint hearing before the Terrorism, Unconventional Threats and Capabilities Subcommittee meeting jointly with Strategic Forces Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Ninth Congress, second session, hearing held, February 15, 2006. U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Assessing September 11th health effects: Hearing before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, September 8, 2004. U.S. G.P.O., 2005.
Find full textInstitute of Medicine (U.S.). Board on Health Sciences Policy, National Research Council (U.S.). Board on Chemical Sciences and Technology, National Research Council (U.S.). Board on Life Sciences, and National Academies Press (U.S.), eds. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. National Academies Press, 2011.
Find full textUnited States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities. Ten years on: The evolution of the terrorist threat since 9/11 : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held June 22, 2011. U.S. G.P.O., 2011.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Assessing September 11 health effects: What should be done? : hearing before the Subcommittee on National Security, Emerging Threats and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, October 28, 2003. U.S. G.P.O., 2004.
Find full textBook chapters on the topic "Threats and Attacks"
Singh, Vaishali, and S. K. Pandey. "Revisiting Cloud Security Attacks: Credential Attack." In Rising Threats in Expert Applications and Solutions. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6014-9_39.
Full textMeadows, Catherine. "A representation of protocol attacks for risk assessment." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/01.
Full textKavallieros, Dimitrios, Georgios Germanos, and Nicholas Kolokotronis. "Profiles of Cyber-Attackers and Attacks." In Cyber-Security Threats, Actors, and Dynamic Mitigation. CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-1.
Full textBiswas, Sreemoyee, and Namita Tiwari. "Attacks and Threats on RSA." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1951-8_66.
Full textSokolov, Sergei, Vagiz Gaskarov, Tatiana Knysh, and Albina Sagitova. "IoT Security: Threats, Risks, Attacks." In Lecture Notes in Civil Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-6208-6_6.
Full textMahalle, Parikshit N., Pooja A. Shelar, Gitanjali R. Shinde, and Nilanjan Dey. "Threats and Attacks in UWSN." In The Underwater World for Digital Data Transmission. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1307-4_4.
Full textSiddiqui, Shams Tabrez, Riaz Ahmad, Mohammed Shuaib, and Shadab Alam. "Blockchain Security Threats, Attacks and Countermeasures." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1518-7_5.
Full textSzynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Full textMoëllic, Pierre-Alain, Mathieu Dumont, Kevin Hector, Christine Hennebert, Raphaël Joud, and Dylan Paulin. "Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models." In Intelligent Secure Trustable Things. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_6.
Full textPahlevanzadeh, Bahareh, and Sima Ahmadpour. "Cybersecurity Threats and Attacks in IoE Networks." In Internet of Things. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45162-1_2.
Full textConference papers on the topic "Threats and Attacks"
Ibrahim, Dina Riyadh, and Mohammed Younis Thanoun. "IoMT Availability Threats Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777246.
Full textKhan, Muhammad Adnan, Ahmed Mohammed Saleh, Muhammad Waseem, and Vokony István. "Smart Grid Cyber Attacks: Overview, Threats, And Countermeasures." In 2024 22nd International Conference on Intelligent Systems Applications to Power Systems (ISAP). IEEE, 2024. http://dx.doi.org/10.1109/isap63260.2024.10744349.
Full textAli, Dhia Ben, Mohamed Belaoued, and Samir Dawaliby. "Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851731.
Full textMahesh, Boya Leela, and Sandeep Kaur. "Exploring Machine Learning Algorithms for Detecting Cyber Attacks and Threats." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10860108.
Full textZewdie, Marshet, Anteneh Girma, and Tilahun Melak Sitote. "Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698519.
Full textRR, Sornalakshmi, Petikam Sailaja, Siva Sai Sagar Majji, Teja Eshwar, Varshika S, and Shrinitha V. "Analysis of Critical Infrastructures for Cryptography Frameworks, Attacks, and Threats of Cybersecurity." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939300.
Full textShterev, Y., and V. Andonov. "THE DANGER OF DENIAL OF SERVICE ATTACKS IN OPERATING SYSTEMS." In РАДИАЦИОННАТА БЕЗОПАСНОСТ В СЪВРЕМЕННИЯ СВЯТ. Crossref, 2025. https://doi.org/10.34660/inf.2025.98.13.047.
Full textKolodziej, Joanna, Mateusz Krzyszton, and Pawel Szynkiewicz. "Anomaly Detection In TCP/IP Networks." In 37th ECMS International Conference on Modelling and Simulation. ECMS, 2023. http://dx.doi.org/10.7148/2023-0542.
Full textEspinoza-Zelaya, Carlos, and Young Moon. "Taxonomy of Severity of Cyber-Attacks in Cyber-Manufacturing Systems." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-94492.
Full textS. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz, and Worud Mahdi Saleh. "Security Challenges and Threats in Wireless Sensor Networks: A Review." In IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.
Full textReports on the topic "Threats and Attacks"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textChristie, Lorna. Physical threats to infrastructure. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs23.
Full textVinson, Nigel, and Simon Brawley. Critical infrastructure: readiness, resilience, and security. Parliamentary Office of Science and Technology, 2024. https://doi.org/10.58248/hs81.
Full textDrury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.
Full textHarriss, Lydia, and Clare West. Cyber Security of Consumer Devices. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn593.
Full textLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca013.
Full textChristie, Lorna, and Jeni Spragg. Chemical Weapons. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn596.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textBaek, Chung-Ah, Deepta Chopra, Jerker Edström, et al. Building Solidarities: Gender Justice in a Time of Backlash. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.041.
Full textRaju, Nivedita, and Laura Grego. The Space–Nuclear Nexus in European Security. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gepv2578.
Full text