Literatura académica sobre el tema "Attack Path"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Attack Path".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Attack Path"
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completoLi, Erxia, Chaoqun Kang, Deyu Huang, et al. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (2019): 251. http://dx.doi.org/10.3390/info10080251.
Texto completoHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (2023): 1–30. http://dx.doi.org/10.1145/3626789.
Texto completoHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Texto completoLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (2022): 3938. http://dx.doi.org/10.3390/math10213938.
Texto completoLevner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (2024): 504. http://dx.doi.org/10.3390/a17110504.
Texto completoBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Texto completoGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (2024): 437. http://dx.doi.org/10.3390/drones8090437.
Texto completoBhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Texto completoHu, Jian, Zhenhong Zhang, Feilu Hang, and Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.
Texto completoTesis sobre el tema "Attack Path"
Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Texto completoMirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Texto completoVega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.
Texto completoMao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Texto completoThames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Texto completoDube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.
Texto completoExurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Texto completoKasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Texto completoEvensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Texto completoPalla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Texto completoLibros sobre el tema "Attack Path"
Operations, United States Congress House Committee on Government. Navy's seawolf attack submarine is proceeding along a path of high technical and financial risks: Thirty-fifth report. U.S. G.P.O., 1990.
Buscar texto completoCorporation, Port Authority Trans-Hudson, ed. Draft scope: Permanent World Trade Center PATH terminal : environmental impact statement. [The Port Authority of NY & NJ], 2003.
Buscar texto completoKostera, Monika. The University of Hope. Oxford University Press, 2024. http://dx.doi.org/10.1093/9780191996948.001.0001.
Texto completo1530-1610, Scupoli Lorenzo, ed. Spiritual combat: How to win your spiritual battles and attain inner peace ; plus, Interior peace : the path to paradise. Sophia Institute Press, 2002.
Buscar texto completoDeMaria, Rusel, and Zach Meston. Sega Genesis Secrets, Volume 2. Prima Publishing, 1991.
Buscar texto completoSandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. Bantam Books, 1992.
Buscar texto completoThomson, Miller. Path: ANXIETY and PANIC ATTACK ELIMINATION PROGRAM. Independently Published, 2018.
Buscar texto completoThe Way to a Healthy Heart: The Zero Heart Attack Path. Penguin Global, 2004.
Buscar texto completoCapítulos de libros sobre el tema "Attack Path"
Salfer, Martin. "Single-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_4.
Texto completoSalfer, Martin. "Multi-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_5.
Texto completoGonda, Tom, Rami Puzis, and Bracha Shapira. "Scalable Attack Path Finding for Increased Security." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2_18.
Texto completoKavallieratos, Georgios, and Sokratis Katsikas. "Attack Path Analysis for Cyber Physical Systems." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0_2.
Texto completoJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Snapshots: A Sample Path Based Source Estimator." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_7.
Texto completoDucousso, Soline, Sébastien Bardin, and Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis." In Programming Languages and Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.
Texto completoRao, Yu, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, and Jinghua Bai. "Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_8.
Texto completoFiazza, Maria-Camilla, Michele Peroli, and Luca Viganò. "Attack Interference: A Path to Defending Security Protocols." In E-Business and Telecommunications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35755-8_21.
Texto completoIdika, Nwokedi, and Bharat Bhargava. "A Kolmogorov Complexity Approach for Measuring Attack Path Complexity." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21424-0_23.
Texto completoShosha, Ahmed F., Joshua I. James, and Pavel Gladyshev. "A Novel Methodology for Malware Intrusion Attack Path Reconstruction." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_11.
Texto completoActas de conferencias sobre el tema "Attack Path"
Lu, Ziang, Lu Chen, Yong Li, Guangxin Guo, and Tengyan Wang. "Attack Path Extraction based on VGAE and DBSCAN." In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech). IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00013.
Texto completoWang, Zijin, Minrui Fei, Yao Xiong, and Aimin Wang. "Dynamic Attack Path Prediction and Visualization for Industrial Cyber-Physical Systems Under Cyber Attacks." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662270.
Texto completoLi, Ke, Longyun Qi, Haotian Zhang, Yongjian Cao, Huishui Li, and Jian Zhou. "Cybe-Physical Coordinated Attack Path Analysis Considering Attack Preferences of Cyber-Physical Power System." In 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2025. https://doi.org/10.1109/isctis65944.2025.11065142.
Texto completoTian, Yi, Dapeng Man, Hanbo Wang, Huanran Wang, and Wu Yang. "Hybrid-Based Timing Attack for Path Inference in Named Data Networking." In 2024 20th International Conference on Mobility, Sensing and Networking (MSN). IEEE, 2024. https://doi.org/10.1109/msn63567.2024.00078.
Texto completoYue, Meng, Mingzhi Yang, Hanwen Xu, and Zhijun Wu. "Method for Filtering DDoS Attack Traffic through Routing Path within SDN Domain." In 2025 IEEE 11th Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, 2025. https://doi.org/10.1109/bigdatasecurity66063.2025.00021.
Texto completoYadav, Mukesh, and Peter J. Hawrylak. "An Empirical Study on Analyzing the Evidence-Based Method in Attack Path Detection." In 2024 Resilience Week (RWS). IEEE, 2024. https://doi.org/10.1109/rws62797.2024.10799307.
Texto completoZhang, Yuheng, Guojun Wang, Peiqiang Li, et al. "TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00097.
Texto completoSubaşi, Engin, and Muharrem Mercımek. "Attack Path Analysis and Security Concept Design for OTA Enabled Electric Power Steering System." In 2024 Innovations in Intelligent Systems and Applications Conference (ASYU). IEEE, 2024. https://doi.org/10.1109/asyu62119.2024.10756981.
Texto completoMalpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.
Texto completoShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Texto completoInformes sobre el tema "Attack Path"
Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Texto completoGhosh, Anup, Steve Noel, and Sushil Jajodia. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada563714.
Texto completoKránitz, Péter Pál. Georgia’s EU-Accession Path in Light of the “Foreign Agent Law” and Hungary’s EU-Presidency. Magyar Külügyi Intézet, 2024. http://dx.doi.org/10.47683/kkielemzesek.ke-2024.17.
Texto completoPrahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1220378.
Texto completoPrahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1164104.
Texto completoBukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius, and Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, 2022. http://dx.doi.org/10.15388/cibersek.2022.
Texto completoWeinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/nevx1787.
Texto completoMadrzykowski, Daniel. Firefighter Equipment Operational Environment: Evaluation of Thermal Conditions. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/igfm4492.
Texto completoWeinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/gmax3657.
Texto completoHausmann, Ricardo, Andrés Rodríguez-Clare, and Dani Rodrik. Towards a Strategy for Economic Growth in Uruguay. Inter-American Development Bank, 2005. http://dx.doi.org/10.18235/0008722.
Texto completo