Literatura académica sobre el tema "Attack Path"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Attack Path".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Attack Path"

1

Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.

Texto completo
Resumen
As the cloud infrastructure is simultaneously shared by millions of consumers, heinous use of cloud resources are also increasing. It makes ways to attackers to set up attacks by exploiting the vulnerabilities. And obviously, these attacks are leading to severe disasters as innocent consumers are unknowingly sharing cloud resources with harmful attackers. To prevent the occurrence of cloud attacks, attack graph based framework is proposed in this paper. Here, an attack path sketches an attack scenario by a streak of threats ranging in severity rating that shows how popular a particular cloud n
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Li, Erxia, Chaoqun Kang, Deyu Huang, et al. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (2019): 251. http://dx.doi.org/10.3390/info10080251.

Texto completo
Resumen
This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative and systematic evaluation of attacks on a DAS. In the DAS security architecture, AT nodes are traversed and used to represent the attack path. The CVSS is used to quantify the attack sequence, which is the leaf node in an AT. This paper proposes a method to calculate each attack path probability and find the maximum attack path probability in DASs
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Huang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (2023): 1–30. http://dx.doi.org/10.1145/3626789.

Texto completo
Resumen
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security threats. In this work, we study a particular security threat due to the sharing of links between high-security paths and low-security paths, which enables a new type of DoS attacks, called cross-path attacks, that indirectly attack a set of targeted high-security paths (target paths) by congesting the shared links through a set of attacker-controlled low-security paths (attack path
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Huang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.

Texto completo
Resumen
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security threats. In this work, we study a particular security threat due to the sharing of links between high-security paths and low-security paths, which enables a new type of DoS attacks, called cross-path attacks, that indirectly attack a set of targeted high-security paths (target paths) by congesting the shared links through a set of attacker-controlled low-security paths (attack path
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Li, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (2022): 3938. http://dx.doi.org/10.3390/math10213938.

Texto completo
Resumen
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi-step attacks. The complexity of multi-step attacks makes it difficult for security protection personnel to effectively determine the target attack path. In addition, most of the current protection models responding to multi-step attacks have not deeply studied the protection strategy selection method in the case of limited budget. Aiming at the above problems, we propose a protection strategy selection model based on the Genetic Ant Colony Optimization Algorithm. The model firstly evaluates the
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Levner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (2024): 504. http://dx.doi.org/10.3390/a17110504.

Texto completo
Resumen
This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker’s possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker’s intentions. We formulate this problem as a path-finding optimization problem with logical constraints repres
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.

Texto completo
Resumen
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficul
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Guo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (2024): 437. http://dx.doi.org/10.3390/drones8090437.

Texto completo
Resumen
As IoT technology advances, the smart grid (SG) has become crucial to industrial infrastructure. However, SG faces security challenges, particularly from distributed denial of service (DDoS) attacks, due to inadequate security mechanisms for IoT devices. Moreover, the extensive deployment of SG exposes communication links to attacks, potentially disrupting communications and power supply. Link flooding attacks (LFAs) targeting congested backbone links have increasingly become a focal point of DDoS attacks. To address LFAs, we propose integrating unmanned aerial vehicles (UAVs) into the Smart G
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Bhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.

Texto completo
Resumen
Background:Distributed Denial of Service (DDoS) attack is a major threat over the internet. The IP traceback mechanism defends against DDoS attacks by tracing the path traversed by attack packets. The existing traceback techniques proposed till now are found with few short comings. The victim required many number of packets to trace the attack path. The requirement of a large number of packets resulted in more number of combinations and more false positives.Methods:To generate a unique value for the IP address of the routers in the attack path Chinese Remainder theorem is applied. This helped
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Hu, Jian, Zhenhong Zhang, Feilu Hang, and Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.

Texto completo
Resumen
In response to the difficulty in detecting attacks caused by the unknown nature of 0-day vulnerabilities, the author proposes a knowledge graph based 0-day attack path prediction method. By extracting concepts and entities related to attacks from existing research on the ontology of network security and network security databases, a network defense knowledge graph is constructed to extract discrete security data such as threats, vulnerabilities, and assets into interrelated security knowledge. Using a knowledge graph reasoning method based on path sorting algorithm to explore possible 0-day at
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Attack Path"

1

Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.

Texto completo
Resumen
URL parser and normalization processes are common and important operations in different web frameworks and technologies. In recent years, security researchers have targeted these processes and discovered high impact vulnerabilities and exploitation techniques. In a different approach, we will focus on semantic disconnect among different framework-independent web technologies (e.g., browsers, proxies, cache servers, web servers) which results in different URL interpretations. We coined the term “Path Confusion” to represent this disagreement and this thesis will focus on analyzing enabling fact
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.

Texto completo
Resumen
URL parser and normalization processes are common and important operations in different web frameworks and technologies. In recent years, security researchers have targeted these processes and discovered high impact vulnerabilities and exploitation techniques. In a different approach, we will focus on semantic disconnect among different framework-independent web technologies (e.g., browsers, proxies, cache servers, web servers) which results in different URL interpretations. We coined the term “Path Confusion” to represent this disagreement and this thesis will focus on analyzing enabling fact
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Vega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.

Texto completo
Resumen
The role of the unmanned aerial vehicle (UAV) has significantly expanded in the military sector during the last decades mainly due to their cost effectiveness and their ability to eliminate the human life risk. Current UAV technology supports a variety of missions and extensive research and development is being performed to further expand its capabilities. One particular field of interest is the area of the low cost expendable UAV since its small price tag makes it an attractive solution for target suppression. A swarm of these low cost UAVs can be utilized as guided munitions or kamikaze UAVs
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.

Texto completo
Resumen
The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated.However, attack paths show all possible routes for each calculationand represent them with terminologies specific to the cybersecurityfield. A major portion of attack routes and representations aretoo complicated for normal users, making it difficult to identify
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.

Texto completo
Resumen
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Dube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.

Texto completo
Resumen
The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any dis- ruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increas- ingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Exurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.

Texto completo
Resumen
L'exportation et la mutualisation des industries de fabrication des circuits intégrés impliquent de nombreuses interrogations concernant l'intégrité des circuits fabriqués. On se retrouve alors confronté au problème d'insertion d'une fonctionnalité dissimulée pouvant agir de façon cachée : on parle de Cheval de Troie Matériel (CTM). En raison de la complexité d'un circuit intégré, repérer ce genre de modification se révèle particulièrement difficile. Le travail proposé dans ce manuscrit s'oriente vers une technique de détection non destructrice de CTM. L’approche consiste à utiliser les temps
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.

Texto completo
Resumen
Les outils de prévention des vulnérabilités et de détection des anomalies sont essentiels pour la sécurité des réseaux informatiques. Cette thèse se concentre sur l'utilisation des données du MITRE ATT&CK, des scores CVSS et de la norme ISO 27002:2022 pour automatiser et consolider l'analyse des vulnérabilités et la détection des anomalies. Les objectifs principaux sont : - Diagnostic de vulnérabilité : Identifier les sous-réseaux les plus vulnérables en combinant les données du MITRE ATT&CK, des scores CVSS et de la norme ISO 27002:2022. Pour cela, une base de données appelée Data ISO
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.

Texto completo
Resumen
Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with the storage of sensitive information being a rule rather than an exception. This poses a need of a time- and cost efficient way to assess the cyber security of an enterprise. The threat modeling language enterpriseLang constitute just that, where a general enterprise system assumption allows for re-usage on several enterprise systems. The language is created with Meta Attack Language and is based on the knowledgeable attack- and mitigation steps of MITRE ATT&CK Enterprise Matrix. Since all pos
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.

Texto completo
Resumen
The classifier discussed in this thesis considers the path traversed by an email (instead of its content) and reputation of the relays, features inaccessible to spammers. Groups of spammers and individual behaviors of a spammer in a given domain were analyzed to yield association patterns, which were then used to identify similar spammers. Unsolicited and phishing emails were successfully isolated from legitimate emails, using analysis results. Spammers and phishers are also categorized into serial spammers/phishers, recent spammers/phishers, prospective spammers/phishers, and suspects. Legiti
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Attack Path"

1

Operations, United States Congress House Committee on Government. Navy's seawolf attack submarine is proceeding along a path of high technical and financial risks: Thirty-fifth report. U.S. G.P.O., 1990.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Impey, Rose. Pirate Patch and the black bonnet attack. Orchard, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Corporation, Port Authority Trans-Hudson, ed. Draft scope: Permanent World Trade Center PATH terminal : environmental impact statement. [The Port Authority of NY & NJ], 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kostera, Monika. The University of Hope. Oxford University Press, 2024. http://dx.doi.org/10.1093/9780191996948.001.0001.

Texto completo
Resumen
Abstract Is the university as we know it dead? Monika Kostera thinks not, but across the globe universities are under attack, be it by external forces or from within. Will they survive? Our civilization requires that they must: planetary survival and sustainability depend on them. This book provides vital resources to give us all—professional academics, students, and university administrators—hope that universities will emerge renewed out of the current crisis. It inspires all of us to practice, collectively and consciously, academic virtues: kindness, diligence, patience, temperance, chaste d
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

1530-1610, Scupoli Lorenzo, ed. Spiritual combat: How to win your spiritual battles and attain inner peace ; plus, Interior peace : the path to paradise. Sophia Institute Press, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

DeMaria, Rusel, and Zach Meston. Sega Genesis Secrets, Volume 2. Prima Publishing, 1991.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Sandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. Bantam Books, 1992.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Olson, R. M. Attack Path: A space opera adventure. RM Olson, 2021.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Thomson, Miller. Path: ANXIETY and PANIC ATTACK ELIMINATION PROGRAM. Independently Published, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

The Way to a Healthy Heart: The Zero Heart Attack Path. Penguin Global, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Attack Path"

1

Salfer, Martin. "Single-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Salfer, Martin. "Multi-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Gonda, Tom, Rami Puzis, and Bracha Shapira. "Scalable Attack Path Finding for Increased Security." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2_18.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kavallieratos, Georgios, and Sokratis Katsikas. "Attack Path Analysis for Cyber Physical Systems." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Jiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Snapshots: A Sample Path Based Source Estimator." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ducousso, Soline, Sébastien Bardin, and Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis." In Programming Languages and Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.

Texto completo
Resumen
AbstractMany program analysis tools and techniques have been developed to assess program vulnerability. Yet, they are based on the standard concept of reachability and represent an attacker able to craft smart legitimate input, while in practice attackers can be much more powerful, using for instance micro-architectural exploits or fault injection methods. We introduce adversarial reachability, a framework allowing to reason about such advanced attackers and check whether a system is vulnerable or immune to a particular attacker. As equipping the attacker with new capacities significantly incr
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Rao, Yu, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, and Jinghua Bai. "Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_8.

Texto completo
Resumen
AbstractIn recent years, a large number of users continuously suffer from DDoS attacks. DDoS attack volume is on the rise and the scale of botnets is also getting larger. Many security organizations began to use data-driven approaches to investigate gangs and groups beneath DDoS attack behaviors, trying to unveil the facts and intentions of DDoS gangs. In this paper, DDoSAGD - a DDoS Attack Group Discovery framework is proposed to help gang recognition and situation awareness. A heterogeneous graph is constructed from botnet control message and relative threat intelligence data, and a meta pat
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Fiazza, Maria-Camilla, Michele Peroli, and Luca Viganò. "Attack Interference: A Path to Defending Security Protocols." In E-Business and Telecommunications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35755-8_21.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Idika, Nwokedi, and Bharat Bhargava. "A Kolmogorov Complexity Approach for Measuring Attack Path Complexity." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21424-0_23.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Shosha, Ahmed F., Joshua I. James, and Pavel Gladyshev. "A Novel Methodology for Malware Intrusion Attack Path Reconstruction." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Attack Path"

1

Lu, Ziang, Lu Chen, Yong Li, Guangxin Guo, and Tengyan Wang. "Attack Path Extraction based on VGAE and DBSCAN." In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech). IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00013.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Wang, Zijin, Minrui Fei, Yao Xiong, and Aimin Wang. "Dynamic Attack Path Prediction and Visualization for Industrial Cyber-Physical Systems Under Cyber Attacks." In 2024 43rd Chinese Control Conference (CCC). IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662270.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Li, Ke, Longyun Qi, Haotian Zhang, Yongjian Cao, Huishui Li, and Jian Zhou. "Cybe-Physical Coordinated Attack Path Analysis Considering Attack Preferences of Cyber-Physical Power System." In 2025 5th International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2025. https://doi.org/10.1109/isctis65944.2025.11065142.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Tian, Yi, Dapeng Man, Hanbo Wang, Huanran Wang, and Wu Yang. "Hybrid-Based Timing Attack for Path Inference in Named Data Networking." In 2024 20th International Conference on Mobility, Sensing and Networking (MSN). IEEE, 2024. https://doi.org/10.1109/msn63567.2024.00078.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Yue, Meng, Mingzhi Yang, Hanwen Xu, and Zhijun Wu. "Method for Filtering DDoS Attack Traffic through Routing Path within SDN Domain." In 2025 IEEE 11th Conference on Big Data Security on Cloud (BigDataSecurity). IEEE, 2025. https://doi.org/10.1109/bigdatasecurity66063.2025.00021.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Yadav, Mukesh, and Peter J. Hawrylak. "An Empirical Study on Analyzing the Evidence-Based Method in Attack Path Detection." In 2024 Resilience Week (RWS). IEEE, 2024. https://doi.org/10.1109/rws62797.2024.10799307.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Yuheng, Guojun Wang, Peiqiang Li, et al. "TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00097.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Subaşi, Engin, and Muharrem Mercımek. "Attack Path Analysis and Security Concept Design for OTA Enabled Electric Power Steering System." In 2024 Innovations in Intelligent Systems and Applications Conference (ASYU). IEEE, 2024. https://doi.org/10.1109/asyu62119.2024.10756981.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Malpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.

Texto completo
Resumen
This paper presents an acoustics parametric study of the effect of varying lateral and longitudinal rotor trim flapping angles (tip-path-plane tilt) on noise radiated by an isolated 26-ft diameter proprotor, similar to that of the AW609 tiltrotor, in edgewise flight. Three tip-path-plane angle of attack operating conditions of -9, 0 and 6 deg, at 80 knots, were investigated. Results showed that: 1) minimum noise was attained for the tip-path-plane angle of attack value of -9 deg, and 2) changing the cyclic trim state (i.e., controls) altered the airloads and produced noticeable changes to the
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Shuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.

Texto completo
Resumen
Abstract A system-in-package (SiP) design takes advantage of cutting-edge packaging technology and heterogeneous integration (HI) in response to the growing need for aggressive time-to-market, high-performance, less expensive, and smaller systems. However, aggregating dies with different functionalities introduces new attack vectors with fault-injection attacks (FIA) that can effectively alter a circuit's data and control flow maliciously to cause disruptions of secure communication or sensitive information leakage. Additionally, traditional threat models associated with FIA on a 2D monolithic
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Attack Path"

1

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Texto completo
Resumen
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report a
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Ghosh, Anup, Steve Noel, and Sushil Jajodia. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada563714.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Kránitz, Péter Pál. Georgia’s EU-Accession Path in Light of the “Foreign Agent Law” and Hungary’s EU-Presidency. Magyar Külügyi Intézet, 2024. http://dx.doi.org/10.47683/kkielemzesek.ke-2024.17.

Texto completo
Resumen
In May 2024, the Georgian parliament adopted the law known as the “foreign agent law”, which was followed by a barrage of Western attacks on the Georgian ruling party. The US imposed sanctions on Georgian Dream parliamentarians and Germany effectively froze Georgia’s EU accession. The Hungarian government, on the other hand, has expressed its support for the Tbilisi administration and vetoed a unified EU statement of condemnation on Georgia. However, even the Presidency of the EU Council is not enough to launch accession negotiations, thus Budapest can only offer alternative support to the EU
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Prahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1220378.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Prahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1164104.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius, and Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, 2022. http://dx.doi.org/10.15388/cibersek.2022.

Texto completo
Resumen
This work aims to prepare the first Lithuanian cyber competence map together with recommendations on how to attract specialists to the CS sector and how to advance their competencies. During the research phase, we explored the demand for CS specialists in Lithuania and the world, surveyed the opinions of CS professionals, management and specialists from private and public sector organizations, including national defence sector. Also, we determined the career path of the specialists, analysed job offers, distinguished work roles, and gathered findings and recommendations from scientific researc
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Weinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/nevx1787.

Texto completo
Resumen
As research continues into how fire department interventions affect fire dynamics in the modern fire environment; questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies may not support current, experienced-based practices. This gap between the research to d
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Madrzykowski, Daniel. Firefighter Equipment Operational Environment: Evaluation of Thermal Conditions. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/igfm4492.

Texto completo
Resumen
The goal of this study was to review the available literature to develop a quantitative description of the thermal conditions firefighters and their equipment are exposed to in a structural fire environment. The thermal exposure from the modern fire environment was characterized through the review of fire research studies and fire-ground incidents that provided insight and data to develop a range of quantification. This information was compared with existing standards for firefighting protective equipment to generate a sense of the gap between known information and the need for improved unders
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Weinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/gmax3657.

Texto completo
Resumen
As research continues into how fire department interventions affect fire dynamics in the modern fire environment, questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies did not support current, experience-based practices. This gap between the research to da
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Hausmann, Ricardo, Andrés Rodríguez-Clare, and Dani Rodrik. Towards a Strategy for Economic Growth in Uruguay. Inter-American Development Bank, 2005. http://dx.doi.org/10.18235/0008722.

Texto completo
Resumen
The Uruguayan economy is recovering from the 2002 financial crisis that disrupted its banking system, caused a collapse of its currency and seriously affected its fiscal solvency. The crisis was clearly associated with the collapse of the Argentine economy and its concomitant currency, banking and debt crises. Both were also related to the sudden stop that followed the Russian crisis of 1998, which prompted an important realignment of the real in January 1999, a fact that had exerted enormous pressure on bilateral exchange rates within Mercosur. In this post-crisis period, Uruguay now faces se
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!