Littérature scientifique sur le sujet « Computer attack »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Computer attack ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Computer attack"
Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil et Muhammad Nur Faiz. « A Classification Data Packets Using the Threshold Method for Detection of DDoS ». Journal of Innovation Information Technology and Application (JINITA) 6, no 1 (28 juin 2024) : 28–36. http://dx.doi.org/10.35970/jinita.v6i1.2224.
Texte intégralvan Heerden, R. P., B. Irwin, I. D. Burke et L. Leenen. « A Computer Network Attack Taxonomy and Ontology ». International Journal of Cyber Warfare and Terrorism 2, no 3 (juillet 2012) : 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.
Texte intégralParadise, Paradise, Wahyu Adi Prabowo et Teguh Rijanandi. « Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto ». JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no 1 (28 janvier 2023) : 66. http://dx.doi.org/10.30865/mib.v7i1.5199.
Texte intégralRamli, Hartini, et Maharaja Yasin Alifsyah. « Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS) ». Journal of Renewable Energy and Smart Device 1, no 1 (17 octobre 2023) : 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Texte intégralGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik et Nanang Ismail. « Penetration Testing using Kali Linux : SQL Injection, XSS, Wordpres, and WPA2 Attacks ». Indonesian Journal of Electrical Engineering and Computer Science 12, no 2 (1 novembre 2018) : 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Texte intégralWidodo, Tri, et Adam Sekti Aji. « Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) ». JISKA (Jurnal Informatika Sunan Kalijaga) 7, no 1 (25 janvier 2022) : 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Texte intégralSun, Fei Xian. « Danger Theory Based Risk Evaluation Model for Smurf Attacks ». Key Engineering Materials 467-469 (février 2011) : 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.
Texte intégralKhaliq, Abdul, et Sri Novida Sari. « PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS) ». Jurnal Nasional Teknologi Komputer 2, no 3 (18 août 2022) : 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.
Texte intégralLi, Biao. « Research on Computer Network Security and Prevention Strategy ». Applied Mechanics and Materials 608-609 (octobre 2014) : 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.
Texte intégralMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang et Yang Xiang. « Machine Learning–based Cyber Attacks Targeting on Controlled Information ». ACM Computing Surveys 54, no 7 (juillet 2021) : 1–36. http://dx.doi.org/10.1145/3465171.
Texte intégralThèses sur le sujet "Computer attack"
Mowery, Keaton. « Beneath the Attack Surface ». Thesis, University of California, San Diego, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3712726.
Texte intégralComputer systems are often analyzed as purely virtual artifacts, a collection of software operating on a Platonic ideal of a computer. When software is executed, it runs on actual hardware: an increasingly complex web of analog physical components and processes, cleverly strung together to present an illusion of pure computation. When an abstract software system is combined with individual hardware instances to form functioning systems, the overall behavior varies subtly with the hardware. These minor variations can change the security and privacy guarantees of the entire system, in both beneficial and harmful ways. We examine several such security effects in this dissertation.
First, we look at the fingerprinting capability of JavaScript and HTML5: when invoking existing features of modern browsers, such as JavaScript execution and 3-D graphics, how are the results affected by underlying hardware, and how distinctive is the resulting fingerprint?
Second, we discuss AES side channel timing attacks, a technique to extract information from AES encryption running on hardware. We present several reasons why we were unable to reproduce this attack against modern hardware and a modern browser.
Third, we examine positive uses of hardware variance: namely, seeding Linux's pseudorandom number generator at kernel initialization time with true entropy gathered during early boot. We examine the utility of these techniques on a variety of embedded devices, and give estimates for the amount of entropy each can generate.
Lastly, we evaluate a cyberphysical system: one which combines physical processes and analog sensors with software control and interpretation. Specifically, we examine the Rapiscan Secure~1000 backscatter X-ray full-body scanner, a device for looking under a scan subject's clothing, discovering any contraband secreted about their person. We present a full security analysis of this system, including its hardware, software, and underlying physics, and show how an adaptive, motivated adversary can completely subvert the scan to smuggle contraband, such as knives, firearms, and plastic explosives, past a Secure~1000 checkpoint. These attacks are entirely based upon understanding the physical processes and sensors which underlie this cyberphysical system, and involve adjusting the contraband's location and shape until it simply disappears.
Hersén, Nicklas. « Measuring Coverage of Attack Simulations on MAL Attack Graphs ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292640.
Texte intégralÖvergången från traditionella medier till digitala plattformar har lett till en ökad hotbild mot digital infrastruktur. Vikten av att designa säkra plattformar och enheter för att skydda känslig information har lett till framkomsten av nya strängare säkerhetskrav. Hotmodellering är en process med syfte att förebygga att svagheter i ett system utnyttjas av externa parter genom att identifiera brister i systemet. Meta Attack Language är ett hotmodelleringsspråk med stöd för simulering av specifika attack scenarion genom attacksimuleringar. I nuläget finns inget stöd för insamling av täckningsdata från dessa simuleringar. Syftet med detta arbete är att utveckla en tilläggstjänst för insamling av täckningsdata i syfte att underlätta hotmodelleringsprocessen. Den utvecklade tillägstjänsten kan ge en uppskattning av hur väl en modell täcks av en mängd simuleringar. Täckningsvärderna som används av tilläggstjänsten är anpassningar av befintliga mätvärden som används inom uppskattning av källkods- och modelltäckning. Nuvarande implementation har ett flertal begränsningar gällande presentationen av viss typ av data, till exempel exponentiellt växande mätvärden. Detta beror på att modellerna inte är anpassade för denna typ av testning.
Fang, Pengcheng. « REPTRACKER:TOWARDS AUTOMATIC ATTACK INVESTIGATION ». Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1550696995596089.
Texte intégralTajdini, M. « Developing an advanced IPv6 evasion attack detection framework ». Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9864/.
Texte intégralVan, Heerden Renier Pelser. « A formalised ontology for network attack classification ». Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Texte intégralCullum, James J. « Performance analysis of automated attack graph generation software ». Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FCullum.pdf.
Texte intégralThesis Advisor(s): Cynthia Irvine, Timothy Levin. "December 2006." Includes bibliographical references (p. 137- 138). Also available in print.
Harris, Rae. « Spectre : Attack and Defense ». Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.
Texte intégralAlmohri, Hussain. « Security risk prioritization for logical attack graphs ». Thesis, Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/1114.
Texte intégralJafarian, Jafar Haadi. « Cyber Agility for Attack Deterrence and Deception ». Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.
Texte intégralIn recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either identifying and patching exploits, or detecting and filtering them. These techniques are only effective when intrusions are known or detectable. However, unknown (zero-day) vulnerabilities are constantly being discovered, and known vulnerabilities are not often patched promptly. Even worse, while defenders need to patch all vulnerabilities and intrusions paths against unknown malicious entities, the attackers only need to discover only one successful intrusion path in a system that is known and static. These asymmetric advantages have constantly kept attackers one step ahead of defenders.
To reverse this asymmetry in cyber warfare, we aim to propose new proactive defense paradigms that can deter or deceive cyber attackers without relying on intrusion detection and prevention and by offering cyber agility as a system property. Cyber agility allows for system configuration to be changed dynamically without jeopardizing operational and mission requirements of the system. In this thesis, we introduce two novel cyber agility techniques based on two paradigms of cyber deterrence and cyber deception. Cyber deterrence techniques aim to deter cyber threats by changing system configurations randomly and frequently. In contrast, cyber deception techniques aim to deflect attacks to fake targets by misrepresenting system configurations strategically and adaptively.
In the first part of this dissertation, we propose a multi-strategy, multi-parameter and multi-dimensional host identity mutation technique for deterring reconnaissance attacks. This deterrence is achieved by mutating IP addresses and anonymizing fingerprints of network hosts both proactively and adaptively. Through simulation and analytical investigation, we show that our approach significantly increases the attack cost for coordinated scanning worms, advanced network reconnaissance techniques, and multi-stage APT attacks.
In the second part, we propose a formal framework to construct active cyber deception plans that are goal-oriented and dynamic. Our framework introduces a deception logic that models consistencies and conflicts among various deception strategies (e.g., lies) and quantifies the benefit and cost of potential deception plans.
In the third part, we demonstrate and evaluate our deception planning framework by constructing an effective deception plan against multi-stage attacks. Through our experimentation, we show that the generated deception plans are effective and economical, and outperform existing or random deception plans.
Ong, Hoang. « Semantic attack on transaction data anonymised by set-based generalisation ». Thesis, Cardiff University, 2015. http://orca.cf.ac.uk/74553/.
Texte intégralLivres sur le sujet "Computer attack"
Wilson, Clay. Computer attack and cyberterrorism. NY : Nova Science Publishers, 2009.
Trouver le texte intégralCollege), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I : Naval War College, 2002.
Trouver le texte intégralBriggs, Andy. Virus attack. New York : Walker Books for Young Readers, 2010.
Trouver le texte intégralE, Goodman Seymour, et Longhurst David W, dir. Protecting critical infrastructures against cyber-attack. Oxford : Oxford University Press, 2003.
Trouver le texte intégralRooney, Anne. Computer science and IT : Investigating a cyber attack. Chicago, Ill : Capstone Heinemann Library, 2014.
Trouver le texte intégralMesley, Wendy. Can you hack it ? : The attack on personal information. Princeton, NJ : Films for the Humanities & Sciences, 2007.
Trouver le texte intégralCobb, Adam. Australia's vulnerability to information attack : Towards a national information policy. Canberra, Australia : Strategic and Defence Studies Centre, Australian National University, 1997.
Trouver le texte intégralJelena, Mirkovic, dir. Internet denial of service : Attack and defense mechanisms. Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, 2005.
Trouver le texte intégralStevens, Cara J. Redstone Junior High : When Endermen attack. New York : Sky Pony, 2018.
Trouver le texte intégralChapitres de livres sur le sujet "Computer attack"
Weik, Martin H. « attack ». Dans Computer Science and Communications Dictionary, 72. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_968.
Texte intégralWeik, Martin H. « text attack ». Dans Computer Science and Communications Dictionary, 1773. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19457.
Texte intégralWeik, Martin H. « analytical attack ». Dans Computer Science and Communications Dictionary, 49. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_649.
Texte intégralWeik, Martin H. « exhaustion attack ». Dans Computer Science and Communications Dictionary, 549. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6545.
Texte intégralWeik, Martin H. « NAK attack ». Dans Computer Science and Communications Dictionary, 1067. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12053.
Texte intégralWeik, Martin H. « attack time ». Dans Computer Science and Communications Dictionary, 72. Boston, MA : Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_969.
Texte intégralOe, Issa, Keiichiro Yamamura, Hiroki Ishikura, Ryo Hamahira et Katsuki Fujisawa. « Superpixel Attack ». Dans Lecture Notes in Computer Science, 141–52. Singapore : Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8388-9_12.
Texte intégralBaksi, Anubhab. « Fault Attack ». Dans Computer Architecture and Design Methodologies, 59–98. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6_3.
Texte intégralAbdoli, F., N. Meibody et R. Bazoubandi. « An Attacks Ontology for computer and networks attack ». Dans Innovations and Advances in Computer Sciences and Engineering, 473–76. Dordrecht : Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_83.
Texte intégralNishihara, Hideaki, Yasuyuki Kawanishi, Daisuke Souma et Hirotaka Yoshida. « On Validating Attack Trees with Attack Effects ». Dans Lecture Notes in Computer Science, 309–24. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54549-9_21.
Texte intégralActes de conférences sur le sujet "Computer attack"
Dadkhah, Pouria, Siavash Ahmadi et Mohammad Reza Aref. « GenAtt NIDS Attack : A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems ». Dans 2025 29th International Computer Conference, Computer Society of Iran (CSICC), 1–7. IEEE, 2025. https://doi.org/10.1109/csicc65765.2025.10967427.
Texte intégralFares, Samar, et Karthik Nandakumar. « Attack To Defend : Exploiting Adversarial Attacks for Detecting Poisoned Models ». Dans 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 24726–35. IEEE, 2024. http://dx.doi.org/10.1109/cvpr52733.2024.02335.
Texte intégralAl Kader Hammoud, Hasan Abed, Shuming Liu, Mohammed Alkhrashi, Fahad AlBalawi et Bernard Ghanem. « Look, Listen, and Attack : Backdoor Attacks Against Video Action Recognition ». Dans 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 3439–50. IEEE, 2024. http://dx.doi.org/10.1109/cvprw63382.2024.00348.
Texte intégralAmenu, Edwin Xorsenyo, et Sridaran Rajagopal. « Mitigating Address Resolution Protocol (ARP) Attack on Computer System ». Dans 2024 International Conference on Intelligent & ; Innovative Practices in Engineering & ; Management (IIPEM), 1–6. IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925724.
Texte intégralTahat, Majd Z., William B. Glisson et Baker Al Smadi. « VR Headset Ransomware Attack Vulnerability ». Dans 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 740–45. IEEE, 2024. http://dx.doi.org/10.1109/ccece59415.2024.10667339.
Texte intégralLopuhaä-Zwakenberg, Milan. « Attack Tree Metrics are Operad Algebras ». Dans 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 665–79. IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00005.
Texte intégralFezooni, Abdulhady Younes, Ehab Ahmad Ghannoum, Malek Ahmad Ayesh et Qutaibah Malluhi. « How to Attack a Disconnected Computer ». Dans Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0251.
Texte intégralKotenko, Igor, et Andrey Chechulin. « Computer attack modeling and security evaluation based on attack graphs ». Dans 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems : Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6662998.
Texte intégralIngols, Kyle, Matthew Chu, Richard Lippmann, Seth Webster et Stephen Boyer. « Modeling Modern Network Attacks and Countermeasures Using Attack Graphs ». Dans 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.21.
Texte intégralMa, Jian, et Da Luo. « Audio adversarial attack : HIS attack ». Dans International Conference on Computer Network Security and Software Engineering (CNSSE 2022), sous la direction de Wenshun Sheng et Yongquan Yan. SPIE, 2022. http://dx.doi.org/10.1117/12.2640809.
Texte intégralRapports d'organisations sur le sujet "Computer attack"
Lenderman, Curtis C. Computer Network Attack : An Operational Tool ? Fort Belvoir, VA : Defense Technical Information Center, janvier 2003. http://dx.doi.org/10.21236/ada415427.
Texte intégralBusby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA : Defense Technical Information Center, avril 2000. http://dx.doi.org/10.21236/ada377624.
Texte intégralWilliamson, Jennie M. Information Operations : Computer Network Attack in the 21st Century. Fort Belvoir, VA : Defense Technical Information Center, avril 2002. http://dx.doi.org/10.21236/ada402018.
Texte intégralPepyne, David L., et Yu-Chi Ho. Modeling and Analysis of Information Attack in Computer Networks. Fort Belvoir, VA : Defense Technical Information Center, mars 2003. http://dx.doi.org/10.21236/ada416393.
Texte intégralRolston, Bri. Attack Methodology Analysis : Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks. Office of Scientific and Technical Information (OSTI), juin 2005. http://dx.doi.org/10.2172/911827.
Texte intégralHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Fort Belvoir, VA : Defense Technical Information Center, mars 2009. http://dx.doi.org/10.21236/ada500822.
Texte intégralPresby, Timothy D. Computer Network Attack and Its Effectiveness against Non-State Actors. Fort Belvoir, VA : Defense Technical Information Center, février 2006. http://dx.doi.org/10.21236/ada463692.
Texte intégralYounes, Paul R. Follow the Money : Using Computer Network Attack to Enforce Economic Sanctions. Fort Belvoir, VA : Defense Technical Information Center, mai 2001. http://dx.doi.org/10.21236/ada390083.
Texte intégralBest, Carole N. Computer Network Defense and Attack : Information Warfare in the Department of Defense. Fort Belvoir, VA : Defense Technical Information Center, avril 2001. http://dx.doi.org/10.21236/ada394187.
Texte intégralPharmer, James, Kevin Cropper, Jennifer McKneely et Earl Williams. Tactical Tomahawk Weapon Control System v6 Land Attack Combat System Prototype Human-Computer Interface. Fort Belvoir, VA : Defense Technical Information Center, juillet 2004. http://dx.doi.org/10.21236/ada426346.
Texte intégral