Gotowa bibliografia na temat „Attack deployment”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Attack deployment”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Attack deployment"

1

Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (2021): 1–36. http://dx.doi.org/10.1145/3465171.

Pełny tekst źródła
Streszczenie:
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances
Style APA, Harvard, Vancouver, ISO itp.
2

Xavier, Riofrío, Astudillo-Salinas Fabian, Tello-Oquendo Luis, and Merchan-Lima Jorge. "The Zero-day attack: Deployment and evolution." Latin-American Journal of Computing 8, no. 1 (2021): 38–53. https://doi.org/10.5281/zenodo.5747676.

Pełny tekst źródła
Streszczenie:
In cybersecurity and computer science, the term “zero-day” is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a highrisk probability, and a critical impact.  Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate them. In this paper, it is conducted a review of the zero-da
Style APA, Harvard, Vancouver, ISO itp.
3

Hisham, A. Kholidy ˡ'²᾽³ Fabrizio Baiardi ². and Salim Hariri ˡ. "A HIERARCHICAL INTRUSION DETECTION SYSTEM FOR CLOUDS: DESIGN AND EVALUATION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 2, December (2018): 01–24. https://doi.org/10.5281/zenodo.1435321.

Pełny tekst źródła
Streszczenie:
Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for our Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it describes the experimental results that confirm that the deployments overcome some limitation of current IDSs to detect host, network and DDoS attacks. Lastly, we discuss the integration and the correlation of the host and network IDSs alerts to
Style APA, Harvard, Vancouver, ISO itp.
4

Hance, Jack, Jordan Milbrath, Noah Ross, and Jeremy Straub. "Distributed Attack Deployment Capability for Modern Automated Penetration Testing." Computers 11, no. 3 (2022): 33. http://dx.doi.org/10.3390/computers11030033.

Pełny tekst źródła
Streszczenie:
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict and even harder to prepare for. This paper presents work designed to prepare for the cybersecurity landscape of tomorrow by creating a key support capability for an autonomous cybersecurity testing system. This system is designed to test and prepare critical infrastructure for what the future of cyberattacks looks like. It proposes a new type of attack framework that provides precise and granular attack control and higher perception within a set of infected infrastructure. The proposed attack framework i
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Junyi. "Vision-Language Model Security in Autonomous Driving: A Survey." Applied and Computational Engineering 146, no. 1 (2025): None. https://doi.org/10.54254/2755-2721/2025.tj22524.

Pełny tekst źródła
Streszczenie:
With the rapid advancement of Vision-Language Models (VLMs), their remarkable capabilities in multimodal perception and decision-making have garnered significant attention in autonomous driving. By integrating VLMs, autonomous driving systems can achieve a deeper understanding of their environment, thereby enhancing safety and efficiency. However, despite their advantages, the deployment of VLMs also introduces potential security vulnerabilities that pose critical challenges to real-world applications. They stem from the complex nature of multimodal processing, making VLMs susceptible to vario
Style APA, Harvard, Vancouver, ISO itp.
6

Kennedy, Edemacu, Euku Martin, and Ssekibuule Richard. "PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 75–86. https://doi.org/10.5281/zenodo.7502898.

Pełny tekst źródła
Streszczenie:
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and com
Style APA, Harvard, Vancouver, ISO itp.
7

Bayani, Samir Vinayak, Sanjeev Prakash, and Jesu Narkarunai Arasu Malaiyappan. "Unifying Assurance A Framework for Ensuring Cloud Compliance in AIML Deployment." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 457–72. http://dx.doi.org/10.60087/jklst.vol2.n3.p472.

Pełny tekst źródła
Streszczenie:
Intrusion poses a significant challenge in Cloud networks, necessitating the development of efficient mechanisms to mitigate intrusions and enhance system security. To address this, we propose a novel Artificial Bee-based Elman Neural Security Framework (ABENSF). This framework involves rescaling the raw dataset using preprocessing functions and integrating an optimal fitness function based on artificial bees into the feature extraction phase to identify and extract attack features. Additionally, the monitoring mechanism in ABENSF enhances network security by proactively preventing attacks. By
Style APA, Harvard, Vancouver, ISO itp.
8

Tong, Xin, Lan Chen, and Ying Li. "A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks." Applied Mechanics and Materials 128-129 (October 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.441.

Pełny tekst źródła
Streszczenie:
Wireless sensor networks (WSNs) are vulnerable to a variety of malicious attacks, especially the packet dropping attack, making security an important research field. Since prevention based techniques are less helpful for guarding against inside attacks, intrusion detection (ID) techniques are indispensable to provide advanced protection. This paper proposes an innovative cellular ID framework for packet dropping attack, which takes the deployment of passive listening nodes into consideration. Performance evaluation made in VisualSense demonstrates its high detection accuracy.
Style APA, Harvard, Vancouver, ISO itp.
9

Kaiya, Haruhiko, Junya Sakai, Shinpei Ogata, and Kenji Kaijiri. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment." International Journal of Secure Software Engineering 4, no. 3 (2013): 42–63. http://dx.doi.org/10.4018/jsse.2013070103.

Pełny tekst źródła
Streszczenie:
The authors cannot comprehensively determine all of the vulnerabilities to an attack only from requirements descriptions. To resolve the problem, the authors propose a method for eliciting security requirements using the information about system architecture. The authors convert a use-case description into a variation of a data flow diagram called an asset-flow diagram (AFD). The authors then refine the AFDs based on a processor deployment diagram (PDD), which gives information about a system architecture. By using vulnerabilities patterns to an attack, the authors distinguish vulnerabilities
Style APA, Harvard, Vancouver, ISO itp.
10

Hasin, Martin, Martin Chovanec, Jakub Palša, and Martin Havrilla. "Analysis and Collection Data from IP Network." Acta Electrotechnica et Informatica 22, no. 3 (2022): 18–23. http://dx.doi.org/10.2478/aei-2022-0013.

Pełny tekst źródła
Streszczenie:
Abstract The rapid deployment of technologies that can share data brings, in addition to the positive aspects, also technologies that an attacker can use to misuse personal data. Vulnerabilities in the network can be divided according to the type of attack into horizontal attacks from the perspective of the attacker and vertical attacks from the perspective of the victim. An important goal of organizations is to successfully defend against such an attack. The search for attacks on the network infrastructure can be ensured by implementing machine learning that can capture the current attack. Th
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Attack deployment"

1

Beckman, Philip J. "Scheduling attack submarine deployments." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8944.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited<br>The Navy's peacetime mission is "to conduct forward presence operations to help shape the strategic environment by deterring conflict, building interoperability, and by responding, as necessary, to fast breaking crises with the demonstration and application of credible combat power." (OPNAV INSTRUCTION 3501.316, February 1995) The ability to carry out this mission hinges on the Navy's ability to maintain ships and submarines forward deployed in regions where such crises may occur. The end of the Cold War and current budget constraints h
Style APA, Harvard, Vancouver, ISO itp.
2

Chairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.

Pełny tekst źródła
Streszczenie:
Large scale networks face daily thousands of network attacks. No matter the strength of the existing security defending mechanisms, these networks remain vulnerable, as new tools and techniques are being constantly developed by hackers. A new promising technology that lures the attackers in order to monitor their malicious activities and divulge their intentions is emerging with Virtual Honeypots. In the present thesis, we examine an extensive security mechanism based on three different open source low interaction honeypots. We implement this mechanism at our university campus network in an at
Style APA, Harvard, Vancouver, ISO itp.
3

HASSAN, FARRUKH. "ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.

Pełny tekst źródła
Streszczenie:
This thesis communicates a new approach for the future Library system using secure NFC technology. Today we can use NFC and Android based mobile phones to build modern library system in which user will instead of standing in the queue can directly borrow and return books. The NFC technology which will use in this thesis is capable of storing small amount of information. This storage will be used for maintaining the books records. Although the NFC works in close proximity but still there are possibilities of attacks. Due to contact less communication the victim cannot notice the attacks. There
Style APA, Harvard, Vancouver, ISO itp.
4

Lin, Shoa-Hua, and 林紹驊. "Heterogeneous Tracers Deployment against DDoS Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/67279576997063309296.

Pełny tekst źródła
Streszczenie:
碩士<br>中華大學<br>資訊工程學系碩士班<br>102<br>To mitigate the DoS/DDoS attacks efficiently, traditional routers are supposed to enhance with different capabilities for tracing attacks origins and filtering abnormal packets in time. In previous work, the enhanced routers are referred to as tracers and classified into three categories, namely tunneling-enabled tracers, marking-enabled tracers and filtering-enabled tracers. The tunneling-enabled tracers can easily reroute packets to the other two kinds of tracers and then the probability of marking and filtering attack packets can be increased. In the enviro
Style APA, Harvard, Vancouver, ISO itp.
5

HSU, CHUN-YI, and 徐君毅. "Digital Forensics of Cyber Attack on Cloud Deployment Environment Based on vSphere Hypervisor." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/bkg9f2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lien, Chia-Chun, and 連嘉俊. "Tracers Deployment of Nodes-Aware Protection Areas against DDoS Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/46763164147765613154.

Pełny tekst źródła
Streszczenie:
碩士<br>中華大學<br>資訊工程學系碩士班<br>102<br>Network security problems emerge in an endless stream. One of serious problems is Distributed Denial of Service (DDoS) attack, which paralyzes hosts such that they cannot provide service for their clients by occupying their resources or network bandwidth. To solve the DDoS problems efficiently, traditional routers have to be enhanced with additional capabilities such as tracing attacks origins, filtering malicious packets, etc. We refer the enhanced routers to as tracers. Under the cost consideration in practice, it is hard to upgrade all of routers to be trac
Style APA, Harvard, Vancouver, ISO itp.
7

林昭名. "The Deployment of Distributed Virtual Honeynet for Detecting Network Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73013564976506391756.

Pełny tekst źródła
Streszczenie:
碩士<br>佛光大學<br>資訊學系<br>99<br>With the popularity of the Internet, the application of daily life is also booming, so many of the network gradually derivative security problems facing the program and continue to introduce new variants of malicious network attack techniques, the use of traditional firewall and intrusion detection systems Passive defense, has been unable to response to this rapid change. In order to effectively resolve the difficulties faced, the previous passive way of defense has to be changed into an active way of exploration, so the possible existing network loopholes of the cu
Style APA, Harvard, Vancouver, ISO itp.
8

Chen, Yi-Shun, and 陳奕勳. "Deployment and Management of SDN/NFV Network Testbed: A Case Study of DDoS Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/m68z28.

Pełny tekst źródła
Streszczenie:
碩士<br>國立中央大學<br>資訊工程學系<br>103<br>After the concept of SDN (Software Defined Network) and NFV (Network Functions Virtualization) are proposed in the world. Researchers begin to study SDN/NFV but the experiment of SDN/NFV needs many costs of devices so there are many network testbeds proposed literature, currently. The Compute node (CN) is an important resource in network testbed. In the past, network testbed usually makes CN by VM. The VM must loads guest OS but let cost and performance, poorly. This paper proposed DONT (Docker-based Openflow Network Testbed, DONT) The CN use Docker Container,
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Attack deployment"

1

Beckman, Philip J. Scheduling attack submarine deployments. Naval Postgraduate School, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Clinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Clinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to sevceral isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

United States. President (1993-2001 : Clinton). Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Office, General Accounting. Operation Desert Storm: Disposal and sale of excess items : fact sheet for Congressional requesters. U.S. General Accounting Office, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Office, General Accounting. Operation Desert Storm: Army medical supply issues : report to the Chairman, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Office, General Accounting. Operation Desert Storm: No evidence that foreign suppliers refused to support war effort : report to Congressional requesters. U.S. General Accounting Office, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Office, General Accounting. Operation Desert Storm: Problems with Air Force medical readiness : report to the Chairman, Subcommittee on Military Forces and Personnel, Committee on Armed Services. U.S. General Accounting Office, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Office, General Accounting. Operation Desert Storm: Apache helicopter fratricide incident : report to the Chairman, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. The Office, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Office, General Accounting. Operation Desert Storm: Army had difficulty providing adequate active and reserve support forces : report to the Chairman, Subcommittee on Readiness, Committee on Armed Services, House of Representatives. The Office, 1992.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Attack deployment"

1

Haber, Morey J. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Haber, Morey J., and Brad Hibbert. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Haber, Morey J., and Brad Hibbert. "Vulnerability Management Deployment." In Asset Attack Vectors. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Krzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.

Pełny tekst źródła
Streszczenie:
AbstractDetection of unknown attacks is challenging due to the lack of exemplary attack vectors. However, previously unknown attacks are a significant danger for systems due to a lack of tools for protecting systems against them, especially in fast-evolving Internet of Things (IoT) technology. The most widely used approach for malicious behaviour of the monitored system is detecting anomalies. The vicious behaviour might result from an attack (both known and unknown) or accidental breakdown. We present a Net Anomaly Detector (NAD) system that uses one-class classification Machine Learning tech
Style APA, Harvard, Vancouver, ISO itp.
5

Ben Salem, Malek, and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Moëllic, Pierre-Alain, Mathieu Dumont, Kevin Hector, Christine Hennebert, Raphaël Joud, and Dylan Paulin. "Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models." In Intelligent Secure Trustable Things. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_6.

Pełny tekst źródła
Streszczenie:
AbstractThe large-scale deployment of machine learning models in a wide variety of AI-based systems raises major security concerns related to their integrity, confidentiality and availability. These security issues encompass the overall traditional machine learning pipeline, including the training and the inference processes. In the case of embedded models deployed in physically accessible devices, the attack surface is particularly complex because of additional attack vectors exploiting implementation-based flaws. This chapter aims at describing the most important attacks that threaten state-
Style APA, Harvard, Vancouver, ISO itp.
7

Maaliw, Renato R., Haewon Byeon, Ravi Kumar, and D. Y. Patil Vidyapeeth. "Dynamic deployment and traffic scheduling of UPF in 5G networks." In Networks Attack Detection on 5G Networks using Data Mining Techniques. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Pełny tekst źródła
Streszczenie:
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the f
Style APA, Harvard, Vancouver, ISO itp.
9

Sayari, Amal, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, and Belhassen Jerbi. "Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph." In Advanced Information Networking and Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99587-4_48.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Volk, Kaitlin M., and Trajan J. Gering. "Predicting Biosecurity Threats: Deployment and Detection of Biological Weapons." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_13.

Pełny tekst źródła
Streszczenie:
AbstractUnderstanding what kinds of biological weapons can be made with what sort of technology and by whom is an important component of biosecurity. An equally important component is understanding the different potential targets a biological weapon could be designed to attack, how the weapon would be deployed against these targets, and the available strategies to detect the creation and deployment of an illegal biological weapon. Understanding how a weapon could be deployed against specific targets affords decision makers a better picture of the current state and capabilities of biowarfare an
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Attack deployment"

1

You, Young, and Sung Jung. "Optimal Active Twist Deployment Schedule of a Rotor for Performance Improvement and Vibration Reduction." In Vertical Flight Society 72nd Annual Forum & Technology Display. The Vertical Flight Society, 2016. http://dx.doi.org/10.4050/f-0072-2016-11444.

Pełny tekst źródła
Streszczenie:
In this paper, the best actuation schedules exploiting various waveform types are sought taking advantage of the global search algorithm for the reduction of the power required and/or hub vibration of a rotor in high speed forward flight. The active twist schedules include two non-harmonic inputs formed based on segmented step functions along with the simple harmonic waveform input. An advanced particle swarm assisted genetic algorithm (PSGA) is employed for the optimizer. A rotorcraft computational structural dynamics (CSD) code CAMRAD II is used to perform the rotor aeromechanics analysis. A
Style APA, Harvard, Vancouver, ISO itp.
2

Barrett, Seth, Calvin Idom, German Zavala Villafuerte, Andrew Byers, and Berk Gulmezoglu. "Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies1." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758948.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Palencsár, Attila, and Rolf Nyborg. "Assessment of Precorrosion Methods for Inhibitor Testing under Sour Conditions." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17903.

Pełny tekst źródła
Streszczenie:
Abstract Qualification of corrosion inhibitors for field deployment involves performance testing in the laboratory. Especially for sour service, a common set of test methods and associated protocols or guidelines used across the oil and gas industry, chemical companies and laboratories does, however, not exist. Development and testing of robust methodology were at the core of a Joint Industry Project (JIP) carried out at the Institute for Energy Technology (IFE). This contribution presents a selection of findings related to precorrosion, one of the aspects addressed in the JIP. A series of ben
Style APA, Harvard, Vancouver, ISO itp.
4

Maleki, Sajjad, Subhash Lakshminarayana, E. Veronica Belmega, and Carsten Maple. "A Game-Theoretic Approach for PMU Deployment Against False Data Injection Attacks." In 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 2024. http://dx.doi.org/10.1109/smartgridcomm60555.2024.10738064.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Moon, Soo-Jin, Milind Srivastava, Yves Bieri, Ruben Martins, and Vyas Sekar. "Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00144.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Pełny tekst źródła
Streszczenie:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framewor
Style APA, Harvard, Vancouver, ISO itp.
7

Young June Pyun and Douglas S. Reeves. "Strategic deployment of network monitors for attack attribution." In 2007 4th International Conference on Broadband Communications, Networks and Systems (BROADNETS 2007). IEEE, 2007. http://dx.doi.org/10.1109/broadnets.2007.4550478.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Fang, Hao, Ajian Liu, Haocheng Yuan, et al. "Unified Physical-Digital Face Attack Detection." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/83.

Pełny tekst źródła
Streszczenie:
Face Recognition (FR) systems can suffer from physical (i.e., print photo) and digital (i.e., DeepFake) attacks. However, previous related work rarely considers both situations at the same time. This implies the deployment of multiple models and thus more computational burden. The main reasons for this lack of an integrated model are caused by two factors: (1) The lack of a dataset including both physical and digital attacks which the same ID covers the real face and all attack types; (2) Given the large intra-class variance between these two attacks, it is difficult to learn a compact feature
Style APA, Harvard, Vancouver, ISO itp.
9

Lei Wang, Qing Li, Yong Jiang, and Jianping Wu. "Towards mitigating Link Flooding Attack via incremental SDN deployment." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543772.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Agmon, Noga, Asaf Shabtai, and Rami Puzis. "Deployment optimization of IoT devices through attack graph analysis." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3323411.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Attack deployment"

1

England, Ellen C. Food for Thought - The Use of Hazard and Critical Control Point Analysis to Assess Vulnerability of Food to Terrorist Attack in Deployment Locations, A Case Study. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada398624.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Berney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40401.

Pełny tekst źródła
Streszczenie:
The ability to remotely assess road and airfield pavement condition is critical to dynamic basing, contingency deployment, convoy entry and sustainment, and post-attack reconnaissance. Current Army processes to evaluate surface condition are time-consuming and require Soldier presence. Recent developments in the area of photogrammetry and light detection and ranging (LiDAR) enable rapid generation of three-dimensional point cloud models of the pavement surface. Point clouds were generated from data collected on a series of asphalt, concrete, and unsurfaced pavements using ground- and aerial-ba
Style APA, Harvard, Vancouver, ISO itp.
3

Amador, Julio S. III, Maria Gisela Orinion, Mary Ann Del Rosario, and Jill Angeli Bacasmas. Process Evaluation of the Deployment of Service Attachés or Representatives of Certain Government Agencies. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.54.

Pełny tekst źródła
Streszczenie:
This study evaluates the deployment processes of service attachés of eight government agencies. It reviews the current systems, frameworks, and criteria in place for deploying service attachés at the relevant partner agencies and the Department of Foreign Affairs based on laws and policies (i.e., agency-specific and interagency). Further, it reviews the monitoring and evaluation systems in place that have captured the measurable outputs and performance of the deployed service attachés. Findings validate that the processes involved in the deployment of service attachés are based on policies (i.
Style APA, Harvard, Vancouver, ISO itp.
4

Casey, Jonathan, Alexander Bisaro, Alvaro Valverde, Marlon Martinez, and Martin Rokitzki. Private finance investment opportunities in climate-smart agriculture technologies. Foreign, Commonwealth and Development Office (FCDO), 2021. http://dx.doi.org/10.1079/20220030734.

Pełny tekst źródła
Streszczenie:
This investor-focused study analyses the role of private finance in climate-smart agriculture (CSA) technology innovation and deployment in Africa and Asia. It focuses in on the perspectives of investors, identifies technologies and areas that demonstrate commercial viability and investment potential, profiles existing investments in CSA technologies, explores the motives and incentives that may attract investors to financing CSA technology companies, and provides a more nuanced understanding of the barriers and bottlenecks that exist for mobilizing greater investment for CSA technology. The f
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!