Gotowa bibliografia na temat „Attack deployment”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Attack deployment”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Attack deployment"
Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (2021): 1–36. http://dx.doi.org/10.1145/3465171.
Pełny tekst źródłaXavier, Riofrío, Astudillo-Salinas Fabian, Tello-Oquendo Luis, and Merchan-Lima Jorge. "The Zero-day attack: Deployment and evolution." Latin-American Journal of Computing 8, no. 1 (2021): 38–53. https://doi.org/10.5281/zenodo.5747676.
Pełny tekst źródłaHisham, A. Kholidy ˡ'²᾽³ Fabrizio Baiardi ². and Salim Hariri ˡ. "A HIERARCHICAL INTRUSION DETECTION SYSTEM FOR CLOUDS: DESIGN AND EVALUATION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 2, December (2018): 01–24. https://doi.org/10.5281/zenodo.1435321.
Pełny tekst źródłaHance, Jack, Jordan Milbrath, Noah Ross, and Jeremy Straub. "Distributed Attack Deployment Capability for Modern Automated Penetration Testing." Computers 11, no. 3 (2022): 33. http://dx.doi.org/10.3390/computers11030033.
Pełny tekst źródłaWang, Junyi. "Vision-Language Model Security in Autonomous Driving: A Survey." Applied and Computational Engineering 146, no. 1 (2025): None. https://doi.org/10.54254/2755-2721/2025.tj22524.
Pełny tekst źródłaKennedy, Edemacu, Euku Martin, and Ssekibuule Richard. "PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 75–86. https://doi.org/10.5281/zenodo.7502898.
Pełny tekst źródłaBayani, Samir Vinayak, Sanjeev Prakash, and Jesu Narkarunai Arasu Malaiyappan. "Unifying Assurance A Framework for Ensuring Cloud Compliance in AIML Deployment." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 457–72. http://dx.doi.org/10.60087/jklst.vol2.n3.p472.
Pełny tekst źródłaTong, Xin, Lan Chen, and Ying Li. "A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks." Applied Mechanics and Materials 128-129 (October 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.441.
Pełny tekst źródłaKaiya, Haruhiko, Junya Sakai, Shinpei Ogata, and Kenji Kaijiri. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment." International Journal of Secure Software Engineering 4, no. 3 (2013): 42–63. http://dx.doi.org/10.4018/jsse.2013070103.
Pełny tekst źródłaHasin, Martin, Martin Chovanec, Jakub Palša, and Martin Havrilla. "Analysis and Collection Data from IP Network." Acta Electrotechnica et Informatica 22, no. 3 (2022): 18–23. http://dx.doi.org/10.2478/aei-2022-0013.
Pełny tekst źródłaRozprawy doktorskie na temat "Attack deployment"
Beckman, Philip J. "Scheduling attack submarine deployments." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8944.
Pełny tekst źródłaChairetakis, Eleftherios, Bassam Alkudhir, and Panagiotis Mystridis. "Deployment of Low Interaction Honeypots in University Campus Network." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22141.
Pełny tekst źródłaHASSAN, FARRUKH. "ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-251590.
Pełny tekst źródłaLin, Shoa-Hua, and 林紹驊. "Heterogeneous Tracers Deployment against DDoS Attack." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/67279576997063309296.
Pełny tekst źródłaHSU, CHUN-YI, and 徐君毅. "Digital Forensics of Cyber Attack on Cloud Deployment Environment Based on vSphere Hypervisor." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/bkg9f2.
Pełny tekst źródłaLien, Chia-Chun, and 連嘉俊. "Tracers Deployment of Nodes-Aware Protection Areas against DDoS Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/46763164147765613154.
Pełny tekst źródła林昭名. "The Deployment of Distributed Virtual Honeynet for Detecting Network Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73013564976506391756.
Pełny tekst źródłaChen, Yi-Shun, and 陳奕勳. "Deployment and Management of SDN/NFV Network Testbed: A Case Study of DDoS Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/m68z28.
Pełny tekst źródłaKsiążki na temat "Attack deployment"
Beckman, Philip J. Scheduling attack submarine deployments. Naval Postgraduate School, 1997.
Znajdź pełny tekst źródłaClinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.
Znajdź pełny tekst źródłaClinton), United States President (1993-2001 :. Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to sevceral isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.
Znajdź pełny tekst źródłaUnited States. President (1993-2001 : Clinton). Status report on Liberia: Communication from the President of the United States transmitting an updated report on the continued deployment of U.S. forces, including the response by those forces to several isolated attacks on the American Embassy complex on April 30, 1996, and May 6, 1996. U.S. G.P.O., 1996.
Znajdź pełny tekst źródłaOffice, General Accounting. Operation Desert Storm: Disposal and sale of excess items : fact sheet for Congressional requesters. U.S. General Accounting Office, 1992.
Znajdź pełny tekst źródłaOffice, General Accounting. Operation Desert Storm: Army medical supply issues : report to the Chairman, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, U.S. Senate. U.S. General Accounting Office, 1993.
Znajdź pełny tekst źródłaOffice, General Accounting. Operation Desert Storm: No evidence that foreign suppliers refused to support war effort : report to Congressional requesters. U.S. General Accounting Office, 1992.
Znajdź pełny tekst źródłaOffice, General Accounting. Operation Desert Storm: Problems with Air Force medical readiness : report to the Chairman, Subcommittee on Military Forces and Personnel, Committee on Armed Services. U.S. General Accounting Office, 1993.
Znajdź pełny tekst źródłaOffice, General Accounting. Operation Desert Storm: Apache helicopter fratricide incident : report to the Chairman, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. The Office, 1993.
Znajdź pełny tekst źródłaOffice, General Accounting. Operation Desert Storm: Army had difficulty providing adequate active and reserve support forces : report to the Chairman, Subcommittee on Readiness, Committee on Armed Services, House of Representatives. The Office, 1992.
Znajdź pełny tekst źródłaCzęści książek na temat "Attack deployment"
Haber, Morey J. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_24.
Pełny tekst źródłaHaber, Morey J., and Brad Hibbert. "Deployment Considerations." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_21.
Pełny tekst źródłaHaber, Morey J., and Brad Hibbert. "Vulnerability Management Deployment." In Asset Attack Vectors. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_15.
Pełny tekst źródłaKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Pełny tekst źródłaBen Salem, Malek, and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_3.
Pełny tekst źródłaMoëllic, Pierre-Alain, Mathieu Dumont, Kevin Hector, Christine Hennebert, Raphaël Joud, and Dylan Paulin. "Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models." In Intelligent Secure Trustable Things. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_6.
Pełny tekst źródłaMaaliw, Renato R., Haewon Byeon, Ravi Kumar, and D. Y. Patil Vidyapeeth. "Dynamic deployment and traffic scheduling of UPF in 5G networks." In Networks Attack Detection on 5G Networks using Data Mining Techniques. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281-2.
Pełny tekst źródłaFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Pełny tekst źródłaSayari, Amal, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, and Belhassen Jerbi. "Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph." In Advanced Information Networking and Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99587-4_48.
Pełny tekst źródłaVolk, Kaitlin M., and Trajan J. Gering. "Predicting Biosecurity Threats: Deployment and Detection of Biological Weapons." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_13.
Pełny tekst źródłaStreszczenia konferencji na temat "Attack deployment"
You, Young, and Sung Jung. "Optimal Active Twist Deployment Schedule of a Rotor for Performance Improvement and Vibration Reduction." In Vertical Flight Society 72nd Annual Forum & Technology Display. The Vertical Flight Society, 2016. http://dx.doi.org/10.4050/f-0072-2016-11444.
Pełny tekst źródłaBarrett, Seth, Calvin Idom, German Zavala Villafuerte, Andrew Byers, and Berk Gulmezoglu. "Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies1." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758948.
Pełny tekst źródłaPalencsár, Attila, and Rolf Nyborg. "Assessment of Precorrosion Methods for Inhibitor Testing under Sour Conditions." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17903.
Pełny tekst źródłaMaleki, Sajjad, Subhash Lakshminarayana, E. Veronica Belmega, and Carsten Maple. "A Game-Theoretic Approach for PMU Deployment Against False Data Injection Attacks." In 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, 2024. http://dx.doi.org/10.1109/smartgridcomm60555.2024.10738064.
Pełny tekst źródłaMoon, Soo-Jin, Milind Srivastava, Yves Bieri, Ruben Martins, and Vyas Sekar. "Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00144.
Pełny tekst źródłaMarek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Pełny tekst źródłaYoung June Pyun and Douglas S. Reeves. "Strategic deployment of network monitors for attack attribution." In 2007 4th International Conference on Broadband Communications, Networks and Systems (BROADNETS 2007). IEEE, 2007. http://dx.doi.org/10.1109/broadnets.2007.4550478.
Pełny tekst źródłaFang, Hao, Ajian Liu, Haocheng Yuan, et al. "Unified Physical-Digital Face Attack Detection." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/83.
Pełny tekst źródłaLei Wang, Qing Li, Yong Jiang, and Jianping Wu. "Towards mitigating Link Flooding Attack via incremental SDN deployment." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543772.
Pełny tekst źródłaAgmon, Noga, Asaf Shabtai, and Rami Puzis. "Deployment optimization of IoT devices through attack graph analysis." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3323411.
Pełny tekst źródłaRaporty organizacyjne na temat "Attack deployment"
England, Ellen C. Food for Thought - The Use of Hazard and Critical Control Point Analysis to Assess Vulnerability of Food to Terrorist Attack in Deployment Locations, A Case Study. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada398624.
Pełny tekst źródłaBerney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40401.
Pełny tekst źródłaAmador, Julio S. III, Maria Gisela Orinion, Mary Ann Del Rosario, and Jill Angeli Bacasmas. Process Evaluation of the Deployment of Service Attachés or Representatives of Certain Government Agencies. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.54.
Pełny tekst źródłaCasey, Jonathan, Alexander Bisaro, Alvaro Valverde, Marlon Martinez, and Martin Rokitzki. Private finance investment opportunities in climate-smart agriculture technologies. Foreign, Commonwealth and Development Office (FCDO), 2021. http://dx.doi.org/10.1079/20220030734.
Pełny tekst źródła