Добірка наукової літератури з теми "Attack and defence"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Attack and defence".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Attack and defence"
Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Повний текст джерелаK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Повний текст джерелаSiame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.
Повний текст джерелаGao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.
Повний текст джерелаKUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.
Повний текст джерелаAsabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.
Повний текст джерелаJurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.
Повний текст джерелаAkintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.
Повний текст джерелаLi, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.
Повний текст джерелаLi, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.
Повний текст джерелаДисертації з теми "Attack and defence"
Kemp, Benjamin Peter. "Attack and defence in cassava bacterial blight." Thesis, University of Bath, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268932.
Повний текст джерелаSandin, Michael. "Pre-Emptive Self-Defence : When does an armed attack occur?" Thesis, Stockholms universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-193754.
Повний текст джерелаMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Повний текст джерелаNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Повний текст джерелаMohr, Peter G., and lswan@deakin edu au. "Abscisic acid regulation of plant defence responses during pathogen attack." Deakin University. School of Biological and Chemical Sciences, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060927.120049.
Повний текст джерелаGlass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks." Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.
Повний текст джерелаArnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.
Повний текст джерелаCatic, Elma. "A right to self-defence or an excuse to use armed force? : About the legality of using self-defence before an armed attack has occurred." Thesis, Stockholms universitet, Stockholm Center for International Law and Justice (SCILJ), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-183513.
Повний текст джерелаCrossley, G. J. "The civil defence debate in Britain 1957-83 : an account and critical analysis of the major issues in the debate about civil defence against nuclear attack." Thesis, University of Bradford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355206.
Повний текст джерелаIoannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.
Повний текст джерелаКниги з теми "Attack and defence"
P, Mayer C., ed. Hostile takeovers: Defence, attack, and corporate governance. McGraw-Hill Book Co., 1994.
Знайти повний текст джерелаJorge A. De Vasconcellos e Sá. Strategy plays: Attack and defence strategies for business. Financial Times Prentice Hall, 2005.
Знайти повний текст джерелаAnderluh, Gregor, and Robert Gilbert, eds. MACPF/CDC Proteins - Agents of Defence, Attack and Invasion. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8881-6.
Повний текст джерелаPaloczi-Horvath, George. From monitor to missile boat: Coast defence ships and coastal defence since 1860. Naval Institute Press, 1996.
Знайти повний текст джерелаMeredith, Sheena, and Graham Jackson. Conquering heart attack & stroke: Your 10 step self-defence plan. Reader's Digest, 2010.
Знайти повний текст джерелаDvoretsky, Mark. Attack and defence: How creative thought develops in a chess player. Batsford, 1998.
Знайти повний текст джерелаSzabó, Kinga Tibori. Anticipatory action in self-defence: Essence and limits under international law. T.M.C. Asser Press, 2011.
Знайти повний текст джерелаWood, Derek. Attack Warning Red: The Royal Observer Corps and the defence of Britain 1925 to 1992. Carmichael & Sweet, 1992.
Знайти повний текст джерелаSouthall, Colin Spencer. The defence of Lithgow: Under threat of invasion and air attack during the Second World War. Greater Lithgow City Council, 1995.
Знайти повний текст джерелаS. Rajaratnam School of International Studies, ed. In defence of freedom of speech and against the publication of certain cartoons. S. Rajaratnam School of International Studies, 2015.
Знайти повний текст джерелаЧастини книг з теми "Attack and defence"
Gabbay, Dov M., Ross Horne, Sjouke Mauw, and Leendert van der Torre. "Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_8.
Повний текст джерелаBroom, Donald M. "Defence and attack behaviour." In Broom and Fraser’s domestic animal behaviour and welfare, 6th ed. CABI, 2021. http://dx.doi.org/10.1079/9781789249835.0008.
Повний текст джерелаLatas, Milan. "Panic Disorder During a Bioterroristic Attack." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_11.
Повний текст джерелаWu, Tao, Hang Zhang, Jun Ma, and Sujuan Zhang. "Intelligent DDoS Attack Defence Model." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40618-8_90.
Повний текст джерелаYu, Shui. "DDoS Attack and Defence in Cloud." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_5.
Повний текст джерелаHermanns, Holger, Julia Krämer, Jan Krčál, and Mariëlle Stoelinga. "The Value of Attack-Defence Diagrams." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49635-0_9.
Повний текст джерелаBelojevic, Goran. "Comparison of the Available Methods of Differentiation Between a Biological Attack and Other Epidemics." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_6.
Повний текст джерелаAslanyan, Zaruhi, and Flemming Nielson. "Pareto Efficient Solutions of Attack-Defence Trees." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46666-7_6.
Повний текст джерелаMin, Byungho, and Vijay Varadharajan. "Feature-Distributed Malware Attack: Risk and Defence." In Computer Security - ESORICS 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11212-1_26.
Повний текст джерелаGoldsmith, Netta Murray. "Attack – the Best Method of Defence: Strategies." In Alexander Pope. Routledge, 2024. http://dx.doi.org/10.4324/9781003577119-12.
Повний текст джерелаТези доповідей конференцій з теми "Attack and defence"
Ahmed, Mahad, and Muhammad Atif Tahir. "Bagging as Defence Mechanism Against Adversarial Attack." In 2024 International Conference on Emerging Trends in Smart Technologies (ICETST). IEEE, 2024. http://dx.doi.org/10.1109/icetst62952.2024.10737949.
Повний текст джерелаPatil, Rajendra Shivaji, Markus Dypbukt Källman, and Viktoria Fodor. "DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679390.
Повний текст джерелаSinha, Indrajeet Kumar, Avadhoot Bangal, Krishna Pratap Singh, and Shekhar Verma. "MDMFL: Monitored Defence Mechanism for Federated Learning against Data Poisoning Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725046.
Повний текст джерелаAlsharidah, Ahmad A., Devki Nandan Jha, Bo Wei, Ellis Solaiman, and Rajiv Ranjan. "SecureFed: Blockchain-Based Defence for Data Poisoning Attack in Federated Learning." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00064.
Повний текст джерелаJiang, Chengcheng, and Peilin Hong. "A routing defence scheme against wormhole-like attack in BCube networks." In Fifth International Conference on Digital Signal and Computer Communications (DSCC 2025), edited by Gordana Jovanovic-Dolecek and Ke-Lin Du. SPIE, 2025. https://doi.org/10.1117/12.3071385.
Повний текст джерелаvan Lier, Michel L., Richard J. M. den Hollander, and Hugo J. Kuijf. "Adversarial AI image perturbation attack invariant to object scale and type." In Artificial Intelligence for Security and Defence Applications II, edited by Henri Bouma, Yitzhak Yitzhaky, Radhakrishna Prabhu, and Hugo J. Kuijf. SPIE, 2024. http://dx.doi.org/10.1117/12.3031545.
Повний текст джерелаLi, Xin, Chunyan Yang, and Ming Xie. "Optimized Design of Security Attack and Defence Strategies for Virtual Network Simulation Platforms." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10672988.
Повний текст джерелаWei, Xiaodong, Lina Chen, Siwei Li, and Mingfei Zeng. "Research on cyber security attack and defence strategy simulation in a virtual network environment." In Fourth International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2024), edited by Massimo Ficco and Yixian Yang. SPIE, 2025. https://doi.org/10.1117/12.3058606.
Повний текст джерелаS, Prasanth V., P. S. Haritha, B. Likhitha, Kasireddy Mahalakshmi, and A. Parveen Akhther. "Artificial Intelligence Based Supervised Learning Model for Attack Detection of Botnet and Defence in Iot Cybersecurity Infrastructures Using Convolutional Neural Network." In 2025 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2025. https://doi.org/10.1109/icict64420.2025.11004980.
Повний текст джерелаSofia, R., S. Yazhinian, R. Sambathkumar, R. Saranya, and M. Jeyakumar. "CSPS- Cyber Security Physical System with a Gaming and Defence Strategic Approach to Detect the Malicious Attack for Vehicle to Everything Network." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894465.
Повний текст джерелаЗвіти організацій з теми "Attack and defence"
Smythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.
Повний текст джерелаPaine, K., O. Whitehouse, J. Sellwood, and A. Shaw. Indicators of Compromise (IoCs) and Their Role in Attack Defence. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9424.
Повний текст джерелаSaalman, Lora. Navigating Chinese–Russian Nuclear and Space Convergence and Divergence. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/rxgl6272.
Повний текст джерелаChristie, Lorna, and Jeni Spragg. Chemical Weapons. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn596.
Повний текст джерелаde Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Повний текст джерелаMaxion, Roy A., Kevin S. Killourhy, and Kymie M. Tan. Developing a Defense-Centric Attack Taxonomy. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada435079.
Повний текст джерелаGupta, Aman. Hardware Trojan Attack and Defense Techniques. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-812.
Повний текст джерелаJennings-Edquist, Grace. Time to defend science under attack. Monash University, 2024. http://dx.doi.org/10.54377/0e1f-f103.
Повний текст джерелаBest, Carole N. Computer Network Defense and Attack: Information Warfare in the Department of Defense. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada394187.
Повний текст джерелаHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500822.
Повний текст джерела