Добірка наукової літератури з теми "Attack and defence"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Attack and defence".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Attack and defence"

1

Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.

Повний текст джерела
Анотація:
Denial of Service( DOS) attacks are an immense trouble to internet spots and among the hardest security problems in moment’s Internet. Of particular concern- because of their implicit impact- are the Distributed Denial of Service( DDoS) attacks. With little or no advance advising a DDoS attack can fluently exhaust the computing and communication coffers of its victim within a short period of time. This paper presents the problem of DDoS attacks and develops a bracket of DDoS defence systems. Description of each attack and defence system order is provided ,along with the advantages and disadvan
Стилі APA, Harvard, Vancouver, ISO та ін.
2

K.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.

Повний текст джерела
Анотація:
Denial of Service (DoS) attacks is one of the major threats to Internet sites and one of the major security problems Internet faces today. The nature of threats caused by Distributed Denial of Service (DDoS) attacks on networks. With little or no warning, a DDoS attack could easily destroy its victim's communication and network resources in a short period of time. This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms. Important features of each attack and defense system category are described and advantages and disadvantages
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Siame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.

Повний текст джерела
Анотація:
Pre-emptive use of force in self-defence is one of the most controversial areas under International Law. States attack each other even if the attack appears more distant. The Right of self-defence can only be invoked against an armed attack. Pre-emptive use of force allows states to use coercive measures against perceived future threats. This type of self-defence is used by the states prior to an armed attack which is contrary to the UN Charter. The defending states do not follow the requirement of necessity and proportionality when using force. The Research Questions were to what extent Pre-e
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.

Повний текст джерела
Анотація:
The synthetic aperture radar (SAR) image ship detection system needs to adapt to an increasingly complicated actual environment, and the requirements for the stability of the detection system continue to increase. Adversarial attacks deliberately add subtle interference to input samples and cause models to have high confidence in output errors. There are potential risks in a system, and input data that contain confrontation samples can be easily used by malicious people to attack the system. For a safe and stable model, attack algorithms need to be studied. The goal of traditional attack algor
Стилі APA, Harvard, Vancouver, ISO та ін.
5

KUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.

Повний текст джерела
Анотація:
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to stop them is growing. The use of newly formed Software-Defined Networking (SDN) significantly lowers the computational burden on IoT network nodes and makes it possible to perform more security measurements. This paper proposes an SDN-based, four module DDoS attack detection and mitigation framework for IoT networks called FMDADM. The proposed
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Asabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.

Повний текст джерела
Анотація:
In the domain of cyber security, the defence mechanisms of networks has traditionally been placed in a reactionary role. Cyber security professionals are therefore disadvantaged in a cyber-attack situation due to the fact that it is vital that they maneuver such attacks before the network is totally compromised. In this paper, we utilize the Betweenness Centrality network measure (social property) to discover possible cyber-attack paths and then employ computation of similar personality of nodes/users to generate predictions about possible attacks within the network. Our method proposes a soci
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.

Повний текст джерела
Анотація:
AbstractTerrorist attacks on critical infrastructures can cause problems to a national stability and functioning. Food and water supply chains are some of the most important infrastructures, and it is the country’s (government’s) obligation to provide sufficient quantities of food and water to its population. Intentional food contamination can, among other motives, originate from an act of terrorism (with political or ideological motives) with the aim of causing fear (terror) among people. Food defence systems can help assess vulnerabilities, determine mitigation strategies for terrorist attac
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Akintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.

Повний текст джерела
Анотація:
<em>Integrating research testbeds, attack mechanisms, and defence strategies into a unified cybersecurity framework offers a pathway to addressing the growing complexity of cyber threats. This study explores the multifaceted roles of research testbeds in simulating and emulating real-world environments, enabling the assessment of vulnerabilities and testing defence mechanisms. It also examines the evolution of attack vectors, such as Advanced Persistent Threats (APTs), and the importance of adapting preventive, detective, and corrective measures in response to these threats. The research advoc
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Li, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.

Повний текст джерела
Анотація:
The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. The basic idea of safe active defence is to make the defence gain more significant than the at
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Li, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.

Повний текст джерела
Анотація:
Data privacy breaches during the training and implementation of the model are the main challenges that impede the development of artificial intelligence technologies today. Federated Learning has been an effective tool for the protection of privacy. Federated Learning is a distributive machine learning method that trains a non-destructive learning module based on a local training and passage of parameters from participants, with no required direct access to data source. Federated Learning still holds many pitfalls. This paper first introduces the types of federated learning, including horizont
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Attack and defence"

1

Kemp, Benjamin Peter. "Attack and defence in cassava bacterial blight." Thesis, University of Bath, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268932.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Sandin, Michael. "Pre-Emptive Self-Defence : When does an armed attack occur?" Thesis, Stockholms universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-193754.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.

Повний текст джерела
Анотація:
La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e qu
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Повний текст джерела
Анотація:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mohr, Peter G., and lswan@deakin edu au. "Abscisic acid regulation of plant defence responses during pathogen attack." Deakin University. School of Biological and Chemical Sciences, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060927.120049.

Повний текст джерела
Анотація:
The plant hormone, abscisic acid (ABA), has previously been shown to have an impact on the resistance or susceptibility of plants to pathogens. In this thesis, it was shown that ABA had a regulatory effect on an extensive array of plant defence responses in three different plant and pathogen interaction combinations as well as following the application of an abiotic elicitor. In unique studies using ABA deficient mutants of Arabidopsis, exogenous ABA addition or ABA biosynthesis inhibitor application and simulated drought stress, ABA was shown to have a profound effect on the outcome of inte
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Glass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks." Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.

Повний текст джерела
Анотація:
Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and health care applications. One application of particular interest is that of emergency communications where an Incident Area Network (IAN) can be rapidly deployed at an incident site. Wireless networks are well suited to such applications because they can be rapidly established and facilitate the exchange of voice, video and multimedia content such as detailed maps, building plans and photographs. The experience of Hurricane Katrina, the Asian Tsunami and Black Saturday demonstrates the
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Arnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.

Повний текст джерела
Анотація:
This thesis investigates how successive British governments in the last two decades of the Cold War developed and adapted civil defence policies aimed at mitigating the effects of a nuclear attack on the population of Britain. It tests the hypothesis that civil defence in Britain from 1972 until 1986 was shaped by three distinct influences; economic, ideological and external. It establishes in which ways and to what extent policy was shaped by these factors and which, if any, was the primary determinant of the major policy decisions of the time. It explains how changing economic, ideological a
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Catic, Elma. "A right to self-defence or an excuse to use armed force? : About the legality of using self-defence before an armed attack has occurred." Thesis, Stockholms universitet, Stockholm Center for International Law and Justice (SCILJ), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-183513.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Crossley, G. J. "The civil defence debate in Britain 1957-83 : an account and critical analysis of the major issues in the debate about civil defence against nuclear attack." Thesis, University of Bradford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355206.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ioannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.

Повний текст джерела
Анотація:
eXfiltration Advanced Persistent Threats (XAPTs) increasingly account for incidents concerned with critical information exfiltration from High Valued Targets (HVT's) by terrorists, cyber criminals or enemy states. Existing Cyber Defence frameworks and data fusion models do not adequately address (i) the multi-stage nature of XAPTs and (ii) the uncertainty and conflicting information associated with XAPTs. A new data fusion theory, called the Markov Multi-phase Transferable Belief Model (MM-TBM) is developed, for tracking and predicting XAPTs. MM-TBM expands the attack kill-chain model to attac
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Attack and defence"

1

P, Mayer C., ed. Hostile takeovers: Defence, attack, and corporate governance. McGraw-Hill Book Co., 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jorge A. De Vasconcellos e Sá. Strategy plays: Attack and defence strategies for business. Financial Times Prentice Hall, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Anderluh, Gregor, and Robert Gilbert, eds. MACPF/CDC Proteins - Agents of Defence, Attack and Invasion. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8881-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Paloczi-Horvath, George. From monitor to missile boat: Coast defence ships and coastal defence since 1860. Naval Institute Press, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Meredith, Sheena, and Graham Jackson. Conquering heart attack & stroke: Your 10 step self-defence plan. Reader's Digest, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dvoretsky, Mark. Attack and defence: How creative thought develops in a chess player. Batsford, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Szabó, Kinga Tibori. Anticipatory action in self-defence: Essence and limits under international law. T.M.C. Asser Press, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Wood, Derek. Attack Warning Red: The Royal Observer Corps and the defence of Britain 1925 to 1992. Carmichael & Sweet, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Southall, Colin Spencer. The defence of Lithgow: Under threat of invasion and air attack during the Second World War. Greater Lithgow City Council, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

S. Rajaratnam School of International Studies, ed. In defence of freedom of speech and against the publication of certain cartoons. S. Rajaratnam School of International Studies, 2015.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Частини книг з теми "Attack and defence"

1

Gabbay, Dov M., Ross Horne, Sjouke Mauw, and Leendert van der Torre. "Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Broom, Donald M. "Defence and attack behaviour." In Broom and Fraser’s domestic animal behaviour and welfare, 6th ed. CABI, 2021. http://dx.doi.org/10.1079/9781789249835.0008.

Повний текст джерела
Анотація:
Abstract This chapter discusses the organization of behaviour in animals in the following aspects: defence and attack; defence and avoidance; agonistic reactivity; and defence reactions to humans by farm animals.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Latas, Milan. "Panic Disorder During a Bioterroristic Attack." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Wu, Tao, Hang Zhang, Jun Ma, and Sujuan Zhang. "Intelligent DDoS Attack Defence Model." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40618-8_90.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Yu, Shui. "DDoS Attack and Defence in Cloud." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Hermanns, Holger, Julia Krämer, Jan Krčál, and Mariëlle Stoelinga. "The Value of Attack-Defence Diagrams." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49635-0_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Belojevic, Goran. "Comparison of the Available Methods of Differentiation Between a Biological Attack and Other Epidemics." In Defence Against Bioterrorism. Springer Netherlands, 2018. http://dx.doi.org/10.1007/978-94-024-1263-5_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Aslanyan, Zaruhi, and Flemming Nielson. "Pareto Efficient Solutions of Attack-Defence Trees." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46666-7_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Min, Byungho, and Vijay Varadharajan. "Feature-Distributed Malware Attack: Risk and Defence." In Computer Security - ESORICS 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11212-1_26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Goldsmith, Netta Murray. "Attack – the Best Method of Defence: Strategies." In Alexander Pope. Routledge, 2024. http://dx.doi.org/10.4324/9781003577119-12.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Attack and defence"

1

Ahmed, Mahad, and Muhammad Atif Tahir. "Bagging as Defence Mechanism Against Adversarial Attack." In 2024 International Conference on Emerging Trends in Smart Technologies (ICETST). IEEE, 2024. http://dx.doi.org/10.1109/icetst62952.2024.10737949.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Patil, Rajendra Shivaji, Markus Dypbukt Källman, and Viktoria Fodor. "DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679390.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sinha, Indrajeet Kumar, Avadhoot Bangal, Krishna Pratap Singh, and Shekhar Verma. "MDMFL: Monitored Defence Mechanism for Federated Learning against Data Poisoning Attack." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Alsharidah, Ahmad A., Devki Nandan Jha, Bo Wei, Ellis Solaiman, and Rajiv Ranjan. "SecureFed: Blockchain-Based Defence for Data Poisoning Attack in Federated Learning." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00064.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jiang, Chengcheng, and Peilin Hong. "A routing defence scheme against wormhole-like attack in BCube networks." In Fifth International Conference on Digital Signal and Computer Communications (DSCC 2025), edited by Gordana Jovanovic-Dolecek and Ke-Lin Du. SPIE, 2025. https://doi.org/10.1117/12.3071385.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

van Lier, Michel L., Richard J. M. den Hollander, and Hugo J. Kuijf. "Adversarial AI image perturbation attack invariant to object scale and type." In Artificial Intelligence for Security and Defence Applications II, edited by Henri Bouma, Yitzhak Yitzhaky, Radhakrishna Prabhu, and Hugo J. Kuijf. SPIE, 2024. http://dx.doi.org/10.1117/12.3031545.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Li, Xin, Chunyan Yang, and Ming Xie. "Optimized Design of Security Attack and Defence Strategies for Virtual Network Simulation Platforms." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10672988.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Wei, Xiaodong, Lina Chen, Siwei Li, and Mingfei Zeng. "Research on cyber security attack and defence strategy simulation in a virtual network environment." In Fourth International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2024), edited by Massimo Ficco and Yixian Yang. SPIE, 2025. https://doi.org/10.1117/12.3058606.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

S, Prasanth V., P. S. Haritha, B. Likhitha, Kasireddy Mahalakshmi, and A. Parveen Akhther. "Artificial Intelligence Based Supervised Learning Model for Attack Detection of Botnet and Defence in Iot Cybersecurity Infrastructures Using Convolutional Neural Network." In 2025 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2025. https://doi.org/10.1109/icict64420.2025.11004980.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sofia, R., S. Yazhinian, R. Sambathkumar, R. Saranya, and M. Jeyakumar. "CSPS- Cyber Security Physical System with a Gaming and Defence Strategic Approach to Detect the Malicious Attack for Vehicle to Everything Network." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894465.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Attack and defence"

1

Smythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.

Повний текст джерела
Анотація:
Space-based assets (satellites and the terrestrial ground stations that communicate with them) provide critical support to military and civilian operations. They are vulnerable to unintentional damage and disruption, and to deliberate attack. This POSTnote outlines how the UK uses and accesses satellites, potential risks to satellites, and approaches to mitigation.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Paine, K., O. Whitehouse, J. Sellwood, and A. Shaw. Indicators of Compromise (IoCs) and Their Role in Attack Defence. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9424.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Saalman, Lora. Navigating Chinese–Russian Nuclear and Space Convergence and Divergence. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/rxgl6272.

Повний текст джерела
Анотація:
Following the release of a China–Russia joint statement in February 2022, analysts have argued that the two countries have become strategically aligned. While both share security concerns and even use similar terminology on ‘active defence’, the manner in which they address these concerns and operationalize these concepts is not the same—at least not yet. When applied to nuclear deterrence, the Chinese version of active defence suggests retaliatory action against a nuclear attack while the Russian version indicates pre-emption in the face of either non-nuclear or nuclear aggression. In terms o
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Christie, Lorna, and Jeni Spragg. Chemical Weapons. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn596.

Повний текст джерела
Анотація:
Chemical weapons are prohibited, however recent chemical weapons attacks in Malaysia, Syria, Iraq and the UK have raised concerns about their use. In the UK in 2018, four people were taken seriously ill and one person died following exposure to a Novichok, a type of nerve agent. The UK Government recently announced £11m to strengthen the UK’s chemical defences and highlighted chemical, biological, radiological and nuclear (CBRN) threats as an area of focus in the recent Modernising Defence Programme. This briefing provides an overview of chemical weapons including types of chemical weapons and
Стилі APA, Harvard, Vancouver, ISO та ін.
5

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Повний текст джерела
Анотація:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Maxion, Roy A., Kevin S. Killourhy, and Kymie M. Tan. Developing a Defense-Centric Attack Taxonomy. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada435079.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gupta, Aman. Hardware Trojan Attack and Defense Techniques. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-812.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jennings-Edquist, Grace. Time to defend science under attack. Monash University, 2024. http://dx.doi.org/10.54377/0e1f-f103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Best, Carole N. Computer Network Defense and Attack: Information Warfare in the Department of Defense. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada394187.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada500822.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!