Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Attack and defence.

Статті в журналах з теми "Attack and defence"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Attack and defence".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.

Повний текст джерела
Анотація:
Denial of Service( DOS) attacks are an immense trouble to internet spots and among the hardest security problems in moment’s Internet. Of particular concern- because of their implicit impact- are the Distributed Denial of Service( DDoS) attacks. With little or no advance advising a DDoS attack can fluently exhaust the computing and communication coffers of its victim within a short period of time. This paper presents the problem of DDoS attacks and develops a bracket of DDoS defence systems. Description of each attack and defence system order is provided ,along with the advantages and disadvan
Стилі APA, Harvard, Vancouver, ISO та ін.
2

K.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.

Повний текст джерела
Анотація:
Denial of Service (DoS) attacks is one of the major threats to Internet sites and one of the major security problems Internet faces today. The nature of threats caused by Distributed Denial of Service (DDoS) attacks on networks. With little or no warning, a DDoS attack could easily destroy its victim's communication and network resources in a short period of time. This paper outlines the problem of DDoS attacks and developing a classification of DDoS attacks and DDoS defense mechanisms. Important features of each attack and defense system category are described and advantages and disadvantages
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Siame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.

Повний текст джерела
Анотація:
Pre-emptive use of force in self-defence is one of the most controversial areas under International Law. States attack each other even if the attack appears more distant. The Right of self-defence can only be invoked against an armed attack. Pre-emptive use of force allows states to use coercive measures against perceived future threats. This type of self-defence is used by the states prior to an armed attack which is contrary to the UN Charter. The defending states do not follow the requirement of necessity and proportionality when using force. The Research Questions were to what extent Pre-e
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.

Повний текст джерела
Анотація:
The synthetic aperture radar (SAR) image ship detection system needs to adapt to an increasingly complicated actual environment, and the requirements for the stability of the detection system continue to increase. Adversarial attacks deliberately add subtle interference to input samples and cause models to have high confidence in output errors. There are potential risks in a system, and input data that contain confrontation samples can be easily used by malicious people to attack the system. For a safe and stable model, attack algorithms need to be studied. The goal of traditional attack algor
Стилі APA, Harvard, Vancouver, ISO та ін.
5

KUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.

Повний текст джерела
Анотація:
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to stop them is growing. The use of newly formed Software-Defined Networking (SDN) significantly lowers the computational burden on IoT network nodes and makes it possible to perform more security measurements. This paper proposes an SDN-based, four module DDoS attack detection and mitigation framework for IoT networks called FMDADM. The proposed
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Asabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.

Повний текст джерела
Анотація:
In the domain of cyber security, the defence mechanisms of networks has traditionally been placed in a reactionary role. Cyber security professionals are therefore disadvantaged in a cyber-attack situation due to the fact that it is vital that they maneuver such attacks before the network is totally compromised. In this paper, we utilize the Betweenness Centrality network measure (social property) to discover possible cyber-attack paths and then employ computation of similar personality of nodes/users to generate predictions about possible attacks within the network. Our method proposes a soci
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.

Повний текст джерела
Анотація:
AbstractTerrorist attacks on critical infrastructures can cause problems to a national stability and functioning. Food and water supply chains are some of the most important infrastructures, and it is the country’s (government’s) obligation to provide sufficient quantities of food and water to its population. Intentional food contamination can, among other motives, originate from an act of terrorism (with political or ideological motives) with the aim of causing fear (terror) among people. Food defence systems can help assess vulnerabilities, determine mitigation strategies for terrorist attac
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Akintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.

Повний текст джерела
Анотація:
<em>Integrating research testbeds, attack mechanisms, and defence strategies into a unified cybersecurity framework offers a pathway to addressing the growing complexity of cyber threats. This study explores the multifaceted roles of research testbeds in simulating and emulating real-world environments, enabling the assessment of vulnerabilities and testing defence mechanisms. It also examines the evolution of attack vectors, such as Advanced Persistent Threats (APTs), and the importance of adapting preventive, detective, and corrective measures in response to these threats. The research advoc
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Li, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.

Повний текст джерела
Анотація:
The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. The basic idea of safe active defence is to make the defence gain more significant than the at
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Li, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.

Повний текст джерела
Анотація:
Data privacy breaches during the training and implementation of the model are the main challenges that impede the development of artificial intelligence technologies today. Federated Learning has been an effective tool for the protection of privacy. Federated Learning is a distributive machine learning method that trains a non-destructive learning module based on a local training and passage of parameters from participants, with no required direct access to data source. Federated Learning still holds many pitfalls. This paper first introduces the types of federated learning, including horizont
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Charreire, J., and C. Bedin. "Hypothesis: Autoimmunity: Attack or Defence?" Autoimmunity 3, no. 1 (1989): 75–79. http://dx.doi.org/10.3109/08916938909043615.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Gat, Azar. "Clausewitz on defence and attack." Journal of Strategic Studies 11, no. 1 (1988): 20–26. http://dx.doi.org/10.1080/01402398808437327.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Fordham, J. "Sham trusts: attack and defence." Trusts & Trustees 11, no. 8 (2005): 19–22. http://dx.doi.org/10.1093/tandt/11.8.19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Li, Zhe, Jin Liu, Yibo Dong, Jiaqi Ren, and Weili Li. "Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks." Entropy 25, no. 11 (2023): 1558. http://dx.doi.org/10.3390/e25111558.

Повний текст джерела
Анотація:
Network attack and defence games are gradually becoming a new approach through which to study the protection of infrastructure networks such as power grids and transportation networks. Uncertainty factors, such as the subjective decision preferences of attackers and defenders, are not considered in existing attack and defence game studies for infrastructure networks. In this paper, we introduce, respectively, the attacker’s and defender’s expectation value, rejection value, and hesitation degree of the target, as well as construct an intuitionistic fuzzy goal-based attack and defence game mode
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Haroon, Muhammad Shahzad, and Husnain Mansoor Ali. "Ensemble adversarial training based defense against adversarial attacks for machine learning-based intrusion detection system." Neural Network World 33, no. 5 (2023): 317–36. http://dx.doi.org/10.14311/nnw.2023.33.018.

Повний текст джерела
Анотація:
In this paper, a defence mechanism is proposed against adversarial attacks. The defence is based on an ensemble classifier that is adversarially trained. This is accomplished by generating adversarial attacks from four different attack methods, i.e., Jacobian-based saliency map attack (JSMA), projected gradient descent (PGD), momentum iterative method (MIM), and fast gradient signed method (FGSM). The adversarial examples are used to identify the robust machine-learning algorithms which eventually participate in the ensemble. The adversarial attacks are divided into seen and unseen attacks. To
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Skelhorn, John, and Candy Rowe. "Frequency-dependent taste-rejection by avian predation may select for defence chemical polymorphisms in aposematic prey." Biology Letters 1, no. 4 (2005): 500–503. http://dx.doi.org/10.1098/rsbl.2005.0359.

Повний текст джерела
Анотація:
Chemically defended insects advertise their unpalatability to avian predators using conspicuous aposematic coloration that predators learn to avoid. Insects utilize a wide variety of different compounds in their defences, and intraspecific variation in defence chemistry is common. We propose that polymorphisms in insect defence chemicals may be beneficial to insects by increasing survival from avian predators. Birds learn to avoid a colour signal faster when individual prey possesses one of two unpalatable chemicals rather than all prey having the same defence chemical. However, for chemical p
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Yao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.

Повний текст джерела
Анотація:
Abstract The process of attack and defence of side channel attack can be regarded as the process of mutual information game, the two sides of the game are the cryptographic device designer (defence) and the enemy. The game goal of the defender is to reduce the local and global risks caused by side channel leakage by formulating relevant defence strategies; For the enemy, the goal of the game is just the opposite. From the perspective of making security strategy and reducing security risk, the mutual information game theory is introduced into the decision-making process of crypto chip designers
Стилі APA, Harvard, Vancouver, ISO та ін.
18

U., Sakthivelu, and Vinoth Kumar C.N.S. "Defence Mechanism against Advanced Persistent Threat Attack Using Significant Features based Deep Learning Model." Journal of Internet Services and Information Security 14, no. 4 (2024): 263–77. https://doi.org/10.58346/jisis.2024.i4.016.

Повний текст джерела
Анотація:
The advanced persistent threat (APT) attack is the most frequent and seriously damaging one that can be launched against the target system. This type of malicious activity is deliberate and focused, with specific objectives in mind. The rise of this attack technique poses a significant challenge to the information security systems of various businesses, governments, and organizations. The techniques of utilizing deep learning (DL) or machine learning (ML) methods to evaluate abnormal behaviours and network traffic signs for preventing and detecting APT attacks are becoming popular in recent ti
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Abimbola, Olamide, and Olayinka Oduola Idris. "A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review." Path of Science 11, no. 3 (2025): 4009. https://doi.org/10.22178/pos.115-11.

Повний текст джерела
Анотація:
The Internet of Things (IoT) introduces critical cybersecurity challenges due to weak authentication, insecure communication, and device vulnerabilities, making IoT systems prime targets for attacks like botnets, data breaches, and ransomware. This comprehensive review analyses current threats, security gaps, and emerging risks (e.g., AI-driven attacks and quantum threats). We evaluate existing defences such as encryption, intrusion detection, and access control and identify key limitations, including scalability issues and lack of real-time adaptability. By synthesising attack trends, defence
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Patel, Raj Kumar, Dr Lalan Kumar Singh, and Dr Narendra Kumar. "Literature Review of Distributed: Denial of Service Attack Protection." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1032–36. http://dx.doi.org/10.22214/ijraset.2023.48673.

Повний текст джерела
Анотація:
Abstract: In the current environment, cloud computing has developed into a commercial technology that enables users to quickly access resources via the internet on a pay-per-use basis. The customer receives these resources in the form of services. The three service models offered by the cloud services are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). As a result of the enormous improvement in cloud computing technology, it is now widely employed by a variety of business applications, industry apps, Enterprise organizations that have committ
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Wu, Di, Xiangbin Yan, Rui Peng, and Shaomin Wu. "Optimal defence-attack strategies between one defender and two attackers." Journal of the Operational Research Society 71, no. 11 (2019): 1830–46. http://dx.doi.org/10.1080/01605682.2019.1630332.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Taylor, Sean Joe, Farhan Ahmad, Hoang Nga Nguyen, and Siraj Ahmed Shaikh. "Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges." Sensors 23, no. 1 (2022): 134. http://dx.doi.org/10.3390/s23010134.

Повний текст джерела
Анотація:
The emerging technology that is vehicular platooning is an exciting technology. It promises to save space on congested roadways, improve safety and utilise less fuel for transporting goods, reducing greenhouse gas emissions. The technology has already been shown to be vulnerable to attack and exploitation by attackers. Attackers have several attack surfaces available for exploitation to achieve their goals (either personal or financial). The goal of this paper and its contribution to the area of research is to present the attacks and defence mechanisms for vehicular platoons and put risks of e
Стилі APA, Harvard, Vancouver, ISO та ін.
23

De Dreu, Carsten K. W., Ruthie Pliskin, Michael Rojek-Giffin, Zsombor Méder, and Jörg Gross. "Political games of attack and defence." Philosophical Transactions of the Royal Society B: Biological Sciences 376, no. 1822 (2021): 20200135. http://dx.doi.org/10.1098/rstb.2020.0135.

Повний текст джерела
Анотація:
Political conflicts often revolve around changing versus defending a status quo . We propose to capture the dynamics between proponents and opponents of political change in terms of an asymmetric game of attack and defence with its equilibrium in mixed strategies. Formal analyses generate predictions about effort expended on revising and protecting the status quo , the form and function of false signalling and cheap talk, how power differences impact conflict intensity and the likelihood of status quo revision. Laboratory experiments on the neurocognitive and hormonal foundations of attack and
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Owen, Denis F. "The Language of Attack and Defence." Oikos 57, no. 1 (1990): 133. http://dx.doi.org/10.2307/3565746.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Goyal, S., and A. Vigier. "Attack, Defence, and Contagion in Networks." Review of Economic Studies 81, no. 4 (2014): 1518–42. http://dx.doi.org/10.1093/restud/rdu013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Repel, Dusan, and Ingo Stengel. "Grammar-based transformations: attack and defence." Information Management & Computer Security 22, no. 2 (2014): 141–54. http://dx.doi.org/10.1108/imcs-09-2013-0071.

Повний текст джерела
Анотація:
Purpose – This research aims to propose an attack that de-obfuscates codes by exploiting the properties of context-free grammars since it is important to understand the strength of obfuscation provided by context-free grammar-based obfuscators. In addition, the possibility of automatically generated transformations is explored. Design/methodology/approach – As part of our empirical investigation, a development environment for obfuscating transformations is built. The tool is used to simulate a context-free obfuscator and to devise ways of reversing such transformations. Furthermore, a theoreti
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Sudhakaran, Pradeep, Manikannan Kaliyaperumal, T. Senthilkumar, R. Jeya, and B. Sowmiya. "Hierarchical and On-Demand Attack Defence Framework for IoT Devices." Wireless Communications and Mobile Computing 2022 (April 26, 2022): 1–8. http://dx.doi.org/10.1155/2022/4335871.

Повний текст джерела
Анотація:
Internet of Things (IoT) devices are lightweight such that they generally possess low battery power. Hence, the chances of battery exhaustion and flooding attacks are more. In order to perform attack response actions against various attacks, this paper proposes Hierarchical and On-Demand Attack Defence Framework (HOAD) for IoT security. In this framework, primary (PC) and secondary controller (SC) nodes are deployed in the network along with the IoT devices. The SC scan be moved on-demand by the PC. The response agent at PC will first establish a new route via the SCs by excluding the intruder
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Lehmanski, Linda M. A., Lara M. Kösters, Jianbei Huang, Martin Göbel, Jonathan Gershenzon, and Henrik Hartmann. "Windthrow causes declines in carbohydrate and phenolic concentrations and increased monoterpene emission in Norway spruce." PLOS ONE 19, no. 5 (2024): e0302714. http://dx.doi.org/10.1371/journal.pone.0302714.

Повний текст джерела
Анотація:
With the increasing frequencies of extreme weather events caused by climate change, the risk of forest damage from insect attacks grows. Storms and droughts can damage and weaken trees, reduce tree vigour and defence capacity and thus provide host trees that can be successfully attacked by damaging insects, as often observed in Norway spruce stands attacked by the Eurasian spruce bark beetle Ips typographus. Following storms, partially uprooted trees with grounded crowns suffer reduced water uptake and carbon assimilation, which may lower their vigour and decrease their ability to defend again
Стилі APA, Harvard, Vancouver, ISO та ін.
29

PELTONEN, S. "Induced defence responses of cereals to pathogen attack." Agricultural and Food Science 8, no. 4-5 (1999): 479–92. http://dx.doi.org/10.23986/afsci.5642.

Повний текст джерела
Анотація:
The defence responses of plants are usually composed of a multitude of structural and biochemical events. Some occur constitutively, whereas others, which are emphasised in this review, are formed in response to pathogen attack and are considered as active reactions of plants. Induction of defence mechanisms can be observed in all plants regardless of their genetic background. Thus, this phenomenon can occur in cultivars with or without known genes for disease resistance. The general defence features of plants may contribute significantly to the overall disease resistance of plants and increas
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Adepu, Pavan Kumar. "Adversarial Robustness in Generative AI: Defending Against Malicious Model Inversions and Deepfake Attacks." International Journal of Management Technology 13, no. 4 (2025): 27–43. https://doi.org/10.37745/ijmt.2013/vol13n42743.

Повний текст джерела
Анотація:
Generative AI models are rapidly advancing creative content creation but remain vulnerable to adversarial attacks like model inversion and deepfakes. In this work, we delve into robust defence strategies with an actual dataset of the Deepfake Detection Challenge (DFDC) to simulate various attack scenarios. We employ the use of both anomaly detection and adversarial training mechanisms to harden the security of generative models. Experimental results reveal that these composite defence mechanisms significantly reduce the malicious attack success rate while the inventive capability of the models
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Sharipuddin, Sharipuddin, and Eko Arip Winanto. "Defence against adversarial attacks on IoT detection systems using deep belief network." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 1073. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp1073-1081.

Повний текст джерела
Анотація:
An Adversarial attack is a technique used to deceive machine learning models to make incorrect predictions by providing slightly modified inputs from the original. Intrusion detection system (IDS) is a crucial tool in computer network security for the detection of adversarial attacks. Deep learning is a trending method in both research and industry, and this study proposes the use of a deep belief network (DBN). DBN can recognize data with small differences, but is also vulnerable to adversarial attacks. Therefore, this research suggests an internet of things-intrusion detection system (IoT-ID
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Sharipuddin, Sharipuddin Eko Arip Winanto. "Defence against adversarial attacks on IoT detection systems using deep belief network." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 1073–81. https://doi.org/10.11591/ijeecs.v35.i2.pp1073-1081.

Повний текст джерела
Анотація:
An Adversarial attack is a technique used to deceive machine learning models to make incorrect predictions by providing slightly modified inputs from the original. Intrusion detection system (IDS) is a crucial tool in computer network security for the detection of adversarial attacks. Deep learning is a trending method in both research and industry, and this study proposes the use of a deep belief network (DBN). DBN can recognize data with small differences, but is also vulnerable to adversarial attacks. Therefore, this research suggests an internet of things-intrusion detection system (IoT-ID
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Mahmood, Alaa Mohammed, and İsa Avcı. "Cybersecurity Defence Mechanism Against DDoS Attack with Explainability." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 278–90. https://doi.org/10.58496/mjcs/2024/027.

Повний текст джерела
Анотація:
Application-layer attacks (Layer 7 attacks), a form of distributed denial-of-service (DDoS) aimed at web servers, have become a significant concern in cybersecurity because of their ability to disrupt services by overwhelming server resources. This study focuses on addressing the challenges of detecting and mitigating the impact of such attacks, which are difficult to counter due to their sophisticated nature. The primary objective of this study is to develop an effective monitoring and defence model to detect, defend, and respond to these attacks efficiently. To achieve this, SHapley Additive
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Ye, Shunyao. "Research on the Right of Self-Defence from the Perspective of International Law." Lecture Notes in Education Psychology and Public Media 5, no. 1 (2023): 844–52. http://dx.doi.org/10.54254/2753-7048/5/2022994.

Повний текст джерела
Анотація:
The right of self-defence is an indispensable concept in international law, especially in the UN charter. States can protect their legitimate rights and interests from other states infringement by exercising different types of the right of self-defence. However, with the rapid advancement of technology, economy, and politics, the right of self-defense faces new challenges. The collective self-defence, the anti-terrorism self-defence and the preventive self-defence are not perfect, and the specific content of the armed attack is not clear. Although there is no clear solution system in internati
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Kane, Marie. "‘Knowing (and Not Knowing) One's Place’, Organisational Ranking and the Operation of Envy and Shame in Organisational Life." Organisational and Social Dynamics 12, no. 2 (2012): 194–209. http://dx.doi.org/10.33212/osd.v12n2.2012.194.

Повний текст джерела
Анотація:
Organisational ranking and the concept of allocated ‘place’ in organisational hierarchy are powerful yet relatively unexplored dynamics in organisational life. While the intensity of our awareness of organisational rank will vary individually, we all carry an instinctive sense of our own and others' place in the hierarchical order. There can be strong and punitive reactions, often resulting in envious attacks, to a perceived disturbance in this implicit ranking order, yet there is little overt discussion or exploration of these concerns that nonetheless play a considerable role in below surfac
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Akande, Dapo, and Antonios Tzanakopoulos. "Legal: Use of Force in Self-Defence to Recover Occupied Territory." European Journal of International Law 32, no. 4 (2021): 1299–307. http://dx.doi.org/10.1093/ejil/chab109.

Повний текст джерела
Анотація:
Abstract This article argues that, in certain circumstances, it is legal for a state to use force in self-defence in order to recover territory unlawfully occupied by another state as a result of an armed attack. Where occupation follows from an unlawful armed attack, the occupation is a continuing armed attack, and the attacked state does not lose its right to self-defence simply because of passage of time. It is argued that while it is trite law that territorial disputes cannot be resolved by recourse to force, it is important to draw the distinction between a territorial dispute, on the one
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Hodder, Ryan W., Will G. Hopkins, Kevin A. Ball, Jamie Bahnisch, and Fabio R. Serpiello. "Exploration of collective tactical variables in elite netball: An analysis of team and sub-group positioning behaviours." PLOS ONE 19, no. 2 (2024): e0295787. http://dx.doi.org/10.1371/journal.pone.0295787.

Повний текст джерела
Анотація:
Collective tactical behaviours are aspects of player interactions that are particularly important in netball, due to its unique restrictions on player movement (players unable to move when in possession of the ball and positional spatial restrictions). The aim of this study was to explore variables representing collective tactical behaviours in netball. A local positioning system provided player positions of one team throughout seven elite-level netball matches. The positions were analysed to provide mean, variability (standard deviation) and irregularity (normalised approximate entropy) for e
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Stamm, Raini, Meelis Stamm, Doris Torilo, Kaivo Thomson, and Alexander Jairus. "Comparative analysis of the elements of attack and defence in men’s and women’s games in the Estonian volleyball highest league." Papers on Anthropology 25, no. 1 (2016): 37. http://dx.doi.org/10.12697/poa.2016.25.1.04.

Повний текст джерела
Анотація:
The aim of this study was to analyse the differences between men’s and women’s teams of the Estonian highest league in attack, serve, block, defence and serve reception. The sample consisted of 5 men’s and 5 women’s teams of the Estonian volleyball highest league in the 2014/2015 season. To collect data, two game videos of each team were watched; from them tempo of attack, type of attack, block and serve, and the results of defence and cover were registered. In addition, statistics created by the Data Volley and Volleysoft 6–3 programs on the basis of expert assessments were used to estimate t
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Hills, Samuel P., Erwan Izri, Daniel Howells, Ben Lonergan, Liam P. Kilduff, and Mark Waldron. "Assessing the locomotor demands of international men’s and women’s rugby sevens match-play according to passage of play." PLOS ONE 19, no. 6 (2024): e0304186. http://dx.doi.org/10.1371/journal.pone.0304186.

Повний текст джерела
Анотація:
This study aimed to evaluate the effect of discrete passages of play on locomotor demands of international men’s and women’s rugby sevens matches and their relationship with winning or losing. Thirteen men’s and thirteen women’s international rugby sevens players wore 10 Hz Global Positioning Systems during twelve Tokyo Olympic games matches (966 observations; 507 for men, 459 for women). Discrete ball-in-play periods were categorised as: ‘Single-phase defence’, ‘single-phase attack’, ‘multi-phase defence’, ‘multi-phase attack’, ‘multi-phase defence to attack’, or ‘multi-phase attack to defenc
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Jermy, Andrew. "Attack is the best form of defence." Nature Reviews Microbiology 10, no. 5 (2012): 311. http://dx.doi.org/10.1038/nrmicro2782.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Narayan, Arpita, and Upendra Kumar. "A Defence Mechanism: DNS based DDoS Attack." International Journal of Computer Trends and Technology 33, no. 1 (2016): 1–8. http://dx.doi.org/10.14445/22312803/ijctt-v33p101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Cohen, Fred. "Managing network security: Attack and defence strategies." Network Security 1999, no. 7 (1999): 7–11. http://dx.doi.org/10.1016/s1353-4858(00)80012-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Shah, Jyoti. "Plants under attack: systemic signals in defence." Current Opinion in Plant Biology 12, no. 4 (2009): 459–64. http://dx.doi.org/10.1016/j.pbi.2009.05.011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Shende, Sumer. "Crossfire DoS Attack and its Defence Mechanism." International Journal of Computer Applications 132, no. 3 (2015): 9–11. http://dx.doi.org/10.5120/ijca2015907313.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Hausken, Kjell. "Defence and attack of complex interdependent systems." Journal of the Operational Research Society 70, no. 3 (2018): 364–76. http://dx.doi.org/10.1080/01605682.2018.1438763.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Ying, Fei, Shengjie Zhao, and Hao Deng. "Microservice Security Framework for IoT by Mimic Defense Mechanism." Sensors 22, no. 6 (2022): 2418. http://dx.doi.org/10.3390/s22062418.

Повний текст джерела
Анотація:
Containers and microservices have become the most popular method for hosting IoT applications in cloud servers. However, one major security issue of this method is that if a container image contains software with security vulnerabilities, the associated microservices also become vulnerable at run-time. Existing works attempted to reduce this risk with vulnerability-scanning tools. They, however, demand an up-to-date database and may not work with unpublished vulnerabilities. In this paper, we propose a novel system to strengthen container security from unknown attack using the mimic defense fr
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Martin, Kathy. "Herring gulls prey upon female willow ptarmigan." Canadian Journal of Zoology 63, no. 4 (1985): 984–85. http://dx.doi.org/10.1139/z85-146.

Повний текст джерела
Анотація:
On 12 June 1984 at La Pérouse Bay, Manitoba, Canada, 1 saw three herring gulls attack, kill, and consume an incubating adult hen willow ptarmigan and her clutch despite vigorous defence behaviour by her mate. Possible attacks by gulls or jaegers occurred also on two incubating hens in 1983.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

VAN STEENBERGHE, RAPHAËL. "Self-Defence in Response to Attacks by Non-state Actors in the Light of Recent State Practice: A Step Forward?" Leiden Journal of International Law 23, no. 1 (2010): 183–208. http://dx.doi.org/10.1017/s0922156509990380.

Повний текст джерела
Анотація:
AbstractThis article analyses the recent state practice in which the right of self-defence has been invoked in order to justify the use of force in response to attacks by non-state actors. The main purpose of this analysis is to determine whether the law of self-defence has evolved through this practice. It is submitted that the latter confirms the tendency, evidenced by the US operation ‘Enduring Freedom’ in Afghanistan in 2001, towards allowing states to respond in self-defence to private armed attacks, that is, attacks which are committed by non-state actors only. The article also aims to s
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Valverde Jiménez, Beatriz. "The Ethics of Facing Western Notions in Graham Greene’s A Burnt-Out Case." Interlitteraria 23, no. 1 (2018): 110–23. http://dx.doi.org/10.12697/il.2018.23.1.12.

Повний текст джерела
Анотація:
Taking as a basis Søren Kierkegaard’s narrative strategy of attack and defence, this paper will analyse the representation of western civilization in connection with the worldview of the native people living in a leper colony in Belgian Congo in Graham Greene’s novel A Burnt-Out Case. I will examine concretely the way in which Greene attacks in the novel the hegemonic structure of the European colonizers, which both ignores and imposes itself on the African native society, considering it a no-structure. Additionally, I will study the cases of the priests in the leper colony and of doctor Colin
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Gürfidan, Remzi. "INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES." Mühendislik Bilimleri ve Tasarım Dergisi 12, no. 2 (2024): 416–29. http://dx.doi.org/10.21923/jesd.1458955.

Повний текст джерела
Анотація:
Phishing attack on web pages is a type of malicious attack that aims to steal personal and sensitive information of internet users. Phishing attacks are usually conducted through various communication channels such as email, SMS, social media messages or websites. Users are directed to fake web pages of trusted organizations such as government agencies, banks, online shopping sites, etc. and asked to enter their personal information. These fake web pages may look remarkably like the original sites and are designed to mislead users. In this study, we used machine learning methods to detect the
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!