Добірка наукової літератури з теми "Computer attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Computer attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Computer attack"
Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, and Muhammad Nur Faiz. "A Classification Data Packets Using the Threshold Method for Detection of DDoS." Journal of Innovation Information Technology and Application (JINITA) 6, no. 1 (June 28, 2024): 28–36. http://dx.doi.org/10.35970/jinita.v6i1.2224.
Повний текст джерелаvan Heerden, R. P., B. Irwin, I. D. Burke, and L. Leenen. "A Computer Network Attack Taxonomy and Ontology." International Journal of Cyber Warfare and Terrorism 2, no. 3 (July 2012): 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.
Повний текст джерелаParadise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (January 28, 2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.
Повний текст джерелаRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Повний текст джерелаGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Повний текст джерелаWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Повний текст джерелаSun, Fei Xian. "Danger Theory Based Risk Evaluation Model for Smurf Attacks." Key Engineering Materials 467-469 (February 2011): 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.
Повний текст джерелаKhaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (August 18, 2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.
Повний текст джерелаLi, Biao. "Research on Computer Network Security and Prevention Strategy." Applied Mechanics and Materials 608-609 (October 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.
Повний текст джерелаMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Повний текст джерелаДисертації з теми "Computer attack"
Mowery, Keaton. "Beneath the Attack Surface." Thesis, University of California, San Diego, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3712726.
Повний текст джерелаComputer systems are often analyzed as purely virtual artifacts, a collection of software operating on a Platonic ideal of a computer. When software is executed, it runs on actual hardware: an increasingly complex web of analog physical components and processes, cleverly strung together to present an illusion of pure computation. When an abstract software system is combined with individual hardware instances to form functioning systems, the overall behavior varies subtly with the hardware. These minor variations can change the security and privacy guarantees of the entire system, in both beneficial and harmful ways. We examine several such security effects in this dissertation.
First, we look at the fingerprinting capability of JavaScript and HTML5: when invoking existing features of modern browsers, such as JavaScript execution and 3-D graphics, how are the results affected by underlying hardware, and how distinctive is the resulting fingerprint?
Second, we discuss AES side channel timing attacks, a technique to extract information from AES encryption running on hardware. We present several reasons why we were unable to reproduce this attack against modern hardware and a modern browser.
Third, we examine positive uses of hardware variance: namely, seeding Linux's pseudorandom number generator at kernel initialization time with true entropy gathered during early boot. We examine the utility of these techniques on a variety of embedded devices, and give estimates for the amount of entropy each can generate.
Lastly, we evaluate a cyberphysical system: one which combines physical processes and analog sensors with software control and interpretation. Specifically, we examine the Rapiscan Secure~1000 backscatter X-ray full-body scanner, a device for looking under a scan subject's clothing, discovering any contraband secreted about their person. We present a full security analysis of this system, including its hardware, software, and underlying physics, and show how an adaptive, motivated adversary can completely subvert the scan to smuggle contraband, such as knives, firearms, and plastic explosives, past a Secure~1000 checkpoint. These attacks are entirely based upon understanding the physical processes and sensors which underlie this cyberphysical system, and involve adjusting the contraband's location and shape until it simply disappears.
Hersén, Nicklas. "Measuring Coverage of Attack Simulations on MAL Attack Graphs." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292640.
Повний текст джерелаÖvergången från traditionella medier till digitala plattformar har lett till en ökad hotbild mot digital infrastruktur. Vikten av att designa säkra plattformar och enheter för att skydda känslig information har lett till framkomsten av nya strängare säkerhetskrav. Hotmodellering är en process med syfte att förebygga att svagheter i ett system utnyttjas av externa parter genom att identifiera brister i systemet. Meta Attack Language är ett hotmodelleringsspråk med stöd för simulering av specifika attack scenarion genom attacksimuleringar. I nuläget finns inget stöd för insamling av täckningsdata från dessa simuleringar. Syftet med detta arbete är att utveckla en tilläggstjänst för insamling av täckningsdata i syfte att underlätta hotmodelleringsprocessen. Den utvecklade tillägstjänsten kan ge en uppskattning av hur väl en modell täcks av en mängd simuleringar. Täckningsvärderna som används av tilläggstjänsten är anpassningar av befintliga mätvärden som används inom uppskattning av källkods- och modelltäckning. Nuvarande implementation har ett flertal begränsningar gällande presentationen av viss typ av data, till exempel exponentiellt växande mätvärden. Detta beror på att modellerna inte är anpassade för denna typ av testning.
Fang, Pengcheng. "REPTRACKER:TOWARDS AUTOMATIC ATTACK INVESTIGATION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1550696995596089.
Повний текст джерелаTajdini, M. "Developing an advanced IPv6 evasion attack detection framework." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9864/.
Повний текст джерелаVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Повний текст джерелаCullum, James J. "Performance analysis of automated attack graph generation software." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FCullum.pdf.
Повний текст джерелаThesis Advisor(s): Cynthia Irvine, Timothy Levin. "December 2006." Includes bibliographical references (p. 137- 138). Also available in print.
Harris, Rae. "Spectre: Attack and Defense." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.
Повний текст джерелаAlmohri, Hussain. "Security risk prioritization for logical attack graphs." Thesis, Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/1114.
Повний текст джерелаJafarian, Jafar Haadi. "Cyber Agility for Attack Deterrence and Deception." Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.
Повний текст джерелаIn recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either identifying and patching exploits, or detecting and filtering them. These techniques are only effective when intrusions are known or detectable. However, unknown (zero-day) vulnerabilities are constantly being discovered, and known vulnerabilities are not often patched promptly. Even worse, while defenders need to patch all vulnerabilities and intrusions paths against unknown malicious entities, the attackers only need to discover only one successful intrusion path in a system that is known and static. These asymmetric advantages have constantly kept attackers one step ahead of defenders.
To reverse this asymmetry in cyber warfare, we aim to propose new proactive defense paradigms that can deter or deceive cyber attackers without relying on intrusion detection and prevention and by offering cyber agility as a system property. Cyber agility allows for system configuration to be changed dynamically without jeopardizing operational and mission requirements of the system. In this thesis, we introduce two novel cyber agility techniques based on two paradigms of cyber deterrence and cyber deception. Cyber deterrence techniques aim to deter cyber threats by changing system configurations randomly and frequently. In contrast, cyber deception techniques aim to deflect attacks to fake targets by misrepresenting system configurations strategically and adaptively.
In the first part of this dissertation, we propose a multi-strategy, multi-parameter and multi-dimensional host identity mutation technique for deterring reconnaissance attacks. This deterrence is achieved by mutating IP addresses and anonymizing fingerprints of network hosts both proactively and adaptively. Through simulation and analytical investigation, we show that our approach significantly increases the attack cost for coordinated scanning worms, advanced network reconnaissance techniques, and multi-stage APT attacks.
In the second part, we propose a formal framework to construct active cyber deception plans that are goal-oriented and dynamic. Our framework introduces a deception logic that models consistencies and conflicts among various deception strategies (e.g., lies) and quantifies the benefit and cost of potential deception plans.
In the third part, we demonstrate and evaluate our deception planning framework by constructing an effective deception plan against multi-stage attacks. Through our experimentation, we show that the generated deception plans are effective and economical, and outperform existing or random deception plans.
Ong, Hoang. "Semantic attack on transaction data anonymised by set-based generalisation." Thesis, Cardiff University, 2015. http://orca.cf.ac.uk/74553/.
Повний текст джерелаКниги з теми "Computer attack"
Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.
Знайти повний текст джерелаCollege), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.
Знайти повний текст джерелаBriggs, Andy. Virus attack. New York: Walker Books for Young Readers, 2010.
Знайти повний текст джерелаE, Goodman Seymour, and Longhurst David W, eds. Protecting critical infrastructures against cyber-attack. Oxford: Oxford University Press, 2003.
Знайти повний текст джерелаRooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.
Знайти повний текст джерелаMesley, Wendy. Can you hack it?: The attack on personal information. Princeton, NJ: Films for the Humanities & Sciences, 2007.
Знайти повний текст джерелаCobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.
Знайти повний текст джерелаJelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.
Знайти повний текст джерелаStevens, Cara J. Redstone Junior High: When Endermen attack. New York: Sky Pony, 2018.
Знайти повний текст джерелаЧастини книг з теми "Computer attack"
Weik, Martin H. "attack." In Computer Science and Communications Dictionary, 72. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_968.
Повний текст джерелаWeik, Martin H. "text attack." In Computer Science and Communications Dictionary, 1773. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19457.
Повний текст джерелаWeik, Martin H. "analytical attack." In Computer Science and Communications Dictionary, 49. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_649.
Повний текст джерелаWeik, Martin H. "exhaustion attack." In Computer Science and Communications Dictionary, 549. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6545.
Повний текст джерелаWeik, Martin H. "NAK attack." In Computer Science and Communications Dictionary, 1067. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12053.
Повний текст джерелаWeik, Martin H. "attack time." In Computer Science and Communications Dictionary, 72. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_969.
Повний текст джерелаOe, Issa, Keiichiro Yamamura, Hiroki Ishikura, Ryo Hamahira, and Katsuki Fujisawa. "Superpixel Attack." In Lecture Notes in Computer Science, 141–52. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8388-9_12.
Повний текст джерелаBaksi, Anubhab. "Fault Attack." In Computer Architecture and Design Methodologies, 59–98. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6_3.
Повний текст джерелаAbdoli, F., N. Meibody, and R. Bazoubandi. "An Attacks Ontology for computer and networks attack." In Innovations and Advances in Computer Sciences and Engineering, 473–76. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_83.
Повний текст джерелаNishihara, Hideaki, Yasuyuki Kawanishi, Daisuke Souma, and Hirotaka Yoshida. "On Validating Attack Trees with Attack Effects." In Lecture Notes in Computer Science, 309–24. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54549-9_21.
Повний текст джерелаТези доповідей конференцій з теми "Computer attack"
Dadkhah, Pouria, Siavash Ahmadi, and Mohammad Reza Aref. "GenAtt NIDS Attack: A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems." In 2025 29th International Computer Conference, Computer Society of Iran (CSICC), 1–7. IEEE, 2025. https://doi.org/10.1109/csicc65765.2025.10967427.
Повний текст джерелаFares, Samar, and Karthik Nandakumar. "Attack To Defend: Exploiting Adversarial Attacks for Detecting Poisoned Models." In 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 24726–35. IEEE, 2024. http://dx.doi.org/10.1109/cvpr52733.2024.02335.
Повний текст джерелаAl Kader Hammoud, Hasan Abed, Shuming Liu, Mohammed Alkhrashi, Fahad AlBalawi, and Bernard Ghanem. "Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition." In 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 3439–50. IEEE, 2024. http://dx.doi.org/10.1109/cvprw63382.2024.00348.
Повний текст джерелаAmenu, Edwin Xorsenyo, and Sridaran Rajagopal. "Mitigating Address Resolution Protocol (ARP) Attack on Computer System." In 2024 International Conference on Intelligent & Innovative Practices in Engineering & Management (IIPEM), 1–6. IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925724.
Повний текст джерелаTahat, Majd Z., William B. Glisson, and Baker Al Smadi. "VR Headset Ransomware Attack Vulnerability." In 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 740–45. IEEE, 2024. http://dx.doi.org/10.1109/ccece59415.2024.10667339.
Повний текст джерелаLopuhaä-Zwakenberg, Milan. "Attack Tree Metrics are Operad Algebras." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 665–79. IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00005.
Повний текст джерелаFezooni, Abdulhady Younes, Ehab Ahmad Ghannoum, Malek Ahmad Ayesh, and Qutaibah Malluhi. "How to Attack a Disconnected Computer." In Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0251.
Повний текст джерелаKotenko, Igor, and Andrey Chechulin. "Computer attack modeling and security evaluation based on attack graphs." In 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2013. http://dx.doi.org/10.1109/idaacs.2013.6662998.
Повний текст джерелаIngols, Kyle, Matthew Chu, Richard Lippmann, Seth Webster, and Stephen Boyer. "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.21.
Повний текст джерелаMa, Jian, and Da Luo. "Audio adversarial attack: HIS attack." In International Conference on Computer Network Security and Software Engineering (CNSSE 2022), edited by Wenshun Sheng and Yongquan Yan. SPIE, 2022. http://dx.doi.org/10.1117/12.2640809.
Повний текст джерелаЗвіти організацій з теми "Computer attack"
Lenderman, Curtis C. Computer Network Attack: An Operational Tool? Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada415427.
Повний текст джерелаBusby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377624.
Повний текст джерелаWilliamson, Jennie M. Information Operations: Computer Network Attack in the 21st Century. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada402018.
Повний текст джерелаPepyne, David L., and Yu-Chi Ho. Modeling and Analysis of Information Attack in Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, March 2003. http://dx.doi.org/10.21236/ada416393.
Повний текст джерелаRolston, Bri. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks. Office of Scientific and Technical Information (OSTI), June 2005. http://dx.doi.org/10.2172/911827.
Повний текст джерелаHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Fort Belvoir, VA: Defense Technical Information Center, March 2009. http://dx.doi.org/10.21236/ada500822.
Повний текст джерелаPresby, Timothy D. Computer Network Attack and Its Effectiveness against Non-State Actors. Fort Belvoir, VA: Defense Technical Information Center, February 2006. http://dx.doi.org/10.21236/ada463692.
Повний текст джерелаYounes, Paul R. Follow the Money: Using Computer Network Attack to Enforce Economic Sanctions. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada390083.
Повний текст джерелаBest, Carole N. Computer Network Defense and Attack: Information Warfare in the Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada394187.
Повний текст джерелаPharmer, James, Kevin Cropper, Jennifer McKneely, and Earl Williams. Tactical Tomahawk Weapon Control System v6 Land Attack Combat System Prototype Human-Computer Interface. Fort Belvoir, VA: Defense Technical Information Center, July 2004. http://dx.doi.org/10.21236/ada426346.
Повний текст джерела