Bücher zum Thema „Attacks detection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Attacks detection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Den vollen Inhalt der Quelle findenLi, Beibei, Rongxing Lu und Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58672-0.
Der volle Inhalt der QuelleRaghavan, S. V., und E. Dawson, Hrsg. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. India: Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
Der volle Inhalt der QuelleK, Kokula Krishna Hari, Hrsg. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Den vollen Inhalt der Quelle findenCasola, Linda, und Dionna Ali, Hrsg. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Der volle Inhalt der QuelleRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Den vollen Inhalt der Quelle findenNelson A. Rockefeller Institute of Government., Hrsg. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Den vollen Inhalt der Quelle findenNational Academy of Sciences (U.S.). Committee on Effectiveness of National Biosurveillance Systems, BioWatch and the Public Health System. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. Washington, D.C: National Academies Press, 2011.
Den vollen Inhalt der Quelle findenSalem, Malek Ben. Towards Effective Masquerade Attack Detection. [New York, N.Y.?]: [publisher not identified], 2012.
Den vollen Inhalt der Quelle findenWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante und Stan Z. Li. Multi-Modal Face Presentation Attack Detection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01824-4.
Der volle Inhalt der QuelleWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante und Stan Z. Li. Advances in Face Presentation Attack Detection. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32906-7.
Der volle Inhalt der QuelleStewin, Patrick. Detecting Peripheral-based Attacks on the Host Memory. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13515-1.
Der volle Inhalt der QuellePande, Sagar Dhanraj, und Aditya Khamparia. Networks Attack Detection on 5G Networks using Data Mining Techniques. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281.
Der volle Inhalt der Quelleill, Brunkus Denise, Hrsg. The snack attack mystery. New York: Scholastic, 1995.
Den vollen Inhalt der Quelle findenChevat, Richie. Shark attack. New York: Bantam Books, 1996.
Den vollen Inhalt der Quelle findenK, kokula Krishna Hari, Hrsg. Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Den vollen Inhalt der Quelle findenBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Den vollen Inhalt der Quelle findenJoanne, White, Mountain Pine Beetle Initiative (Canada) und Pacific Forestry Centre, Hrsg. Detection of red attack stage mountain pine beetle infestation with high spatial resolution satellite imagery. Victoria, B.C: Canadian Forest Service, Pacific Forestry Centre, 2005.
Den vollen Inhalt der Quelle findenYasuda, Anita. The slime attack. North Mankato, Minn: Capstone Stone Arch Books, 2013.
Den vollen Inhalt der Quelle findenHaberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.
Den vollen Inhalt der Quelle findenNiemann, K. O. Assessment of potential for remote sensing detection of bark beetle-infested areas during green attack: A literature review. Victoria, B.C: Natural Resources Canada, Canadian Forest Service, Pacific Forestry Centre, 2004.
Den vollen Inhalt der Quelle findenBhattacharyya, Dhruba Kumar, und Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Den vollen Inhalt der Quelle findenBhattacharyya, Dhruba Kumar, und Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Den vollen Inhalt der Quelle findenBhattacharyya, Dhruba Kumar, und Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Den vollen Inhalt der Quelle findenBrooks, Richard, und Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Den vollen Inhalt der Quelle findenBrooks, Richard, und Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Den vollen Inhalt der Quelle findenBrooks, Richard, und İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Den vollen Inhalt der Quelle findenBrooks, Richard, und Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Den vollen Inhalt der Quelle findenBrooks, Richard, und Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Den vollen Inhalt der Quelle findenLi, Beibei, Rongxing Lu und Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2020.
Den vollen Inhalt der Quelle findenBusch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez und Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Den vollen Inhalt der Quelle findenLi, Beibei, Rongxing Lu und Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2021.
Den vollen Inhalt der Quelle findenBusch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez und Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Den vollen Inhalt der Quelle findenGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy und B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Den vollen Inhalt der Quelle findenGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy und B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Den vollen Inhalt der Quelle findenMedicine, Institute of, Board on Chemical Sciences and Technology, Board on Health Sciences Policy, National Research Council und Board on Life Sciences. BioWatch and Public Health Surveillance : Evaluating Systems for the Early Detection of Biological Threats: Abbreviated Version. National Academies Press, 2011.
Den vollen Inhalt der Quelle findenRaghavan, S. V., und E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Den vollen Inhalt der Quelle findenRaghavan, S. V., und E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Den vollen Inhalt der Quelle findenComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board und Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Den vollen Inhalt der Quelle findenNational Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Den vollen Inhalt der Quelle findenComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board und Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Den vollen Inhalt der Quelle findenRuxton, Graeme D., William L. Allen, Thomas N. Sherratt und Michael P. Speed. Avoiding Attack. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.001.0001.
Der volle Inhalt der QuelleRuxton, Graeme D., William L. Allen, Thomas N. Sherratt und Michael P. Speed. Advertising elusiveness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0009.
Der volle Inhalt der QuellePell, Stephanie K. Systematic Government Access to Private-Sector Data in the United States I. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0008.
Der volle Inhalt der QuelleLi, Stan Z., Escalera, Jun Wan, Guodong Guo und Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Den vollen Inhalt der Quelle findenLi, Stan Z., Escalera, Jun Wan, Guodong Guo und Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Den vollen Inhalt der Quelle findenLi, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo und Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Den vollen Inhalt der Quelle findenLi, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo und Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Springer International Publishing AG, 2020.
Den vollen Inhalt der Quelle findenCassiman, David, und Wouter Meersseman. Tyrosinemia Type I. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0013.
Der volle Inhalt der QuelleSaxe, Joshua, und Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Den vollen Inhalt der Quelle finden