Auswahl der wissenschaftlichen Literatur zum Thema „Cybernetic attacks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cybernetic attacks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cybernetic attacks"
Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile und Nurettin Erginoz. „Massive Cyber-Attacks Patterns Implemented with BDI Agents“. Applied Mechanics and Materials 811 (November 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.
Der volle Inhalt der QuelleMoga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu und Ramona Lile. „Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures“. Applied Mechanics and Materials 841 (Juni 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.
Der volle Inhalt der QuelleKubanov, E. V. „Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration“. Public administration aspects 6, Nr. 8 (10.09.2018): 49–55. http://dx.doi.org/10.15421/151846.
Der volle Inhalt der QuelleDudek, Wojciech, und Wojciech Szynkiewicz. „Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety“. Journal of Telecommunications and Information Technology 2 (28.06.2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.
Der volle Inhalt der QuelleAkhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova und Sh Sagyndykova. „Decision support system for assessing the consequences of cyber attacks“. Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, Nr. 1 (15.03.2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.
Der volle Inhalt der QuelleOsak, Alexey, Daniil Panasetsky und Elena Buzina. „Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization“. E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.
Der volle Inhalt der QuelleLaktionov, Illia, Andrii Kmit, Ivan Opirskyy und Oleh Harasymchuk. „RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR“. Cybersecurity: Education, Science, Technique 1, Nr. 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.
Der volle Inhalt der QuelleShukla, Prashant Kumar. „An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things“. International Journal of Wireless and Ad Hoc Communication 7, Nr. 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.
Der volle Inhalt der QuelleYuyukin, I. V. „Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness“. Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, Nr. 3 (30.07.2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.
Der volle Inhalt der QuelleDhirani, Lubna Luxmi, und Thomas Newe. „Securing industry 5.0 using 6σ CYBERNETIC framework“. Mehran University Research Journal of Engineering and Technology 43, Nr. 2 (07.04.2024): 220. http://dx.doi.org/10.22581/muet1982.3202.
Der volle Inhalt der QuelleDissertationen zum Thema "Cybernetic attacks"
Amoordon, Andy. „Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication“. Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.
Der volle Inhalt der QuelleWireless networks are nowadays indispensable components of telecommunication infrastructures. They offer flexibility, mobility and rapid expansion of telecommunication infrastructures. They are also particularly needed to connect mobile devices such as connected cars, watches and drones. Wireless networks are also used in the transport and security sector to connect trains and cameras to monitoring systems. However, in contrary to wired networks in which transmission are isolated in wires, in wireless networks, transmissions are emitted using omnidirectional antennas. This makes wireless networks more vulnerable to unauthorised listening, emission and some specific attacks. In this thesis, we have worked on the detection of three different types of attacks on IEEE 802.11 (Wi-Fi) networks. The three attacks are fake access points and two denial of service attacks namely, deauthentication and jamming attacks. In scientific literature, these three attacks are detected independently and using one or two indicators.We propose a method that uses classification algorithms to create a model that can detect the three attacks by analysing four indicators simultaneously. The model can detect the attacks when they are perpetuated independently and also when they are combined. Concerning data used to create the model, among the three different types of frames that can be transmitted on Wi-Fi networks, we have considered only management frames and more particularly, beacon frames. Beacon frames are sent at regular interval and even in the absence of user traffic. Therefore, basing the detection on the analysis of beacon frames leads to a more efficient detection. In this thesis, we have also considered variations in data rates (absence of user traffic, light, moderate and intense user traffic) and in jamming power (low, moderate and high jamming power). Results show that the model can detect fake access points, deauthentication and jamming attacks (low and moderate power) with high precision. The jamming attack with intense power is detected with satisfying precision. By considering the beacon frames of a farther second access point of the network, we have been able to increase detection precision in the latter case. Finally, we have considered special cases such as Wi-Fi transmissions in the 5 GHz band and the phantom fake access point attack
Hložanka, Filip. „Simulace správy informační bezpečnosti ve fakultním prostředí“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417806.
Der volle Inhalt der QuelleChabak, Kelson D. „Conceptual study of rotary-wing microrobotics“. Wright-Patterson: Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA487086.
Der volle Inhalt der QuelleBücher zum Thema "Cybernetic attacks"
Government, U. S., U. S. Air Force (USAF), U. S. Military und Department of Defense (DoD). Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory. Independently Published, 2017.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cybernetic attacks"
Sokolov, Sergei, Anatoly Nyrkov, Tatiana Knysh und Yaroslav Demakov. „Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare“. In Lecture Notes in Civil Engineering, 67–83. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-6208-6_8.
Der volle Inhalt der QuelleGao, Jian, und Yingjun Chen. „Detecting DOS/DDOS Attacks Under Ipv6“. In Proceedings of the 2012 International Conference on Cybernetics and Informatics, 847–55. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3872-4_110.
Der volle Inhalt der QuelleCholakoska, Ana, Martina Karanfilovska und Danijela Efnusheva. „Survey of Security Issues, Requirements, Challenges and Attacks in Internet of Things“. In Informatics and Cybernetics in Intelligent Systems, 561–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_55.
Der volle Inhalt der QuelleNg, Wing W. Y., Aki P. F. Chan, Daniel S. Yeung und Eric C. C. Tsang. „Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure“. In Advances in Machine Learning and Cybernetics, 851–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11739685_89.
Der volle Inhalt der QuelleXylogiannopoulos, Konstantinos F., Panagiotis Karampelas und Reda Alhajj. „Detecting DDoS Attacks on Multiple Network Hosts“. In Developments in Information Security and Cybernetic Wars, 121–39. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch006.
Der volle Inhalt der QuelleHotchkiss, Michael Bennett. „Russian Information Warfare and 9/11 Conspiracism“. In Developments in Information Security and Cybernetic Wars, 236–66. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch010.
Der volle Inhalt der QuelleSallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan und Majdi Ben Saad. „Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework“. In Privacy Solutions and Security Frameworks in Information Protection, 241–53. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch016.
Der volle Inhalt der QuelleFarouk, Amr. „Critical Infrastructure Protection in Developing Countries“. In Cyber Law, Privacy, and Security, 1142–58. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch054.
Der volle Inhalt der QuelleFarouk, Amr. „Critical Infrastructure Protection in Developing Countries“. In Advances in Finance, Accounting, and Economics, 23–39. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2361-1.ch002.
Der volle Inhalt der QuelleGil, Daniel Juan. „Epilogue: Resurrection and Zombies“. In Fate of the Flesh, 181–90. Fordham University Press, 2021. http://dx.doi.org/10.5422/fordham/9780823290048.003.0007.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cybernetic attacks"
Kuo, Wen-Chung, und Yung-Cheng Lee. „Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks“. In 2007 International Conference on Machine Learning and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icmlc.2007.4370461.
Der volle Inhalt der QuelleCarta, Kévin, André Huynh, Stéfane Mouille, Nadia El Mrabet, Claude Barral und Sébastien Brangoulo. „How Video Injection Attacks Can Even Challenge State-of-the-Art Face Presentation Attack Detection Systems“. In 14th International Multi-Conference on Complexity, Informatics and Cybernetics. Winter Garden, Florida, United States: International Institute of Informatics and Cybernetics, 2023. http://dx.doi.org/10.54808/imcic2023.01.105.
Der volle Inhalt der QuelleChien, Sheng-Hui, Erh-Hsien Chang, Chih-Yung Yu und Cheng-Seen Ho. „Attack Subplan-Based Attack Scenario Correlation“. In 2007 International Conference on Machine Learning and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icmlc.2007.4370455.
Der volle Inhalt der QuelleMedina, Brandon, Elena Acevedo, Antonio Acevedo und Sandra Orantes. „Network Attacks Classification Using Computational Intelligence“. In 17th International Multi-Conference on Society, Cybernetics and Informatics. Winter Garden, Florida, United States: International Institute of Informatics and Cybernetics, 2023. http://dx.doi.org/10.54808/imsci2023.01.156.
Der volle Inhalt der QuelleCao, Lai-cheng. „Detecting Web-Based Attacks by Machine Learning“. In 2006 International Conference on Machine Learning and Cybernetics. IEEE, 2006. http://dx.doi.org/10.1109/icmlc.2006.258990.
Der volle Inhalt der QuelleOtomo, Takuto, Hiroshi Kera und Kazuhiko Kawamoto. „Adversarial joint attacks on legged robots“. In 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2022. http://dx.doi.org/10.1109/smc53654.2022.9945546.
Der volle Inhalt der QuelleChan, Patrick P. K., Fei Zhang, Wing W. Y. Ng, Daniel S. Yeung und Jinshan Jiang. „A novel defend against good word attacks“. In 2011 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2011. http://dx.doi.org/10.1109/icmlc.2011.6016935.
Der volle Inhalt der QuelleGao, C., C. Seatzu, Z. Li und A. Giua. „Multiple Attacks Detection on Discrete Event Systems“. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2019. http://dx.doi.org/10.1109/smc.2019.8914035.
Der volle Inhalt der QuelleWang, Ling, Cheng Zhang und Jie Liu. „Deep Learning Defense Method Against Adversarial Attacks“. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9283255.
Der volle Inhalt der QuelleViet, Khanh, Brajendra Panda und Yi Hu. „Detecting collaborative insider attacks in information systems“. In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377774.
Der volle Inhalt der Quelle