Books on the topic 'Adversarial Attack and Defense'

To see the other types of publications on this topic, follow the link: Adversarial Attack and Defense.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Adversarial Attack and Defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Attack and defense. Broomall, PA: Mason Crest Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Attack and defense. Sidney, N.S.W: Weldon Owen, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang, and Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lutes, W. John. Scandinavian defense: Anderssen counter attack.--. Coraopolis: Chess Enterprises Inc., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

C, Kenski Henry, ed. Attack politics: Strategy and defense. New York: Praeger, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coaching football's attack & pursue 50 defense. West Nyack, N.Y: Parker Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Riley, Kathy. Weird and wonderful: Attack and defense. New York: Kingfisher, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Carson, Harry. Point of attack: The defense strikes back. New York: McGraw-Hill, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Q, Elvee Richard, ed. The end of science?: Attack and defense. Lanham, Md: University Press of America, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yu, Shui. Distributed Denial of Service Attack and Defense. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9491-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Long, Hei. Danger zones: Defending yourself against surprise attack. Boulder, Colo: Paladin Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jelena, Mirkovic, ed. Internet denial of service: Attack and defense mechanisms. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Great Britain. Central Office of Information, ed. Advising the householder on protection against nuclear attack. London: V & A Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cairns, David J.A. (David John Adams), 1961-. Advocacy and the making of the adversarial criminal trial, 1800-1865. Oxford : Toronto: Clarendon Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Soltis, Andy. Beating the Sicilian Defense with the Short-Nunn Attack. Dallas, Tex: Chess Digest, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

O'Meara, Norman T. Optimal attack against an area defense protecting many targets. Santa Monica, CA: Rand Corporation, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Geer, John Gray. In defense of negativity: Attack ads in presidential campaigns. Chicago, IL: University of Chicago Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

In defense of negativity: Attack ads in presidential campaigns. Chicago: University of Chicago Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

United States. Missile Defense Agency. Missile Defense Agency. [Alexandria, Va.?]: Missile Defense Agency, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Cairns, David J. A. Advocacy and the making of the adversarial criminal trial, 1800-1865. Oxford: Clarendon Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Reader's Digest Association. Conquering heart attack & stroke: Your 10-step self-defense plan. New York: Reader's Digest, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Refuting the attack on Mary: A defense of Marian doctrines. 2nd ed. San Diego, Calif: Catholic Answers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

John, Perkins. Attack proof: The ultimate guide to personal protection. 2nd ed. Champaign, IL: Human Kinetics, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Perkins, John. Attack proof: The ultimate guide to personal protection. Champaign, IL: Human Kinetics, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Haberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Phillips, Lincoln. Soccer goalkeeping: The last lineof defense, the first line of attack. Indianapolis, IN: Masters Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Plant defense: Warding off attack by pathogens, pests and vertebrate herbivores. Chichester, West Sussex, U.K: Wiley-Blackwell, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

National Research Council (U.S.). Board on Life Sciences. Reopening public facilities after a biological attack: A decision making framework. Washington, D.C: National Academies Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Latimer, Beach Edward. Scapegoats: A defense of Kimmel and Short at Pearl Harbor. Annapolis, Md: Naval Institute Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mercer, James C. Federal response to a domestic nuclear attack. Maxwell Air Force Base, Ala: USAF Counterproliferation Center, Air University, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Adversarial Deep Learning in Cybersecurity: Attack Taxonomies, Defence Mechanisms, and Learning Theories. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Davies, James, and Ishida Akira. Attack and Defense. Kiseido Publishing Company, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dvoretsky, Mark, and Artur Yusupov. Attack and Defense. International Chess Enterprises, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Attack and Defense (Explorers). Shortland Publications, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Enoeda, K., and John Chisolm. Karate Defense and Attack. Paul Crompton Ltd., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Palmer, Willie J. Hacking: Knowledge Attack Defense. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

1794-1855, O'Connor Feargus, ed. Feargus O'Connor, attack and defense. New York: Garland, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lutes. Scandinavian Defense Anderssen Counter Attack. Chess Enterprises, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lutes, W. John. Scandinavian Defense, Anderssen Counter Attack. Chess Enterprises, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Jackson, John. Special Advocates in the Adversarial System. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

The ABC's of Attack and Defense. Slate & Shell, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Betts, Richard K. Surprise Attack: Lessons for Defense Planning. Brookings Institution Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Jajodia, Sushil, Anup K. Ghosh, and V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography