Academic literature on the topic 'Attack Investigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack Investigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack Investigation"
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Full textWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Full textZhu, Ying. "Attack Pattern Discovery in Forensic Investigation of Network Attacks." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1349–57. http://dx.doi.org/10.1109/jsac.2011.110802.
Full textStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Full textD, Yuvaraj, Sivaram M, A. Mohamed Uvaze Ahamed, and Nageswari S. "Some Investigation on DDOS Attack Models in Mobile Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (September 25, 2019): 71. http://dx.doi.org/10.3991/ijim.v13i10.11304.
Full textKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (January 30, 2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Full textYeng, Prosper Kandabongee, Muhammad Ali Fauzi, Bian Yang, and Peter Nimbe. "Investigation into Phishing Risk Behaviour among Healthcare Staff." Information 13, no. 8 (August 18, 2022): 392. http://dx.doi.org/10.3390/info13080392.
Full textZharova, O. Yu. "APPLICATION OF NETWORK LOAD ANALYSIS SYSTEM FOR DETECTING START OF DDOS ATTACK." Issues of radio electronics, no. 11 (November 20, 2018): 48–52. http://dx.doi.org/10.21778/2218-5453-2018-11-48-52.
Full textWu, Siwei, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, and Kui Ren. "Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum." ACM Transactions on Software Engineering and Methodology 31, no. 3 (July 31, 2022): 1–33. http://dx.doi.org/10.1145/3505263.
Full textMHolkar, Amit, Neha Shinde Holkar, and Dhiiraj Nitnawwre. "Investigation of Application Attack on MANET." International Journal of Computer Applications 71, no. 14 (June 26, 2013): 42–45. http://dx.doi.org/10.5120/12430-9190.
Full textDissertations / Theses on the topic "Attack Investigation"
Fang, Pengcheng. "REPTRACKER:TOWARDS AUTOMATIC ATTACK INVESTIGATION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1550696995596089.
Full textVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Full textMathre, John Mark. "Computational investigation of incompressible airfoil flows at high angles of attack." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/22965.
Full textCebeci's viscous/inviscid interaction program was applied to the analysis of steady, two dimensional, incompressible flow past four airfoils, the NACA 66₃-018, 0010 (Modified), 4412 and the Wortmann FX 63-137. Detailed comparisons with the available experimental results show that the essential features are correctly modelled, but that significant discrepancies are found in regions of flow separations.
http://archive.org/details/computationalinv00math
Lieutenant, United States Navy
Tait, Sean William. "An investigation of fore-body aerodynamics during the velocity vector roll." Thesis, University of the West of Scotland, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.265929.
Full textChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Full textJhangiani, Rajiv Sunil. "Processing terror : an investigation into the immediate and short-term psychological effects of a terrorist attack." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2780.
Full textBrueckner, Rene. "Accelerating the thaumasite form of sulfate attack and an investigation of its effects on skin friction." Thesis, University of Birmingham, 2008. http://etheses.bham.ac.uk//id/eprint/176/.
Full textHovmark, Olle, and Emma Schüldt. "Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280102.
Full textCyberattacker mot alla typer av system är ett växande problem i samhället. Eftersom Mac-operativsystemen blir allt vanligare, blir attackerna mot dem också vanligare. Probabilistiska attackgrafer är ett sätt att modellera och visualisera cyberattacker. Meta Attack Language är ett språk som kan användas för att skapa domänspecifika språk som i sin tur kan användas för att modellera en cyberattack på den specifika domänen med en probabilistisk attackgraf. Denna rapport undersöker hur Meta Attack Language kan utvidgas så att det kan användas för att skapa attackgrafer som innehåller digitala forensiska bevis, genom att undersöka attacker mot Mac- operativsystem där bevis i form av property-list-filer har lämnats. MITRE ATT&CK-matrisen är en kunskapsbas med information om cyberattacker. En studie av denna matris gjordes för att ta reda på vilka olika typer av bevis som har hittats efter attacker på ett Mac-operativsystem samt för att motivera varför denna rapport fokuserar på bevis i form av property-list-filer. En studie av grå litteratur gjordes sedan för att undersöka olika typer av attacker som har lämnat bevis i form av property-list-filer. Studierna visade att det finns en mängd bevis som kan lämnas från ett angrepp på ett Mac-operativsystem och att de flesta bevis i form av property-list-filer användes av attackeraren för att göra attacken tålig mot sådant som omstart av systemet. De visade också att property-list-filerna ofta placerades i rotkatalogen i filsystemet. Studierna visade också att motståndaren ofta försökte dölja filerna genom att ge dem namn som vanligtvis används på ett Mac-operativsystem. Efter studierna genomförts skapades en lista med krav som måste uppfyllas av en utvidgning av Meta Attack. Denna lista baserades på resultaten från studierna och inkluderade krav som säger att det till exempel måste finnas sätt att uttrycka namnet och platsen för en fil, metoder som angriparen använder för att undvika upptäckt, samband mellan olika typer av bevis och samband mellan bevis och attacksteg.
Waring, Howard Linton. "An investigation into the nature and response to treatment of panic attack symptoms in general practice attenders." Thesis, University of Aberdeen, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.277490.
Full textSommers, John Douglas. "An experimental investigation of support strut interference on a three-percent fighter model at high angles of attack." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25926.
Full textBooks on the topic "Attack Investigation"
Holmes, Cameron H. Developing plans to attack drug traffickers' assets. Washington, DC (633 Indiana Ave., NW., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 1992.
Find full textHolmes, Cameron H. Developing plans to attack drug traffickers' assets. Washington, DC (633 Indiana Ave., NW., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 1992.
Find full textForum, Police Executive Research, and United States. Bureau of Justice Assistance., eds. Developing plans to attack drug traffickers' assets. Washington, DC (633 Indiana Ave., NW., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 1992.
Find full text1970-, Giles Matthew F., and Rothwell Peter M, eds. Transient ischemic attack and stroke: Diagnosis, investigation, and management. Cambridge: Cambridge University Press, 2009.
Find full textRooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.
Find full textOn the attack against ROK Ship Cheonan. [Seoul]: Ministry of National Defense Republic of Korea, 2010.
Find full textMathre, John Mark. Computational investigation of incompressible airfoil flows at high angles of attack. Monterey, Calif: Naval Postgraduate School, 1988.
Find full textGuillemin, Jeanne. American anthrax: Fear, crime, and the investigation of the nation's deadliest bioterror attack. New York: Times Books, 2011.
Find full textKeeley, Jennifer. Deterring and investigating attack: The role of the FBI and CIA. San Diego, [Calif.]: Lucent Books, 2004.
Find full textSehgal, A. K. Investigation of nose bluntness and angle of attack effects on slender bodies in viscous hypertension flows. Norfolk, Va: Dept. of Mechanical Engineering & Mechanics, College of Engineering & Technology, Old Dominion University, 1991.
Find full textBook chapters on the topic "Attack Investigation"
Sembiring, Irwan, and Yonathan Satrio Nugroho. "Network Forensics Investigation for Botnet Attack." In IT Convergence and Security 2017, 228–36. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6454-8_29.
Full textMiyakawa, Junichi, Yuichi Shimbo, and Shigeru Aso. "Numerical and Experimental Investigation on Dynamic Stall Vortex." In Fluid Dynamics of High Angle of Attack, 79–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-52460-8_4.
Full textCheng, Bin, Tsubasa Kikuta, Yoshinao Toshimitsu, and Takamichi Saito. "Investigation of Power Consumption Attack on Android Devices." In Advanced Information Networking and Applications, 567–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75075-6_46.
Full textM. Milajerdi, Sadegh, Birhanu Eshete, Rigel Gjomemo, and Venkat N. Venkatakrishnan. "ProPatrol: Attack Investigation via Extracted High-Level Tasks." In Information Systems Security, 107–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_6.
Full textNelson, Robert C., and Andrew S. Arena. "Experimental Investigation of Wing Rock of Slender Wings and Aircraft Configurations." In Fluid Dynamics of High Angle of Attack, 413–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-52460-8_29.
Full textYin, Xieyuan, Xiyun Lu, and Lixian Zhuang. "Investigation on the Flow Characteristics for Oscillating Airfoils at High Incidence." In Fluid Dynamics of High Angle of Attack, 133–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-52460-8_8.
Full textSzynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains, 120–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Full textYin, Libo, Chonghua Wang, Jun Li, Rongchao Yin, Yang Jiao, and Hao Jiang. "When Side Channel Becomes Good: Kernel Malware Attack Investigation." In Lecture Notes in Computer Science, 571–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24265-7_49.
Full textWang, Kai, Guillaume Lavoué, Florence Denis, and Atilla Baskurt. "Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation." In Information Hiding, 50–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77370-2_4.
Full textSurya, S., and S. Ramamoorthy. "An Investigation of Paralysis Attack Using Machine Learning Approach." In Proceedings of International Conference on Deep Learning, Computing and Intelligence, 143–53. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5652-1_12.
Full textConference papers on the topic "Attack Investigation"
Yasir Khalid, Uwe Dippel, and Salman Yussof. "Measurement program: Investigation on cache-timing attack." In 2009 IEEE 9th Malaysia International Conference on Communications (MICC). IEEE, 2009. http://dx.doi.org/10.1109/micc.2009.5431494.
Full textMellor, Jake, Allen Shelton, and Sara Tehranipoor. "Investigation of Reinforcement Learning-based Attack on Logic Locking." In 2021 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 2021. http://dx.doi.org/10.1109/hst53381.2021.9619800.
Full textAlibeigi, Sepideh. "Wind Tunnel Investigation of the Flow Field on Slender Sharp-Edged Half Delta Wings." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-37014.
Full textJun, Jae-Hyun, Hyunju Oh, and Sung-Ho Kim. "DDoS flooding attack detection through a step-by-step investigation." In 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications (NESEA). IEEE, 2011. http://dx.doi.org/10.1109/nesea.2011.6144944.
Full textXu, Zhiqiang, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, and Dan Meng. "DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833632.
Full text"Investigation of Concrete Deterioration Due toSulfate Attack--A Case History." In SP-100: Concrete Durability: Proceedings of Katharine and Bryant Mather International Symposium. American Concrete Institute, 1987. http://dx.doi.org/10.14359/3129.
Full textTaylor, Gordon, Ismet Gursul, and Doug Greenwell. "An Investigation of Support Interference in High Angle of Attack Testing." In 41st Aerospace Sciences Meeting and Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2003. http://dx.doi.org/10.2514/6.2003-1105.
Full textHAWK, J., R. BARNETT, P. O'NEIL, and N. WALTERS. "Investigation of high angle of attack vortical flows over delta wings." In 28th Aerospace Sciences Meeting. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1990. http://dx.doi.org/10.2514/6.1990-101.
Full textKwon, Yonghwi, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, et al. "MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/ndss.2018.23306.
Full textHassan, Wajih Ul, Mohammad A. Noureddine, Pubali Datta, and Adam Bates. "OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24270.
Full textReports on the topic "Attack Investigation"
Rogers, Lawrence W., and Michael G. Alexander. Hydrodynamic Investigation of Vortical Flows for an ATTAC Configuration with Canards. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada253928.
Full textAvni, Adi, and Kirankumar S. Mysore. Functional Genomics Approach to Identify Signaling Components Involved in Defense Responses Induced by the Ethylene Inducing Xyalanase Elicitor. United States Department of Agriculture, December 2009. http://dx.doi.org/10.32747/2009.7697100.bard.
Full textSchutt, Timothy C., and Manoj K. Shukla. Computational Investigation on Interactions Between Some Munitions Compounds and Humic Substances. Engineer Research and Development Center (U.S.), February 2021. http://dx.doi.org/10.21079/11681/39703.
Full textStakes, Keith, and Joseph Willi. Study of the Fire Service Training Environment: Safety, Fidelity, and Exposure -- Acquired Structures. UL Firefighter Safety Research Institute, March 2019. http://dx.doi.org/10.54206/102376/ceci9490.
Full textJeong, Stephen, Sarah Stawiski, Sol Bukin, and Heather Champion. Stemming the Great Resignation through Leadership Development. Center for Creative Leadership, 2022. http://dx.doi.org/10.35613/ccl.2022.2051.
Full textMathur, Shishur, and Ralph Robinson. Transportation Utility Fee to Fund Transit in California. Mineta Transportation Institute, June 2022. http://dx.doi.org/10.31979/mti.2022.2032.
Full textSessa, Guido, and Gregory B. Martin. molecular link from PAMP perception to a MAPK cascade associated with tomato disease resistance. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597918.bard.
Full textHeinz, Kevin, Itamar Glazer, Moshe Coll, Amanda Chau, and Andrew Chow. Use of multiple biological control agents for control of western flower thrips. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7613875.bard.
Full textRukundo, Solomon. Tax Amnesties in Africa: An Analysis of the Voluntary Disclosure Programme in Uganda. Institute of Development Studies (IDS), December 2020. http://dx.doi.org/10.19088/ictd.2020.005.
Full textElizur, Abigail, Amir Sagi, Gideon Hulata, Clive Jones, and Wayne Knibb. Improving Crustacean Aquaculture Production Efficiencies through Development of Monosex Populations Using Endocrine and Molecular Manipulations. United States Department of Agriculture, June 2010. http://dx.doi.org/10.32747/2010.7613890.bard.
Full text