Academic literature on the topic 'Attack Path'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack Path.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack Path"
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Full textLi, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He, and Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (July 29, 2019): 251. http://dx.doi.org/10.3390/info10080251.
Full textHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (December 7, 2023): 1–30. http://dx.doi.org/10.1145/3626789.
Full textHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (June 11, 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Full textLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (October 24, 2022): 3938. http://dx.doi.org/10.3390/math10213938.
Full textLevner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (November 4, 2024): 504. http://dx.doi.org/10.3390/a17110504.
Full textBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Full textGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (August 28, 2024): 437. http://dx.doi.org/10.3390/drones8090437.
Full textBhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Full textAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad, and Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph." Karbala International Journal of Modern Science 8, no. 3 (August 2, 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Full textDissertations / Theses on the topic "Attack Path"
Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Full textMirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Full textVega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.
Full textID: 031001316; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Houman A. Sadri.; Title from PDF title page (viewed March 26, 2013).; Thesis (M.A.)--University of Central Florida, 2012.; Includes bibliographical references (p. 89-99).
M.S.E.E.
Masters
Electrical Engineering and Computing
Engineering and Computer Science
Electrical Engineering; Controls and Robotics
Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Full textAnfallsstigen är ett effektivt verktyg för att visa möjliga hackningsvägarsom en angripare tar emot ett specifikt datornätverk. Det informerarockså administratörer om eventuell svaghet i ett nätverk somhjälper dem att utrulla nätverkskonfigurationsändringar. Baserat påfördefinierade datormetoder kan ett stort antal attackvägar genereras.Åtkomstvägar visar dock alla möjliga vägar för varje beräkning och representerardem med terminologier som är specifika för fältet Cybersecurity.En stor del av attackvägar och representationer är för kompliceradeför vanliga användare vilket gör det svårt att identifiera de delarsom de borde ägna mer uppmärksamhet åt. I denna avhandlingsrapportbeskrivs ett ramverk för att generera en kortfattad och användarvänligattackväg genom att gruppera kontinuerliga angreppssteg.Ramverket är utformat med 6 nivåer av hierarkisk abstraktion. Topp3 nivåer av dessa abstraktioner klassificeras baserat på den fördefinieradestrukturen av mjukvaran och namngiven strukturell uppdelning.De övriga 3 lägre nivåerna klassificeras baserat på semantik meden taxonomi för naturlig språkrepresentation som heter SCV (SecurityCommunity Vocabulary), namngiven semantikavdelning. Denna visualiseringsmetodsläpps som en del av securiCADR en cybersecurityproduktsom släpptes av Foreseeti, vilket ger en kortfattad och förståeliginteraktion genom att aggregera ursprungliga attacksteg enligtolika kunders krav.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textDube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.
Full textExurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Full textThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques." Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Full textTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Full textCyberattacker håller på att bli ett större orosmoment allteftersom vårt samhälle digitaliseras i större utsräckning, där lagring av känslig information snarare har blivit regel än undantag. Detta utgör ett behov av ett tids- och kostnadseffektivt sätt att bedömma cybersäkerheten hos ett företag. Hotmodelleringsspråket enterpriseLang är just detta, där antagandet av ett generellt företagssystem möjliggör återanvändning på flera olika system. Språket är skapat med Meta Attack Language och är baserat på kända attack- och försvarssteg från MITRE ATT&CK Enterprise matris. Eftersom alla möjliga attackvägar inte utnyttjas i lika stor utsträckning, behöver sannolikhetsfördelningar tilldelas till attack- och försvarsstegen. Arbetet som presenteras i den här rapporten inkluderar tilldelningen av sannolikhetsfördelningar till en handfull av dem, i synnerhet de kopplade till att få inital åtkomst till ett system med hjälp av användarutföranden. Utöver detta undersöks också den finansiella påverkan en attack kan ha samt om försvarsåtgärder är finansiellt lönsamma. En modell för avkastning på en sådan investering utvecklas för att kunna beräkna detta.
Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Full textBooks on the topic "Attack Path"
Operations, United States Congress House Committee on Government. Navy's seawolf attack submarine is proceeding along a path of high technical and financial risks: Thirty-fifth report. Washington: U.S. G.P.O., 1990.
Find full textImpey, Rose. Pirate Patch and the black bonnet attack. London: Orchard, 2008.
Find full textCorporation, Port Authority Trans-Hudson, ed. Draft scope: Permanent World Trade Center PATH terminal : environmental impact statement. New York, N.Y.]: [The Port Authority of NY & NJ], 2003.
Find full textKostera, Monika. The University of Hope. Oxford: Oxford University Press, 2024. http://dx.doi.org/10.1093/9780191996948.001.0001.
Full text1530-1610, Scupoli Lorenzo, ed. Spiritual combat: How to win your spiritual battles and attain inner peace ; plus, Interior peace : the path to paradise. Manchester, N.H: Sophia Institute Press, 2002.
Find full textDeMaria, Rusel, and Zach Meston. Sega Genesis Secrets, Volume 2. Rocklin, CA: Prima Publishing, 1991.
Find full textSandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. New York: Bantam Books, 1992.
Find full textOlson, R. M. Attack Path: A space opera adventure. RM Olson, 2021.
Find full textThomson, Miller. Path: ANXIETY and PANIC ATTACK ELIMINATION PROGRAM. Independently Published, 2018.
Find full textThe Way to a Healthy Heart: The Zero Heart Attack Path. Penguin Global, 2004.
Find full textBook chapters on the topic "Attack Path"
Salfer, Martin. "Single-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks, 131–55. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_4.
Full textSalfer, Martin. "Multi-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks, 157–207. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_5.
Full textGonda, Tom, Rami Puzis, and Bracha Shapira. "Scalable Attack Path Finding for Increased Security." In Lecture Notes in Computer Science, 234–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2_18.
Full textKavallieratos, Georgios, and Sokratis Katsikas. "Attack Path Analysis for Cyber Physical Systems." In Computer Security, 19–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0_2.
Full textJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Snapshots: A Sample Path Based Source Estimator." In Malicious Attack Propagation and Source Identification, 79–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_7.
Full textDucousso, Soline, Sébastien Bardin, and Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis." In Programming Languages and Systems, 59–89. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.
Full textRao, Yu, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, and Jinghua Bai. "Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network." In Communications in Computer and Information Science, 97–114. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_8.
Full textFiazza, Maria-Camilla, Michele Peroli, and Luca Viganò. "Attack Interference: A Path to Defending Security Protocols." In E-Business and Telecommunications, 296–314. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35755-8_21.
Full textIdika, Nwokedi, and Bharat Bhargava. "A Kolmogorov Complexity Approach for Measuring Attack Path Complexity." In IFIP Advances in Information and Communication Technology, 281–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21424-0_23.
Full textShosha, Ahmed F., Joshua I. James, and Pavel Gladyshev. "A Novel Methodology for Malware Intrusion Attack Path Reconstruction." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 131–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_11.
Full textConference papers on the topic "Attack Path"
Lu, Ziang, Lu Chen, Yong Li, Guangxin Guo, and Tengyan Wang. "Attack Path Extraction based on VGAE and DBSCAN." In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 9–14. IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00013.
Full textWang, Zijin, Minrui Fei, Yao Xiong, and Aimin Wang. "Dynamic Attack Path Prediction and Visualization for Industrial Cyber-Physical Systems Under Cyber Attacks." In 2024 43rd Chinese Control Conference (CCC), 9005–10. IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662270.
Full textYadav, Mukesh, and Peter J. Hawrylak. "An Empirical Study on Analyzing the Evidence-Based Method in Attack Path Detection." In 2024 Resilience Week (RWS), 1–6. IEEE, 2024. https://doi.org/10.1109/rws62797.2024.10799307.
Full textShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, Jingbo Zhou, Kimia Zamiri Azar, Farimah Farahmandi, and Mark Tehranipoor. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024, 332–41. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Full textMalpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction." In Vertical Flight Society 73rd Annual Forum & Technology Display, 1–15. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.
Full textSubaşi, Engin, and Muharrem Mercımek. "Attack Path Analysis and Security Concept Design for OTA Enabled Electric Power Steering System." In 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), 1–7. IEEE, 2024. https://doi.org/10.1109/asyu62119.2024.10756981.
Full textStelte, Bjorn. "ISP traceback - Attack path detection." In 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, 2013. http://dx.doi.org/10.1109/cns.2013.6682728.
Full textChen, Biqiong, Yanhua Liu, Shijin Li, and Xiaoling Gao. "Attack Intent Analysis Method Based on Attack Path Graph." In ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3371676.3371680.
Full textLi, Shijin, Minchen Zhu, and Yanbin Qiu. "Attack Intent Analysis Method Based on Attack Path Graph." In the 8th International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3290480.3290502.
Full textChen, Tianjiaojiao, Huixiang Zhang, Tianluo Liu, and Renjie Li. "Research on Cyber Attack Modeling and Attack Path Discovery." In 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis (CMSDA). IEEE, 2022. http://dx.doi.org/10.1109/cmsda58069.2022.00068.
Full textReports on the topic "Attack Path"
Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, October 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Full textGhosh, Anup, Steve Noel, and Sushil Jajodia. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference. Fort Belvoir, VA: Defense Technical Information Center, August 2011. http://dx.doi.org/10.21236/ada563714.
Full textKránitz, Péter Pál. Georgia’s EU-Accession Path in Light of the “Foreign Agent Law” and Hungary’s EU-Presidency. Magyar Külügyi Intézet, 2024. http://dx.doi.org/10.47683/kkielemzesek.ke-2024.17.
Full textPrahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), November 2014. http://dx.doi.org/10.2172/1220378.
Full textPrahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), November 2014. http://dx.doi.org/10.2172/1164104.
Full textBukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius, and Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, August 2022. http://dx.doi.org/10.15388/cibersek.2022.
Full textWeinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/nevx1787.
Full textMadrzykowski, Daniel. Firefighter Equipment Operational Environment: Evaluation of Thermal Conditions. UL Firefighter Safety Research Institute, August 2017. http://dx.doi.org/10.54206/102376/igfm4492.
Full textWeinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/gmax3657.
Full textHausmann, Ricardo, Andrés Rodríguez-Clare, and Dani Rodrik. Towards a Strategy for Economic Growth in Uruguay. Inter-American Development Bank, February 2005. http://dx.doi.org/10.18235/0008722.
Full text