Academic literature on the topic 'Attack Path'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack Path.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack Path"

1

Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.

Full text
Abstract:
As the cloud infrastructure is simultaneously shared by millions of consumers, heinous use of cloud resources are also increasing. It makes ways to attackers to set up attacks by exploiting the vulnerabilities. And obviously, these attacks are leading to severe disasters as innocent consumers are unknowingly sharing cloud resources with harmful attackers. To prevent the occurrence of cloud attacks, attack graph based framework is proposed in this paper. Here, an attack path sketches an attack scenario by a streak of threats ranging in severity rating that shows how popular a particular cloud network service is in comparison. In a dynamic cloud environment, the proposed framework can disclose an optimal attack path thereby preventing cloud attacks. In cloud system the infrastructure is shared by potentially millions of users, which benefits the attackers to exploit vulnerabilities of the cloud. An instrument for analyzing multi-stage, multi-host assault scenarios in networks is the attack graph. It might not be possible for the administrator to patch every vulnerability n a large number of assault paths in an attack graph. The administrator might not be able to fix every vulnerability. To identify the most preferred or ideal assault path from a particular attack graph in a setting Ant Colony Optimization (ACO) algorithm is used.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He, and Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (July 29, 2019): 251. http://dx.doi.org/10.3390/info10080251.

Full text
Abstract:
This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative and systematic evaluation of attacks on a DAS. In the DAS security architecture, AT nodes are traversed and used to represent the attack path. The CVSS is used to quantify the attack sequence, which is the leaf node in an AT. This paper proposes a method to calculate each attack path probability and find the maximum attack path probability in DASs based on attacker behavior. The AT model is suitable for DAS hierarchical features in architecture. The experimental results show that the proposed model can reduce the influence of subjective factors on attack quantification, improve the probability of predicting attacks on the DASs, generate attack paths, better identify attack characteristics, and determine the attack path and quantification probability. The quantitative results of the model’s evaluation can find the most vulnerable component of a DAS and provide an important reference for developing targeted defensive measures in DASs.
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (December 7, 2023): 1–30. http://dx.doi.org/10.1145/3626789.

Full text
Abstract:
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security threats. In this work, we study a particular security threat due to the sharing of links between high-security paths and low-security paths, which enables a new type of DoS attacks, called cross-path attacks, that indirectly attack a set of targeted high-security paths (target paths) by congesting the shared links through a set of attacker-controlled low-security paths (attack paths). While the feasibility of such attacks has been recently demonstrated in the context of SDN, their potential performance impact has not been characterized. To this end, we develop an approach for designing an optimized cross-path attack under a constrained total attack rate, consisting of (i) novel reconnaissance algorithms that can provide consistent estimates of the locations and parameters of the shared links via network tomography, and (ii) efficient optimization methods to design the optimal allocation of attack rate over the attack paths to maximally degrade the performance of the target paths. The proposed attack has achieved a significantly larger performance impact than its non-optimized counterparts in extensive evaluations based on multiple network settings, signaling the importance of addressing such intelligent attacks in network design.
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (June 11, 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.

Full text
Abstract:
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security threats. In this work, we study a particular security threat due to the sharing of links between high-security paths and low-security paths, which enables a new type of DoS attacks, called cross-path attacks, that indirectly attack a set of targeted high-security paths (target paths) by congesting the shared links through a set of attacker-controlled low-security paths (attack paths). While the feasibility of such attacks has been recently demonstrated in the context of SDN, their potential performance impact has not been characterized. To this end, we develop an approach for designing an optimized cross-path attack under a constrained total attack rate, consisting of (i) novel reconnaissance algorithms that can provide consistent estimates of the locations and parameters of the shared links via network tomography, and (ii) efficient optimization methods to design the optimal allocation of attack rate over the attack paths to maximally degrade the performance of the target paths. The proposed attack has achieved a significantly larger performance impact than its non-optimized counterparts in extensive evaluations based on multiple network settings, signaling the importance of addressing such intelligent attacks in network design. For more detail, see the full paper [4].
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (October 24, 2022): 3938. http://dx.doi.org/10.3390/math10213938.

Full text
Abstract:
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi-step attacks. The complexity of multi-step attacks makes it difficult for security protection personnel to effectively determine the target attack path. In addition, most of the current protection models responding to multi-step attacks have not deeply studied the protection strategy selection method in the case of limited budget. Aiming at the above problems, we propose a protection strategy selection model based on the Genetic Ant Colony Optimization Algorithm. The model firstly evaluates the risk of ICS through the Bayesian attack graph; next, the target attack path is predicted from multiple angles through the maximum probability attack path and the maximum risk attack path; and finally, the Genetic Ant Colony Optimization Algorithm is used to select the most beneficial protection strategy set for the target attack path under limited budget. Compared with the Genetic Algorithm and Ant Colony Optimization Algorithm, the Genetic Ant Colony Optimization Algorithm proposed in this paper can handle the local optimal problem well. Simulation experiments verify the feasibility and effectiveness of our proposed model.
APA, Harvard, Vancouver, ISO, and other styles
6

Levner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (November 4, 2024): 504. http://dx.doi.org/10.3390/a17110504.

Full text
Abstract:
This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker’s possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker’s intentions. We formulate this problem as a path-finding optimization problem with logical constraints represented by AND and OR nodes. We propose a new Dijkstra-type algorithm that combines elements from Dijkstra’s shortest path algorithm and the critical path method. Although the path extraction problem is generally NP-hard, for the studied special case, the proposed algorithm determines the optimal attack path in polynomial time, O(nm), where n is the number of nodes and m is the number of edges in the attack graph. To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. Computational experiments with real and synthetic data have shown that the proposed algorithm consistently and quickly finds optimal solutions to the problem.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.

Full text
Abstract:
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (August 28, 2024): 437. http://dx.doi.org/10.3390/drones8090437.

Full text
Abstract:
As IoT technology advances, the smart grid (SG) has become crucial to industrial infrastructure. However, SG faces security challenges, particularly from distributed denial of service (DDoS) attacks, due to inadequate security mechanisms for IoT devices. Moreover, the extensive deployment of SG exposes communication links to attacks, potentially disrupting communications and power supply. Link flooding attacks (LFAs) targeting congested backbone links have increasingly become a focal point of DDoS attacks. To address LFAs, we propose integrating unmanned aerial vehicles (UAVs) into the Smart Grid (SG) to offer a three-dimensional defense perspective. This strategy includes enhancing the speed and accuracy of attack path tracking as well as alleviating communication congestion. Therefore, our new DDoS tracking scheme leverages UAV mobility and employs beam search with adaptive beam width to reconstruct attack paths and pinpoint attack sources. This scheme features a threshold iterative update mechanism that refines the threshold each round based on prior results, improving attack path reconstruction accuracy. An adaptive beam width method evaluates the number of abnormal nodes based on the current threshold, enabling precise tracking of multiple attack paths and enhancing scheme automation. Additionally, our path-checking and merging method optimizes path reconstruction by merging overlapping paths and excluding previously searched nodes, thus avoiding redundant searches and infinite loops. Simulation results on the Keysight Ixia platform demonstrate a 98.89% attack path coverage with a minimal error tracking rate of 2.05%. Furthermore, simulations on the NS-3 platform show that drone integration not only bolsters security but also significantly enhances network performance, with communication effectiveness improving by 88.05% and recovering to 82.70% of normal levels under attack conditions.
APA, Harvard, Vancouver, ISO, and other styles
9

Bhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.

Full text
Abstract:
Background:Distributed Denial of Service (DDoS) attack is a major threat over the internet. The IP traceback mechanism defends against DDoS attacks by tracing the path traversed by attack packets. The existing traceback techniques proposed till now are found with few short comings. The victim required many number of packets to trace the attack path. The requirement of a large number of packets resulted in more number of combinations and more false positives.Methods:To generate a unique value for the IP address of the routers in the attack path Chinese Remainder theorem is applied. This helped in combining the exact parts of the IP address at the victim. We also applied K-Nearest Neighbor (KNN) algorithm to classify the packets depending on their traffic flow, this reduced the number of packets to reconstruct the attack path.Results:The proposed approach is compared with the existing approaches and the results demonstrated that the attack graph is effectively constructed with higher precision and lower combination overhead under large scale DDoS attacks. In this approach, packets from diverse flows are separated as per flow information by applying KNN algorithm. Hence, the reconstruction procedure could be applied on each group separately to construct the multiple attack paths. This results in reconstruction of the complete attack graph with fewer combinations and false positive rate.Conclusion:In case of DDoS attacks the reconstruction of the attack path plays a major role in revealing IP addresses of the participated routers without false positives and false negatives. Our algorithm FRS enhances the feasibility of information pertaining to even the farthest routers by incorporating a flag condition while marking the packets. The rate of false positives and false negatives are drastically reduced by the application of Chinese Remainder Theorem on the IP addresses of the router. At the victim, the application of KNN algorithm reduced the combination overhead and the computation cost enormously.
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Araji, Zaid J., Sharifah Sakinah Syed Ahmad, and Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph." Karbala International Journal of Modern Science 8, no. 3 (August 2, 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Attack Path"

1

Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.

Full text
Abstract:
URL parser and normalization processes are common and important operations in different web frameworks and technologies. In recent years, security researchers have targeted these processes and discovered high impact vulnerabilities and exploitation techniques. In a different approach, we will focus on semantic disconnect among different framework-independent web technologies (e.g., browsers, proxies, cache servers, web servers) which results in different URL interpretations. We coined the term “Path Confusion” to represent this disagreement and this thesis will focus on analyzing enabling factors and security impact of this problem.In this thesis, we will show the impact and importance of path confusion in two attack classes including Style Injection by Relative Path Overwrite (RPO) and Web Cache Deception (WCD). We will focus on these attacks as case studies to demonstrate how utilizing path confusion techniques makes targeted sites exploitable. Moreover, we propose novel variations of each attack which would expand the number of vulnerable sites and introduce new attack scenarios. We will present instances which have been secured against these attacks, while being still exploitable with introduced Path Confusion techniques. To further elucidate the seriousness of path confusion, we will also present the large scale analysis results of RPO and WCD attacks on high profile sites. We present repeatable methodologies and automated path confusion crawlers which detect thousands of sites that are still vulnerable to RPO or WCD only with specific types of path confusion techniques. Our results attest the severity of path confusion based class of attacks and how extensively they could hit the clients or systems. We analyze some browser-based mitigation techniques for RPO and discuss that WCD cannot be dealt as a common vulnerability of each component; instead it arises when an ecosystem of individually impeccable components ends up in a faulty situation.
APA, Harvard, Vancouver, ISO, and other styles
2

Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.

Full text
Abstract:
URL parser and normalization processes are common and important operations in different web frameworks and technologies. In recent years, security researchers have targeted these processes and discovered high impact vulnerabilities and exploitation techniques. In a different approach, we will focus on semantic disconnect among different framework-independent web technologies (e.g., browsers, proxies, cache servers, web servers) which results in different URL interpretations. We coined the term “Path Confusion” to represent this disagreement and this thesis will focus on analyzing enabling factors and security impact of this problem.In this thesis, we will show the impact and importance of path confusion in two attack classes including Style Injection by Relative Path Overwrite (RPO) and Web Cache Deception (WCD). We will focus on these attacks as case studies to demonstrate how utilizing path confusion techniques makes targeted sites exploitable. Moreover, we propose novel variations of each attack which would expand the number of vulnerable sites and introduce new attack scenarios. We will present instances which have been secured against these attacks, while being still exploitable with introduced Path Confusion techniques. To further elucidate the seriousness of path confusion, we will also present the large scale analysis results of RPO and WCD attacks on high profile sites. We present repeatable methodologies and automated path confusion crawlers which detect thousands of sites that are still vulnerable to RPO or WCD only with specific types of path confusion techniques. Our results attest the severity of path confusion based class of attacks and how extensively they could hit the clients or systems. We analyze some browser-based mitigation techniques for RPO and discuss that WCD cannot be dealt as a common vulnerability of each component; instead it arises when an ecosystem of individually impeccable components ends up in a faulty situation.
APA, Harvard, Vancouver, ISO, and other styles
3

Vega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.

Full text
Abstract:
The role of the unmanned aerial vehicle (UAV) has significantly expanded in the military sector during the last decades mainly due to their cost effectiveness and their ability to eliminate the human life risk. Current UAV technology supports a variety of missions and extensive research and development is being performed to further expand its capabilities. One particular field of interest is the area of the low cost expendable UAV since its small price tag makes it an attractive solution for target suppression. A swarm of these low cost UAVs can be utilized as guided munitions or kamikaze UAVs to attack multiple targets simultaneously. The focus of this thesis is the development of a cooperative online path planning algorithm that coordinates the trajectories of these UAVs to achieve a simultaneous arrival to their dynamic targets. A nonlinear autopilot design based on the dynamic inversion technique is also presented which stabilizes the dynamics of the UAV in its entire operating envelope. A nonlinear high fidelity six degrees of freedom model of a fixed wing aircraft was developed as well that acted as the main test platform to verify the performance of the presented algorithms
ID: 031001316; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Houman A. Sadri.; Title from PDF title page (viewed March 26, 2013).; Thesis (M.A.)--University of Central Florida, 2012.; Includes bibliographical references (p. 89-99).
M.S.E.E.
Masters
Electrical Engineering and Computing
Engineering and Computer Science
Electrical Engineering; Controls and Robotics
APA, Harvard, Vancouver, ISO, and other styles
4

Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.

Full text
Abstract:
The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated.However, attack paths show all possible routes for each calculationand represent them with terminologies specific to the cybersecurityfield. A major portion of attack routes and representations aretoo complicated for normal users, making it difficult to identify theparts they should pay more attention to. In this thesis project, a frameworkfor generating a concise and user-friendly attack path throughgrouping continuous attack steps is described. The framework is designedwith 6 levels of hierarchical abstraction. Top 3 levels of theseabstractions are classified based on the predefined structure of the softwareand named Structural Division. The other 3 lower levels areclassified based on semantics involving a taxonomy for natural languagerepresentation called SCV (Security Community Vocabulary),named semantics division. This visualization method is released aspart of securiCADR , a cybersecurity product released by Foreseeti,which provides a concise and understandable interaction by aggregatingoriginal attack steps according to different requirements of customers.
Anfallsstigen är ett effektivt verktyg för att visa möjliga hackningsvägarsom en angripare tar emot ett specifikt datornätverk. Det informerarockså administratörer om eventuell svaghet i ett nätverk somhjälper dem att utrulla nätverkskonfigurationsändringar. Baserat påfördefinierade datormetoder kan ett stort antal attackvägar genereras.Åtkomstvägar visar dock alla möjliga vägar för varje beräkning och representerardem med terminologier som är specifika för fältet Cybersecurity.En stor del av attackvägar och representationer är för kompliceradeför vanliga användare vilket gör det svårt att identifiera de delarsom de borde ägna mer uppmärksamhet åt. I denna avhandlingsrapportbeskrivs ett ramverk för att generera en kortfattad och användarvänligattackväg genom att gruppera kontinuerliga angreppssteg.Ramverket är utformat med 6 nivåer av hierarkisk abstraktion. Topp3 nivåer av dessa abstraktioner klassificeras baserat på den fördefinieradestrukturen av mjukvaran och namngiven strukturell uppdelning.De övriga 3 lägre nivåerna klassificeras baserat på semantik meden taxonomi för naturlig språkrepresentation som heter SCV (SecurityCommunity Vocabulary), namngiven semantikavdelning. Denna visualiseringsmetodsläpps som en del av securiCADR en cybersecurityproduktsom släpptes av Foreseeti, vilket ger en kortfattad och förståeliginteraktion genom att aggregera ursprungliga attacksteg enligtolika kunders krav.
APA, Harvard, Vancouver, ISO, and other styles
5

Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.

Full text
Abstract:
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theoretical aspects of the semantic path merger packet classification algorithm are investigated, and the algorithm's hardware-based implementation is evaluated along with comparative analysis versus content addressable memory. Experimental results show that the hardware implementation of the semantic path merger algorithm significantly outperforms content addressable memory in terms of energy consumption and operational timing.
APA, Harvard, Vancouver, ISO, and other styles
6

Dube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.

Full text
Abstract:
The use of Internet has revolutionized the way information is exchanged, changed business paradigms and put mission critical and sensitive systems online. Any dis- ruption of this connectivity and the plethora of services provided results in significant damages to everyone involved. Denial of Service (DoS) attacks are becoming increas- ingly common and are the cause of lost time and revenue. Flooding type DoS attacks use spoofed IP addresses to disguise the attackers. This makes identification of the attackers extremely difficult. This work proposes a new scheme that allows the victim of a DoS attack to identify the correct origin of the malicious traffic. The suggested mechanism requires routers to mark packets using adjusted probabilistic marking. This results in a lower number of packet-markings required to identify the traffic source. Unlike many related works, we use the existing IPv4 header structure to incorporate these markings. We simulate and test our algorithms using real Internet trace data to show that our technique is fast, and works successfully for a large number of distributed attackers.
APA, Harvard, Vancouver, ISO, and other styles
7

Exurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.

Full text
Abstract:
L'exportation et la mutualisation des industries de fabrication des circuits intégrés impliquent de nombreuses interrogations concernant l'intégrité des circuits fabriqués. On se retrouve alors confronté au problème d'insertion d'une fonctionnalité dissimulée pouvant agir de façon cachée : on parle de Cheval de Troie Matériel (CTM). En raison de la complexité d'un circuit intégré, repérer ce genre de modification se révèle particulièrement difficile. Le travail proposé dans ce manuscrit s'oriente vers une technique de détection non destructrice de CTM. L’approche consiste à utiliser les temps de calculs internes du système étudié comme canal permettant de détecter des CTM. Dans ces travaux, un modèle décrivant les temps de calcul est défini. Il prend notamment en compte deux paramètres importants que sont les conditions expérimentales et les variations de procédés.Des attaques en faute par glitchs d’horloge basée sur la violation de contraintes temporelles permettent de mesurer des temps de calcul internes. Des cartes fiables sont utilisées pour servir de référence. Après avoir validé la pertinence de ce canal d’étude concernant l’obtention d’informations sur le comportement interne du circuit cible, on procède à des détections expérimentales de CTM insérés à deux niveaux d’abstraction (niveau RTL et après l'étape de placement/routage). Des traitements avec prise en compte des variations de procédés permettent d'identifier si les cartes testées sont infectées par un CTM
The globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
APA, Harvard, Vancouver, ISO, and other styles
8

Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques." Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.

Full text
Abstract:
Les outils de prévention des vulnérabilités et de détection des anomalies sont essentiels pour la sécurité des réseaux informatiques. Cette thèse se concentre sur l'utilisation des données du MITRE ATT&CK, des scores CVSS et de la norme ISO 27002:2022 pour automatiser et consolider l'analyse des vulnérabilités et la détection des anomalies. Les objectifs principaux sont : - Diagnostic de vulnérabilité : Identifier les sous-réseaux les plus vulnérables en combinant les données du MITRE ATT&CK, des scores CVSS et de la norme ISO 27002:2022. Pour cela, une base de données appelée Data ISO-MA a été créée. Un algorithme évalue la vulnérabilité des chemins dans le réseau, identifiant ceux les plus à risque. - Détection d’anomalies : Analyser les flux de trafic pour détecter des comportements inhabituels dans les chemins vulnérables. Une approche inspirée du modèle Path-scan de Joshua Neil et al. (2013) a été utilisée. Chaque connexion réseau est modélisée avec un modèle de Markov à 3 états et la statistique du rapport de vraisemblance généralisé (GLRT), permettant de capturer et d'identifier les comportements anormaux.Ces deux outils visent à renforcer la sécurité des réseaux informatiques en fournissant une solution intégrée pour la prévention des vulnérabilités et la détection des anomalies
Tools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
APA, Harvard, Vancouver, ISO, and other styles
9

Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.

Full text
Abstract:
Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with the storage of sensitive information being a rule rather than an exception. This poses a need of a time- and cost efficient way to assess the cyber security of an enterprise. The threat modeling language enterpriseLang constitute just that, where a general enterprise system assumption allows for re-usage on several enterprise systems. The language is created with Meta Attack Language and is based on the knowledgeable attack- and mitigation steps of MITRE ATT&CK Enterprise Matrix. Since all possible attack paths are not equally likely, probability distributions need to be applied to the attack and mitigation steps. The work presented in this paper includes the provision of probability distributions to a handful of them, mainly connected to gaining initial access to a system with the help of user execution. Beyond this, the financial impact an attack can have and if mitigation measures are financially profitable are examined. To calculate this, a Return on Response Investment model is developed.
Cyberattacker håller på att bli ett större orosmoment allteftersom vårt samhälle digitaliseras i större utsräckning, där lagring av känslig information snarare har blivit regel än undantag. Detta utgör ett behov av ett tids- och kostnadseffektivt sätt att bedömma cybersäkerheten hos ett företag. Hotmodelleringsspråket enterpriseLang är just detta, där antagandet av ett generellt företagssystem möjliggör återanvändning på flera olika system. Språket är skapat med Meta Attack Language och är baserat på kända attack- och försvarssteg från MITRE ATT&CK Enterprise matris. Eftersom alla möjliga attackvägar inte utnyttjas i lika stor utsträckning, behöver sannolikhetsfördelningar tilldelas till attack- och försvarsstegen. Arbetet som presenteras i den här rapporten inkluderar tilldelningen av sannolikhetsfördelningar till en handfull av dem, i synnerhet de kopplade till att få inital åtkomst till ett system med hjälp av användarutföranden. Utöver detta undersöks också den finansiella påverkan en attack kan ha samt om försvarsåtgärder är finansiellt lönsamma. En modell för avkastning på en sådan investering utvecklas för att kunna beräkna detta.
APA, Harvard, Vancouver, ISO, and other styles
10

Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.

Full text
Abstract:
The classifier discussed in this thesis considers the path traversed by an email (instead of its content) and reputation of the relays, features inaccessible to spammers. Groups of spammers and individual behaviors of a spammer in a given domain were analyzed to yield association patterns, which were then used to identify similar spammers. Unsolicited and phishing emails were successfully isolated from legitimate emails, using analysis results. Spammers and phishers are also categorized into serial spammers/phishers, recent spammers/phishers, prospective spammers/phishers, and suspects. Legitimate emails and trusted domains are classified into socially close (family members, friends), socially distinct (strangers etc), and opt-outs (resolved false positives and false negatives). Overall this classifier resulted in far less false positives when compared to current filters like SpamAssassin, achieving a 98.65% precision, which is well comparable to the precisions achieved by SPF, DNSRBL blacklists.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Attack Path"

1

Operations, United States Congress House Committee on Government. Navy's seawolf attack submarine is proceeding along a path of high technical and financial risks: Thirty-fifth report. Washington: U.S. G.P.O., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Impey, Rose. Pirate Patch and the black bonnet attack. London: Orchard, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Corporation, Port Authority Trans-Hudson, ed. Draft scope: Permanent World Trade Center PATH terminal : environmental impact statement. New York, N.Y.]: [The Port Authority of NY & NJ], 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kostera, Monika. The University of Hope. Oxford: Oxford University Press, 2024. http://dx.doi.org/10.1093/9780191996948.001.0001.

Full text
Abstract:
Abstract Is the university as we know it dead? Monika Kostera thinks not, but across the globe universities are under attack, be it by external forces or from within. Will they survive? Our civilization requires that they must: planetary survival and sustainability depend on them. This book provides vital resources to give us all—professional academics, students, and university administrators—hope that universities will emerge renewed out of the current crisis. It inspires all of us to practice, collectively and consciously, academic virtues: kindness, diligence, patience, temperance, chaste desire, humility, and collegiality. These virtues can help reduce some of the detrimental aspects of a prevalent culture of vice, conflict, and violence that we witness, experience, and are complicit in, both within our universities and beyond. As the book shows, the practice of academic virtues can enable us to cultivate awareness of the common good that academia serves: the preservation and development of humanity’s potential of knowledge. Drawing on a rich variety of ideas, theories, empirical cases, real and fictitious stories, as well as examples and images from art and literature, Monika Kostera demonstrates the splendid complexity of academic ecosystems. It is through looking for hope for the university that we find hope for society and the planet. The two are inextricably linked: you cannot have one without the other! In suggesting tangible steps for restoring a sense of meaning to academic work and the collegial community worldwide, The University of Hope shows us a path out of the darkness.
APA, Harvard, Vancouver, ISO, and other styles
5

1530-1610, Scupoli Lorenzo, ed. Spiritual combat: How to win your spiritual battles and attain inner peace ; plus, Interior peace : the path to paradise. Manchester, N.H: Sophia Institute Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

DeMaria, Rusel, and Zach Meston. Sega Genesis Secrets, Volume 2. Rocklin, CA: Prima Publishing, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. New York: Bantam Books, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Olson, R. M. Attack Path: A space opera adventure. RM Olson, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thomson, Miller. Path: ANXIETY and PANIC ATTACK ELIMINATION PROGRAM. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The Way to a Healthy Heart: The Zero Heart Attack Path. Penguin Global, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Attack Path"

1

Salfer, Martin. "Single-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks, 131–55. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Salfer, Martin. "Multi-Path Attack Graph Algorithm." In Automotive Security Analyzer for Exploitability Risks, 157–207. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gonda, Tom, Rami Puzis, and Bracha Shapira. "Scalable Attack Path Finding for Increased Security." In Lecture Notes in Computer Science, 234–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kavallieratos, Georgios, and Sokratis Katsikas. "Attack Path Analysis for Cyber Physical Systems." In Computer Security, 19–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Snapshots: A Sample Path Based Source Estimator." In Malicious Attack Propagation and Source Identification, 79–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ducousso, Soline, Sébastien Bardin, and Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis." In Programming Languages and Systems, 59–89. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.

Full text
Abstract:
AbstractMany program analysis tools and techniques have been developed to assess program vulnerability. Yet, they are based on the standard concept of reachability and represent an attacker able to craft smart legitimate input, while in practice attackers can be much more powerful, using for instance micro-architectural exploits or fault injection methods. We introduce adversarial reachability, a framework allowing to reason about such advanced attackers and check whether a system is vulnerable or immune to a particular attacker. As equipping the attacker with new capacities significantly increases the state space of the program under analysis, we present a new symbolic exploration algorithm, namely adversarial symbolic execution, injecting faults in a forkless manner to prevent path explosion, together with optimizations dedicated to reduce the number of injections to consider while keeping the same attacker power. Experiments on representative benchmarks from fault injection show that our method significantly reduces the number of adversarial paths to explore, allowing to scale up to 10 faults where prior work timeout for 3 faults. In addition, we analyze the well-tested WooKey bootloader, and demonstrate the ability of our analysis to find attacks and evaluate countermeasures in real-life security scenarios. We were especially able to find an attack not mentioned in a previous patch.
APA, Harvard, Vancouver, ISO, and other styles
7

Rao, Yu, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, and Jinghua Bai. "Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network." In Communications in Computer and Information Science, 97–114. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_8.

Full text
Abstract:
AbstractIn recent years, a large number of users continuously suffer from DDoS attacks. DDoS attack volume is on the rise and the scale of botnets is also getting larger. Many security organizations began to use data-driven approaches to investigate gangs and groups beneath DDoS attack behaviors, trying to unveil the facts and intentions of DDoS gangs. In this paper, DDoSAGD - a DDoS Attack Group Discovery framework is proposed to help gang recognition and situation awareness. A heterogeneous graph is constructed from botnet control message and relative threat intelligence data, and a meta path-based similarity measurement is set up to calculate relevance between C2 servers. Then two graph mining measures are combined to build up our hierarchical attack group discovery workflow, which can output attack groups with both behavior-based similarity and evidence-based relevance. Finally, the experimental results demonstrate that the designed models are promising in terms of recognition of attack groups, and evolution process of different attack groups is also illustrated.
APA, Harvard, Vancouver, ISO, and other styles
8

Fiazza, Maria-Camilla, Michele Peroli, and Luca Viganò. "Attack Interference: A Path to Defending Security Protocols." In E-Business and Telecommunications, 296–314. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35755-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Idika, Nwokedi, and Bharat Bhargava. "A Kolmogorov Complexity Approach for Measuring Attack Path Complexity." In IFIP Advances in Information and Communication Technology, 281–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21424-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shosha, Ahmed F., Joshua I. James, and Pavel Gladyshev. "A Novel Methodology for Malware Intrusion Attack Path Reconstruction." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 131–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack Path"

1

Lu, Ziang, Lu Chen, Yong Li, Guangxin Guo, and Tengyan Wang. "Attack Path Extraction based on VGAE and DBSCAN." In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 9–14. IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Zijin, Minrui Fei, Yao Xiong, and Aimin Wang. "Dynamic Attack Path Prediction and Visualization for Industrial Cyber-Physical Systems Under Cyber Attacks." In 2024 43rd Chinese Control Conference (CCC), 9005–10. IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yadav, Mukesh, and Peter J. Hawrylak. "An Empirical Study on Analyzing the Evidence-Based Method in Attack Path Detection." In 2024 Resilience Week (RWS), 1–6. IEEE, 2024. https://doi.org/10.1109/rws62797.2024.10799307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, Jingbo Zhou, Kimia Zamiri Azar, Farimah Farahmandi, and Mark Tehranipoor. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024, 332–41. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.

Full text
Abstract:
Abstract A system-in-package (SiP) design takes advantage of cutting-edge packaging technology and heterogeneous integration (HI) in response to the growing need for aggressive time-to-market, high-performance, less expensive, and smaller systems. However, aggregating dies with different functionalities introduces new attack vectors with fault-injection attacks (FIA) that can effectively alter a circuit's data and control flow maliciously to cause disruptions of secure communication or sensitive information leakage. Additionally, traditional threat models associated with FIA on a 2D monolithic system-on-chip (SoC), and the corresponding mitigation techniques may not be compatible with modern 2.5D and 3D SiP architectures. To address these limitations, we propose system-aware fault injection attack detection for SiP architectures (SYSFID), a real-time and on-chip sensor-based fault monitoring approach integrated into a system-level design. SYSFID detects any fault-induced anomalous alterations in path delays of the components of inter-chiplet networks by strategically placing on-chip fault-to-time converter (FTC) sensors and controlling them efficiently to safeguard overall system security. To demonstrate the effectiveness of SYSFID, we detect several fault injection attempts on the FPGA implementation of a network-on-chip (NoC) based architecture during secure network packet transfers. Our experiments also illustrate that the SYSFID framework reliably senses both global and local FIAs with minimal overheads.
APA, Harvard, Vancouver, ISO, and other styles
5

Malpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction." In Vertical Flight Society 73rd Annual Forum & Technology Display, 1–15. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.

Full text
Abstract:
This paper presents an acoustics parametric study of the effect of varying lateral and longitudinal rotor trim flapping angles (tip-path-plane tilt) on noise radiated by an isolated 26-ft diameter proprotor, similar to that of the AW609 tiltrotor, in edgewise flight. Three tip-path-plane angle of attack operating conditions of -9, 0 and 6 deg, at 80 knots, were investigated. Results showed that: 1) minimum noise was attained for the tip-path-plane angle of attack value of -9 deg, and 2) changing the cyclic trim state (i.e., controls) altered the airloads and produced noticeable changes to the low-frequency (LF) and blade-vortex interaction (BVI) radiated-noise magnitude and directionality. In particular, by trimming the rotor to a positive (inboard) lateral flapping angle of 4 deg, further reductions up to 3 dB in the low-frequency noise sound pressure level were attained without significantly impacting the BVI noise for longitudinal tip-path-plane angles of -9 and 6 deg.
APA, Harvard, Vancouver, ISO, and other styles
6

Subaşi, Engin, and Muharrem Mercımek. "Attack Path Analysis and Security Concept Design for OTA Enabled Electric Power Steering System." In 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), 1–7. IEEE, 2024. https://doi.org/10.1109/asyu62119.2024.10756981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stelte, Bjorn. "ISP traceback - Attack path detection." In 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, 2013. http://dx.doi.org/10.1109/cns.2013.6682728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Biqiong, Yanhua Liu, Shijin Li, and Xiaoling Gao. "Attack Intent Analysis Method Based on Attack Path Graph." In ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3371676.3371680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Shijin, Minchen Zhu, and Yanbin Qiu. "Attack Intent Analysis Method Based on Attack Path Graph." In the 8th International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3290480.3290502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Tianjiaojiao, Huixiang Zhang, Tianluo Liu, and Renjie Li. "Research on Cyber Attack Modeling and Attack Path Discovery." In 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis (CMSDA). IEEE, 2022. http://dx.doi.org/10.1109/cmsda58069.2022.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack Path"

1

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, October 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report analyzes photographic, video, and written documentation from the incident to evaluate the timeline of the incident and to assess the fire conditions present. Computer modeling using the Fire Dynamics Simulator (FDS) was performed to provide further insight into the fire conditions and the impact of decisions and actions on the fire ground. Additionally, data from a full scale fire test of a similar fire in a similar structure was used to provide additional insight. Four FDS simulations were performed in support of the analysis. These included a simulation of the event as it unfolded and three simulations looking at the impact of alternate tactics which included: initial exterior attack prior to entry, the use of a smoke curtain to protect the building exit path, and interior only attack. FDS simulations provided insight on the heat present in the apartment during the fire and the impact of the interior and exterior suppression on conditions inside the apartment. Full scale test data of a similar fire showed similar behavior to the FDS predictions and gives credence to the FDS results. Results of the analysis suggest that injuries resulted from the length of time the interior attack team was present inside the apartment before actions were taken to reduce the severity of the fire. Six contributing factors were identified including size-up, communication and accountability, delayed exterior attack, lack of entry hall protection, the apartment layout and construction, thermal imager use, and mayday procedures and training. The last contributing factor was a positive contribution that helped avoid more serious injuries. Based on the contributing factors, five recommendations were made that include improved size-up, exterior fire control to prevent exterior spread, protection of exit pathways, basing fire ground tactics on known information, and recognizing when a change in tactics is needed.
APA, Harvard, Vancouver, ISO, and other styles
2

Ghosh, Anup, Steve Noel, and Sushil Jajodia. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference. Fort Belvoir, VA: Defense Technical Information Center, August 2011. http://dx.doi.org/10.21236/ada563714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kránitz, Péter Pál. Georgia’s EU-Accession Path in Light of the “Foreign Agent Law” and Hungary’s EU-Presidency. Magyar Külügyi Intézet, 2024. http://dx.doi.org/10.47683/kkielemzesek.ke-2024.17.

Full text
Abstract:
In May 2024, the Georgian parliament adopted the law known as the “foreign agent law”, which was followed by a barrage of Western attacks on the Georgian ruling party. The US imposed sanctions on Georgian Dream parliamentarians and Germany effectively froze Georgia’s EU accession. The Hungarian government, on the other hand, has expressed its support for the Tbilisi administration and vetoed a unified EU statement of condemnation on Georgia. However, even the Presidency of the EU Council is not enough to launch accession negotiations, thus Budapest can only offer alternative support to the EU aspiring state.
APA, Harvard, Vancouver, ISO, and other styles
4

Prahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), November 2014. http://dx.doi.org/10.2172/1220378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prahl, D., and M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), November 2014. http://dx.doi.org/10.2172/1164104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius, and Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, August 2022. http://dx.doi.org/10.15388/cibersek.2022.

Full text
Abstract:
This work aims to prepare the first Lithuanian cyber competence map together with recommendations on how to attract specialists to the CS sector and how to advance their competencies. During the research phase, we explored the demand for CS specialists in Lithuania and the world, surveyed the opinions of CS professionals, management and specialists from private and public sector organizations, including national defence sector. Also, we determined the career path of the specialists, analysed job offers, distinguished work roles, and gathered findings and recommendations from scientific research papers and similar reports of other countries. The results of the work include a publicly available database of collected data, expert findings of the research and recommendations for stakeholders, and a submitted scientific article to promote the results.
APA, Harvard, Vancouver, ISO, and other styles
7

Weinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/nevx1787.

Full text
Abstract:
As research continues into how fire department interventions affect fire dynamics in the modern fire environment; questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies may not support current, experienced-based practices. This gap between the research to date and the fire ground suppression experience has driven the need for further study. Therefore, research into the various methods of fire attack will allow a broader understanding of how firefighter interventions on the fire ground can impact the outcome of both life safety and property protection. This study will build upon the fire research conducted to date by analyzing how firefighting tactics, specifically different fire suppression tools and tactics, affect the thermal exposure and survivability of both firefighters and building occupants and affect fire behavior in structures. The purpose of this study is to improve firefighter safety, fireground tactics, and the knowledge of fire dynamics by providing the fire service with scientific information, developed from water flow and full-scale fire testing, in representative single-family homes. The project will be comprised of 3 parts: • Part I: Water Distribution • Part II: Air Entrainment • Part III: Full-Scale Residential Fire Experiments This report details the results and analysis from the water distribution experiments. These tests were conducted without the presence of fire to gain a fundamental understanding of water flows into compartments. Each test was designed to quantify water distribution within a compartment by evaluating the differences caused by various application methods, hose stream types, nozzle movements, pressures/flow rates, stream locations and elevation angles.
APA, Harvard, Vancouver, ISO, and other styles
8

Madrzykowski, Daniel. Firefighter Equipment Operational Environment: Evaluation of Thermal Conditions. UL Firefighter Safety Research Institute, August 2017. http://dx.doi.org/10.54206/102376/igfm4492.

Full text
Abstract:
The goal of this study was to review the available literature to develop a quantitative description of the thermal conditions firefighters and their equipment are exposed to in a structural fire environment. The thermal exposure from the modern fire environment was characterized through the review of fire research studies and fire-ground incidents that provided insight and data to develop a range of quantification. This information was compared with existing standards for firefighting protective equipment to generate a sense of the gap between known information and the need for improved understanding. The comparison of fire conditions with the thermal performance requirements of firefighter protective gear and equipment demonstrates that a fire in a compartment can generate conditions that can fail the equipment that a firefighter wears or uses. The review pointed out the following: 1. The accepted pairing of gas temperature ranges with a corresponding range of heat fluxes does not reflect all compartment fire conditions. There are cases in which the heat flux exceeds the hazard level of the surrounding gas temperature. 2. Thermal conditions can change within seconds. Experimental conditions and incidents were identified in which firefighters would be operating in thermal conditions that were safe for operation based on the temperature and heat flux, but then due to a change in the environment the firefighters would be exposed to conditions that could exceed the protective capabilities of their PPE. 3. Gas velocity is not explicitly considered within the thermal performance requirements. Clothing and equipment tested with a hot air circulating (convection) oven are exposed to gas velocities that measure approximately 1.5 m/s (3 mph). In contrast, the convected hot gas flows within a structure fire could range from 2.3 m/s (5 mph) to 7.0 m/s (15 mph). In cases where the firefighter or equipment would be located in the exhaust portion of a flow path, while operating above the level of the fire, the hot gas velocity could be even higher. This increased hot gas velocity would serve to increase the convective heat transfer rate to the equipment and the firefighter, thereby reducing the safe operating time within the structure. 4. Based on the limited data available, it appears currently available protective clothing enables firefighters to routinely operate in conditions above and beyond the "routine" conditions measured in the fire-ground exposure studies conducted during the 1970s. The fire service and fire standards communities could benefit from an improved understanding of: • real world fire-ground conditions, including temperatures, heat flux, pressure, and chemical exposures; • the impact of convection on the thermal resistance capabilities of firefighting PPE and equipment; and • the benefits of balancing the thermal exposures (thermal performance requirements) across different components of firefighter protective clothing and safety equipment. Because it is unlikely due to trade offs in weight, breathe-ability, usability, cost, etc., that fireproof PPE and equipment will ever be a reality, fire officers and fire chiefs need to consider the capabilities of the protection that their firefighters have when determining fire attack strategies and tactics to ensure that the PPE and equipment is kept within its design operating environment, and that the safety buffer it provides is maintained.
APA, Harvard, Vancouver, ISO, and other styles
9

Weinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/gmax3657.

Full text
Abstract:
As research continues into how fire department interventions affect fire dynamics in the modern fire environment, questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies did not support current, experience-based practices. This gap between the research to date and the fire ground suppression experience has driven the need for further study. This study will build upon the fire research conducted to date by analyzing how firefighting tactics, specifically different fire suppression tools and tactics, affect the thermal exposure and survivability of both firefighters and building occupants and affect fire behavior in structures. The purpose of this study is to improve firefighter safety, fire ground tactics, and the knowledge of fire dynamics by providing the fire service with scientific information, developed from water flow and full-scale fire testing, in representative single-family homes. This study will build and expand upon the fire research conducted to date by analyzing how firefighting tactics, specifically suppression methods, affect the thermal exposure and survivability of both firefighters and building occupants in addition to impacting fire behavior in structures. The purpose of this study is to improve firefighter safety, fireground tactics, and the knowledge of fire dynamics by providing the fire service with credible scientific information, developed from both water flow and full-scale fire testing, in representative single family homes. The project is comprised of 3 parts: • Part I: Water Distribution • Part II: Air Entrainment • Part III: Full-Scale Residential Fire Experiments This report details the results and analysis from the air entrainment testing. These tests were conducted without the presence of fire to gain a fundamental understanding of how hose streams entrain air. Each set of experiments was intended to add to the understanding of air entrainment and pressure from fire service hose streams by evaluating the differences caused by various application methods, hose stream types, nozzle movements, pressures/flow rates, manufacturers, and ventilation configurations.
APA, Harvard, Vancouver, ISO, and other styles
10

Hausmann, Ricardo, Andrés Rodríguez-Clare, and Dani Rodrik. Towards a Strategy for Economic Growth in Uruguay. Inter-American Development Bank, February 2005. http://dx.doi.org/10.18235/0008722.

Full text
Abstract:
The Uruguayan economy is recovering from the 2002 financial crisis that disrupted its banking system, caused a collapse of its currency and seriously affected its fiscal solvency. The crisis was clearly associated with the collapse of the Argentine economy and its concomitant currency, banking and debt crises. Both were also related to the sudden stop that followed the Russian crisis of 1998, which prompted an important realignment of the real in January 1999, a fact that had exerted enormous pressure on bilateral exchange rates within Mercosur. In this post-crisis period, Uruguay now faces several challenges to attain a sustainable growth path. This report proposes a series of recommendations towards this end. Implementing a strategy to accelerate growth inevitably involves interventions at both the macro and the micro level. The macro level involves the maintenance of a stable and competitive real exchange rate, so as to create a stable and encouraging environment for export growth. The authors take up each of these elements of the growth strategy. They first focus on the design of incentive policies for economic diversification and promotion. Then they discuss next the macroeconomic complements, with special emphasis on maintaining a competitive and stable real exchange rate.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography