Academic literature on the topic 'Attack Resilience'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack Resilience.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack Resilience"
Podobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (November 2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.
Full textЛисенко, Сергій Миколайович, Вячеслав Сергійович Харченко, Кіра Юліївна Бобровнікова, and Роман Володимирович Щука. "РЕЗИЛЬЄНТНІСТЬ КОМП’ЮТЕРНИХ СИСТЕМ В УМОВАХ КІБЕРЗАГРОЗ: ТАКСОНОМІЯ ТА ОНТОЛОГІЯ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (January 28, 2020): 17–28. http://dx.doi.org/10.32620/reks.2020.1.02.
Full textHe, Yao, Yongchun Yang, Meimei Wang, and Xudong Zhang. "Resilience Analysis of Container Port Shipping Network Structure: The Case of China." Sustainability 14, no. 15 (August 2, 2022): 9489. http://dx.doi.org/10.3390/su14159489.
Full textIbrahim, Mariam, and Asma Alkhraibat. "Resiliency Assessment of Microgrid Systems." Applied Sciences 10, no. 5 (March 6, 2020): 1824. http://dx.doi.org/10.3390/app10051824.
Full textLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Full textChen, Mingyu, and Huapu Lu. "Analysis of Transportation Network Vulnerability and Resilience within an Urban Agglomeration: Case Study of the Greater Bay Area, China." Sustainability 12, no. 18 (September 9, 2020): 7410. http://dx.doi.org/10.3390/su12187410.
Full textAfrin, Tanzina, and Nita Yodo. "Resilience-Based Recovery Assessments of Networked Infrastructure Systems under Localized Attacks." Infrastructures 4, no. 1 (March 12, 2019): 11. http://dx.doi.org/10.3390/infrastructures4010011.
Full textYan, Shu, Shao Ting Tang, Sen Pei, Shi Jin Jiang, Wei Hua Li, Xian Teng, and Zhi Ming Zheng. "Resilience to Intentional Attacks of Complex Networks." Applied Mechanics and Materials 421 (September 2013): 647–51. http://dx.doi.org/10.4028/www.scientific.net/amm.421.647.
Full textYeboah-Ofori, Abel, Cameron Swart, Francisca Afua Opoku-Boateng, and Shareeful Islam. "Cyber resilience in supply chain system security using machine learning for threat predictions." Continuity & Resilience Review 4, no. 1 (February 9, 2022): 1–36. http://dx.doi.org/10.1108/crr-10-2021-0034.
Full textMennink, Bart, and Samuel Neves. "On the Resilience of Even-Mansour to Invariant Permutations." Designs, Codes and Cryptography 89, no. 5 (February 23, 2021): 859–93. http://dx.doi.org/10.1007/s10623-021-00850-2.
Full textDissertations / Theses on the topic "Attack Resilience"
Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Full textPh. D.
Klaus, Christian. "Network design for reliability and resilience to attack." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41406.
Full textWe define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy network arcs, and then (3) the defender operates the damaged network optimally by ending a shortest path. The solution identifies a network design that minimizes post-attack path length. We show how the tri-level problem is equivalent to a single-level mixed integer program (MIP) with an exponential number of rows and columns, and solve that MIP using simultaneous row and column generation. Methods extend to network operations denied through general now constructs. The second problem considers a stochastic logistics network where arcs are present randomly and independently. Shipping from a source to a destination may be delayed until a path connecting the two is available. In the presence of storage capacity, cargo can be shipped partway. The problem's solution identifies the storage locations that minimize the cargo's waiting time for shipment. We develop and demonstrate practical methods to solve this #P-complete problem on a model instance derived from a Department of Defense humanitarian shipping network.
Suraev, Maxim. "Denial-of-service attack resilience of the GSM access network." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13313.
Full textOguz, Saziye Deniz. "Protein Domain Networks: Analysis Of Attack Tolerance Under Varied Circumstances." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612518/index.pdf.
Full textCraft, LaMesha Lashal. "Perceived Threats to Food Security and Possible Responses Following an Agro-Terrorist Attack." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3289.
Full textBranlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Full textCerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textSociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
Capps, Hannah Patricia. "AFTER THE ATTACK: POLICE PERSPECTIVES ON PROMOTING RESILIENCY FOLLOWING THE 2015 SAN BERNARDINO ATTACK." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/853.
Full textFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Full textJevtić, Ana Ph D. Massachusetts Institute of Technology. "Cyber-attack detection and resilient state estimation in power systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127025.
Full textCataloged from the official PDF of thesis.
Includes bibliographical references (pages 99-108).
Many critical infrastructures, such as transportation and electric energy networks, and health care, are now becoming highly integrated with information and communication technology, in order to be more efficient and reliable. These cyber-physical systems (CPS) now face an increasing threat of cyber-attacks. Intelligent attackers can leverage their knowledge of the system, disruption, and disclosure resources to critically damage the system while remaining undiscovered. In this dissertation, we develop a defense strategy, with the ability to uncover malicious and intelligent attacks and enable resilient operation of cyber-physical systems. Specifically, we apply this defense strategy to power systems, described by linear frequency dynamics around the nominal operating point. Our methodology is based on the notion of data aggregation as a tool for extracting internal information about the system that may be unknown to the attacker. As the first step to resilience and security, we propose several methods for active attack detection in cyber-physical systems. In one approach we design a clustering-based moving-target active detection algorithm and evaluate it against stealthy attacks on the 5-bus and 24-bus power grids. Next, we consider an approach based on Interaction Variables (IntVar), as another intuitive way to extract internal information in power grids. We evaluate the eectiveness of this approach on Automatic Generation Control (AGC), a vital control mechanism in today's power grid. After an attack has been detected, mitigation procedures must be put in place to allow continued reliable operation or graceful degradation of the power grid. To that end, we develop a resilient state estimation algorithm, that provides the system operator with situational awareness in the presence of wide-spread coordinated cyber-attacks when many system measurements may become unavailable.
by Ana Jevtić.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Books on the topic "Attack Resilience"
E, Martin Courtney, ed. Survival and the strength of the human spirit from 9/11 survivors. New York: Dutton, 2011.
Find full textUnmeasured strength. New York: Henry Holt and Co., 2011.
Find full textBromfield, Richard. Living with the boogeyman: Helping your child cope with fear, terrorism, and living in a world of uncertainty. Roseville, CA: Prima Pub., 2002.
Find full textThe resilient homeland: How DHS intelligence should empower America to prepare for, prevent, and withstand terrorist attacks : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 15, 2008. Washington: U.S. G.P.O., 2008.
Find full textDepartment of Defense. 2017 Cyber Attack Deterrence: Defense Science Board Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U. S. Nuclear Weapons, Attribution. Independently Published, 2017.
Find full textGovernment, U. S., U. S. Military, and Department of Defense. Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service , Resilience Management Model. Independently Published, 2016.
Find full textFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Full textZou, Bo, Pooria Choobchian, and Julie Rozenberg. Cyber Resilience of Autonomous Mobility Systems: Cyber Attacks and Resilience-Enhancing Strategies. World Bank, Washington, DC, 2020. http://dx.doi.org/10.1596/1813-9450-9135.
Full textWatson, Daniel, and Henry Campbell. Emotional Intelligence 2. 0: 2 in 1 Social Anxiety Solution and Mental Toughness a Guide to Stop Fear, Stress, Anxiety, Panic Attack, Shyness, Low Self-Esteem. Build Your Resilience and Discover Stoicism. Independently Published, 2020.
Find full textDickens, Charles. Bleak House. Edited by Stephen Gill. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536313.001.0001.
Full textBook chapters on the topic "Attack Resilience"
Ganter, Sarah Anne, and Fernando Oliveira Paulino. "Between Attack and Resilience." In Digital Journalism in Latin America, 106–25. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003370383-7.
Full textIbrahim, Mariam, and Ahmad Alsheikh. "Determining Resiliency Using Attack Graphs." In Recent Developments on Industrial Control Systems Resilience, 117–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_6.
Full textShim, Hyungbo, Juhoon Back, Yongsoon Eun, Gyunghoon Park, and Jihan Kim. "Zero-Dynamics Attack, Variations, and Countermeasures." In Security and Resilience of Control Systems, 31–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0_2.
Full textLatif, Mohammad Ayub, Muhammad Naveed, and Faraz Zaidi. "Resilience of Social Networks under Different Attack Strategies." In Lecture Notes in Computer Science, 16–29. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03260-3_2.
Full textIbrahim, Mariam, Ahmad Alsheikh, and Qays Al-Hindawi. "Automatic Attack Graph Generation for Industrial Controlled Systems." In Recent Developments on Industrial Control Systems Resilience, 99–116. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_5.
Full textAhmad, H. M. Sabbir, Nader Meskin, and Mohammad Noorizadeh. "Cyber-Attack Detection for a Crude Oil Distillation Column." In Security and Resilience in Cyber-Physical Systems, 323–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97166-3_13.
Full textKhajenejad, Mohammad, and Sze Zheng Yong. "Resilient State Estimation and Attack Mitigation in Cyber-Physical Systems." In Security and Resilience in Cyber-Physical Systems, 149–85. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97166-3_7.
Full textRavikumar, Gelli, and Manimaran Govindarasu. "Machine Learning-Based and Physics-Based Attack Resilient Wide-Area Monitoring, Protection and Control Systems." In Security and Resilience of Control Systems, 203–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0_8.
Full textKumar, Abhishek, P. Shanthi Thilagam, Alwyn R. Pais, Vishwas Sharma, and Kunal M. Sadalkar. "Towards Evaluating Resilience of SIP Server under Low Rate DoS Attack." In Information Technology and Mobile Communication, 336–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20573-6_58.
Full textPungila, Ciprian, and Viorel Negru. "A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation." In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 3–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_1.
Full textConference papers on the topic "Attack Resilience"
Hill, Zachary, William M. Nichols, Mauricio Papa, John C. Hale, and Peter J. Hawrylak. "Verifying attack graphs through simulation." In 2017 Resilience Week (RWS). IEEE, 2017. http://dx.doi.org/10.1109/rweek.2017.8088649.
Full textSoule, Nathaniel, Borislava Simidchieva, Fusun Yaman, Ronald Watro, Joseph Loyall, Michael Atighetchi, Marco Carvalho, David Last, David Myers, and Bridget Flatley. "Quantifying & minimizing attack surfaces containing moving target defenses." In 2015 Resilience Week (RWS). IEEE, 2015. http://dx.doi.org/10.1109/rweek.2015.7287449.
Full textXie, Tian, Ting He, Patrick McDaniel, and Namitha Nambiar. "Attack Resilience of Cache Replacement Policies." In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications. IEEE, 2021. http://dx.doi.org/10.1109/infocom42981.2021.9488697.
Full textAshok, Aditya, Siddharth Sridhar, A. David McKinnon, Pengyuan Wang, and Manimaran Govindarasu. "Testbed-based performance evaluation of Attack Resilient Control for AGC." In 2016 Resilience Week (RWS). IEEE, 2016. http://dx.doi.org/10.1109/rweek.2016.7573319.
Full textGourisetti, Sri Nikhil Gupta, Michael Mylrea, Travis Ashley, Roger Kwon, Jerry Castleberry, Quinn Wright-Mockler, Penny McKenzie, and Geoffrey Brege. "Demonstration of the Cybersecurity Framework through Real-World Cyber Attack." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8971822.
Full textFoster, Rita, Zach Priest, and Michael Cutshaw. "Infrastructure eXpression for Codified Cyber Attack Surfaces and Automated Applicability." In 2021 Resilience Week (RWS). IEEE, 2021. http://dx.doi.org/10.1109/rws52686.2021.9611807.
Full textBiswas, Rajorshi, Jie Wu, and Avinash Srinivasan. "Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8972008.
Full textBiswas, Rajorshi, Jie Wu, and Yang Chen. "Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8972010.
Full textFard, Amin Y., Mohammad B. Shadmand, and Sudip K. Mazumder. "Holistic Multi-timescale Attack Resilient Control Framework for Power Electronics Dominated Grid." In 2020 Resilience Week (RWS). IEEE, 2020. http://dx.doi.org/10.1109/rws50334.2020.9241270.
Full textFalco, Gregory. "When Satellites Attack: Satellite-to-Satellite Cyber Attack, Defense and Resilience." In ASCEND 2020. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2020. http://dx.doi.org/10.2514/6.2020-4014.
Full textReports on the topic "Attack Resilience"
Nuqui, Reynaldo. Cyber Attack Resilient HVDC System (CARDS) (Final Scientific/Technical Report). Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1810571.
Full textGasparotto, Thatyanne, and Julia Ambrosano. Opportunities for Sustainable Infrastructure Investments at City Level in Brazil. Inter-American Development Bank, August 2020. http://dx.doi.org/10.18235/0002639.
Full textBelcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2022.2113.
Full textIn Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, March 2022. http://dx.doi.org/10.1061/infographic.000003.
Full textEXPERIMENTAL STUDY OF HYSTERETIC BEHAVIOR OF RESILIENT PREFABRICATED STEEL FRAMES WITH AND WITHOUT INTERMEDIATE COLUMNS. The Hong Kong Institute of Steel Construction, September 2022. http://dx.doi.org/10.18057/ijasc.2022.18.3.9.
Full text