To see the other types of publications on this topic, follow the link: Distributed attacks.

Books on the topic 'Distributed attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 34 books for your research on the topic 'Distributed attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Brooks, Richard R., and İlker Özçelik. Distributed Denial of Service Attacks. Boca Raton : CRC Press, 2020.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Shui. Distributed Denial of Service Attack and Defense. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9491-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [New York, N.Y.?]: [publisher not identified], 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Rajeev, and Mangey Ram, eds. Distributed Denial of Service Attacks. De Gruyter, 2021. http://dx.doi.org/10.1515/9783110619751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Distributed Denial of Service Attacks. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Distributed Denial of Service (ddos) Attacks. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003107354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gupta, Brij B., and Amrita Dahiya. Distributed Denial of Service Attacks: Classification, Attacks, Challenges and Countermeasures. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ram, Mangey, and Rajeev Singh. Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ram, Mangey, and Rajeev Singh. Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Brooks, Richard, and İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ram, Mangey, and Rajeev Singh. Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions. de Gruyter GmbH, Walter, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Using Network Management Systems to Detect Distributed Denial of Service Attacks. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Distributed Denial of Service Attack and Defense. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yu, Shui. Distributed Denial of Service Attack and Defense. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks. Storming Media, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Government, U. S., Department of Defense, and U. S. Army. Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service Attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Distributed Functions of Emergency Management and Homeland Security: An Assessment of Professions Involved in Response to Disasters and Terrorist Attacks. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Distributed Functions of Emergency Management and Homeland Security: An Assessment of Professions Involved in Response to Disasters and Terrorist Attacks. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Distributed Functions of Emergency Management and Homeland Security: An Assessment of Professions Involved in Response to Disasters and Terrorist Attacks. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Department of Defense. Cyberterrorism after Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U. S. Infrastructure Vulnerabilities, Al-Qaeda Computer Capability, PC Attacks. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Department of Defense. Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace - Characterizing the Asymmetric Threat, Hacking, Antisatellite Capabilities, Distributed Denial-Of-Service (DDOS). Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kraska, James, and Raul Pedrozo. Disruptive Technology and the Law of Naval Warfare. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197630181.001.0001.

Full text
Abstract:
Disruptive technologies have transformed conflict at sea, creating a dynamic and distributed operational environment that extends from the oceans to encompass warfare on land, in the air, outer space, and cyberspace. Naval warfare throughout this integrated multi-domain, networked seascape raises choice of law decisions that include the law of naval warfare and the law of armed conflict; neutrality law; and the peacetime regimes that apply to the oceans, airspace, outer space, and cyberspace. The international law in networked naval warfare must contend with autonomous vessels and aircraft, artificial intelligence, and long-range precision strike missiles that can close the “kill chain” at sea and beyond. The asymmetrical use of merchant ships and blockchain shipping in naval operations, opening the seabed as a new dimension of undersea warfare, and sophisticated attacks against submarine cables and space satellites pose new operational and legal dilemmas. Navigating this broader conception of the international law of naval warfare requires an understanding of emerging operational capabilities and concepts throughout the spectrum of conflict and the selection and integration of distinct legal regimes.
APA, Harvard, Vancouver, ISO, and other styles
31

Sher, George. Doing Justice to Desert. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198801221.003.0005.

Full text
Abstract:
Does justice require that goods be distributed in accordance with people’s deserts? The claim that it does is appealing, but has been the target of many objections. The current paper first argues briefly against three of these familiar objections, but then introduces another objection that has more force. Given this new objection, we cannot plausibly say that what justice requires is that each person gets what he deserves. However, even if desert plays no role in structuring the distribution of options among persons, it may still enter by affecting the pay-offs that attach to the various options. The paper’s final section defends this proposal by arguing that it can plausibly be paired with each of four major approaches to justice.
APA, Harvard, Vancouver, ISO, and other styles
32

Government, U. S., U. S. Military, and Department of Defense. Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service , Resilience Management Model. Independently Published, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zuraw, Kie. Quantitative component interaction. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198778264.003.0006.

Full text
Abstract:
This chapter examines the phonological rule of nasal substitution in Tagalog, specifically its rate of application in different constructions. Nasal substitution can occur whenever a prefix that ends in /ŋ/ attaches to a stem beginning with an obstruent, as in /maŋ + bigáj/ → [mamigáj] ‘to distribute’. Different prefixes trigger nasal substitution at different rates. This is similar to cases in which word-internal syntactic structure determines how and whether a phonological rule applies (e.g. Newell and Piggott 2014), but different because none of these words’ syntactic structure absolutely prevents nasal substitution, such as by placing a phase boundary between the prefix and stem. The focus of the chapter is on laying out the data, but it does suggest three possible interpretations: variable syntactic structure, a phonology directly sensitive to prefix identity, or competition between productive syntactic structure and lexicalized pronunciation.
APA, Harvard, Vancouver, ISO, and other styles
34

Jones, Craig. The War Lawyers. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198842927.001.0001.

Full text
Abstract:
The War Lawyer s: The United States , Israel, and Juridical Warfare examines the laws of war as interpreted and applied by military lawyers to aerial targeting operations carried out by the US military in Iraq and Afghanistan, and the Israel Defense Force (IDF) in Gaza. Drawing on interviews with military lawyers and others, this book explains why some lawyers became integrated in the chain of command whereby military targets are identified and attacked, whether by manned aircraft, drones and/or ground forces, and with what results. The analysis shows how a series of political, legal, and technological developments have given rise to a targeting apparatus that requires legal input. In examining the effects of this process, the book argues that when lawyers render legal advice on targeting, they effectively put the indeterminacy of law in the service of producing and extending military violence, as well as constraining it. This is an iterative and ongoing law-making enterprise carried out in concert with the commanders whom lawyers advise. The provision of legal answers and options takes place in a highly routinized fashion under the overarching imperatives of mission success, and crucially, under pressures of time and emergent events in the battlespace. Military lawyers respond to intelligence data from widely distributed actors—but also inevitable gaps, errors, and misinterpretations in such data. The War Lawyers examines the mutual influence of US and Israeli targeting policies and shows just how important law and military lawyers have become in the conduct of contemporary warfare.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography