Academic literature on the topic 'Perimeter defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Perimeter defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Perimeter defense"

1

Wallace, Tom. "Optimize Perimeter Defense for Utility Security." Opflow 43, no. 5 (May 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS." Health and Ecology Issues, no. 1 (March 28, 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.

Full text
Abstract:
Objective : to determine the features of the changes of perimeter body sizes of male cadets in the conditions of the pedagogical process at a higher educational institution of I level of accreditation. Material and methods . We have conducted longitudinal (I, II, III years of study) determination of perimeter body sizes of 87 male cadets and analyzed the features of the changes in these parameters in the conditions of the pedagogical process during a three-year period. The analysis of the indicators was conducted using «Statistica», 6.1 (StatSoft) by parametric methods of assessment. Results. Based on the obtained data we have defined the characteristic features of the annual changes of the perimeter body parameters during the three-year period of study in conditions of the pedagogical process of a civil defense college. We have determined the increase dynamics of most of the average indicators throughout the period of study at the civil defense college, except for the perimeters of the neck, pelvis and abdomen, where the decrease of the sizes has been found. Conclusions. We have revealed reliable differences when comparing the annual changes of the perimeters of the pelvis, abdomen, thorax (during a breathing pause, inhale, exhale), the shoulder, forearm, hand, thigh, upper third of the leg, the instep of the foot. The annual changes of perimeter sizes of the neck, pelvis and abdomen in the male cadets during the second year of training were bigger than during the first one. The perimeter increase parameters of the chest (during a breathing pause, inhale, exhale), shoulder, forearm, wrist, hand, hip, upper and lower third of the leg, foot, the instep of foot in the male cadets dominated when they were in the first year of study.
APA, Harvard, Vancouver, ISO, and other styles
3

Crawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers, and J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria." Proceedings of the National Academy of Sciences 109, no. 27 (June 18, 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daly-Grafstein, Daniel, and Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA." Journal of Sports Analytics 6, no. 4 (January 7, 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.

Full text
Abstract:
As 3-point shooting in the NBA continues to increase, the importance of perimeter defense has never been greater. Perimeter defenders are often evaluated by their ability to tightly contest shots, but how exactly does contesting a jump shot cause a decrease in expected shooting percentage, and can we use this insight to better assess perimeter defender ability? In this paper we analyze over 50,000 shot trajectories from the NBA to explain why, in terms of impact on shot trajectories, shooters tend to miss more when tightly contested. We present a variety of results derived from this shot trajectory data. Additionally, pairing trajectory data with features such as defender height, distance, and contest angle, we are able to evaluate not just perimeter defenders, but also shooters’ resilience to defensive pressure. Utilizing shot trajectories and corresponding modeled shot-make probabilities, we are able to create perimeter defensive metrics that are more accurate and less variable than traditional metrics like opponent field goal percentage.
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Kwon-il, Yeon-seung Ryu, and Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter." Korean Journal of Industry Security 11, no. 1 (April 30, 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, S., and Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks." IEEE Transactions on Parallel and Distributed Systems 16, no. 6 (June 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shishika, Daigo, James Paulos, and Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games." IEEE Robotics and Automation Letters 5, no. 2 (April 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Edwards, Paul M., and Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter." Journal of Military History 62, no. 4 (October 1998): 960. http://dx.doi.org/10.2307/120234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Full text
Abstract:
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
APA, Harvard, Vancouver, ISO, and other styles
10

Steingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (April 3, 2021): 597. http://dx.doi.org/10.3390/sym13040597.

Full text
Abstract:
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. This architecture leaves detection gaps that are difficult to fill with existing security controls not specifically designed for that role. Rather than using prevention alone, a strategy that attackers have consistently succeeded against, defenders are adopting a more balanced strategy that includes detection and response. Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. They also have some limitations because they are not designed to catch credential harvesting or attacks based on what appears as authorized access. They are also often seen as complex and prone to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Perimeter defense"

1

Lin, Kung-Sung, and 林坤松. "Fiber-Optic Multi-Defense-Area Perimeter Intrusion Detection System With Laser Cavity and Michelson Interferometer Configured in Each Defensed Area." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mc2q3c.

Full text
Abstract:
碩士
國立清華大學
光電工程研究所
105
In this paper, we propose a perimeter intrusion detection system which uses Michelson interferometers. This system has four defense zone and each zone employs a specified wavelength to detect intrusion. The goal of this paper is trying to find the thresholds at different weathers and situations. We preset three thresholds to decide whether the disturbance is intrusion or not. When the disturbance occurs and the detected signal meets the conditions for intrusion, the proposed algorithm triggers an alarm. In other words, if we want to reduce false alarm rate effectively, we just need to preset the right thresholds at first.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Perimeter defense"

1

Fighting on the brink: Defense of the Pusan Perimeter. Paducah, KY: Turner Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weaver, Randy. Guide to tactical perimeter defense: Becoming a security network specialist. Australia: Thomson/Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guide to Tactical Perimeter Defense. Course Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Taylor & Francis Group, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tactical Perimeter Defense (SCP SC0-451) LATEST EXAMINATION QUESTIONS. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ent, Uzal W. Fighting on the Brink: Defense of the Pusan Perimeter. Turner Publishing Company (KY), 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Perimeter defense"

1

Shishika, Daigo, and Vijay Kumar. "A Review of Multi Agent Perimeter Defense Games." In Lecture Notes in Computer Science, 472–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Austin K., Douglas G. Macharet, Daigo Shishika, George J. Pappas, and Vijay Kumar. "Optimal Multi-robot Perimeter Defense Using Flow Networks." In Distributed Autonomous Robotic Systems, 282–93. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92790-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adler, Aviv, Oscar Mickelin, Ragesh K. Ramachandran, Gaurav S. Sukhatme, and Sertac Karaman. "The Role of Heterogeneity in Autonomous Perimeter Defense Problems." In Algorithmic Foundations of Robotics XV, 115–31. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21090-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tanimoto, Shigeaki, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, and Atsushi Kanai. "Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines." In Advances in Networked-based Information Systems, 413–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jenkinson, A. J. "Digital Perimeter Defences." In Digital Blood on Their Hands, 53–60. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jenkinson, A. J. "Perimeter Defence Theory in Context." In Digital Blood on Their Hands, 153–54. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Na, Won Shik, Jeom Goo Kim, and Intae Ryoo. "Perimeter Defence Policy Model of Cascade MPLS VPN Networks." In Computational Science and Its Applications – ICCSA 2004, 1026–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph, and Florence Migga Kizza. "Perimeter Defense; The Firewall." In Securing the Information Infrastructure, 209–38. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-379-1.ch011.

Full text
Abstract:
As companies increasingly build private networks and connect them onto the Internet, securing such private networks has become a great concern. These networks are facing threats from two fronts: the external Internet and the users from within the company network. This requires security protocols that will effectively deal with these two fronts by first restricting access to the network from outside and controlling access between subnets from within. Ideal protocols to do such tasks are found in firewalls. A firewall is hardware, software, or a combination of both that monitors and filters traffic packets that attempt to either enter or leave the protected private network. It is a tool that separates a protected network or part of a network, and now increasingly a user’s personal computer (PC), from an unprotected network—the “bad network,” like the Internet.
APA, Harvard, Vancouver, ISO, and other styles
9

"Defining the Defense Perimeter." In The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.2307/j.ctv1vbd1b7.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"4 Defining the Defense Perimeter." In The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.12987/9780300262643-006.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Perimeter defense"

1

Lee, Elijah S., Daigo Shishika, and Vijay Kumar. "Perimeter-defense Game between Aerial Defender and Ground Intruder." In 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020. http://dx.doi.org/10.1109/cdc42340.2020.9304213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bajaj, Shivam, Eric Torng, and Shaunak D. Bopardikar. "Competitive Perimeter Defense on a Line." In 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9483308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bajaj, Shivam, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia, and David W. Casbeer. "Competitive Perimeter Defense of Conical Environments." In 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022. http://dx.doi.org/10.1109/cdc51059.2022.9993007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blackmon, F., and J. Pollock. "Blue Rose perimeter defense and security system." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.664409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guerrero-Bonilla, Luis, Carlos Nieto-Granda, and Magnus Egerstedt. "Robust Perimeter Defense using Control Barrier Functions." In 2021 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). IEEE, 2021. http://dx.doi.org/10.1109/mrs50823.2021.9620572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith III, James F. "Perimeter intrusion detection and intruder classification." In SPIE Defense, Security, and Sensing, edited by Ivan Kadar. SPIE, 2009. http://dx.doi.org/10.1117/12.819895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Forrai, David P., John W. Devitt, Thomas C. Back, William J. Rogers, and Steven M. Gaulding. "EO/IR sensor performance for site perimeter security." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.604440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Macharet, Douglas G., Austin K. Chen, Daigo Shishika, George J. Pappas, and Vijay Kumar. "Adaptive Partitioning for Coordinated Multi-agent Perimeter Defense." In 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2020. http://dx.doi.org/10.1109/iros45743.2020.9341417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shishika, Daigo, and Vijay Kumar. "Local-game Decomposition for Multiplayer Perimeter-defense Problem." In 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8618879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mattikalli, Raju, Roman Fresnedo, Paul Frank, Summer Locke, and Zack Thunemann. "Optimal Sensor Selection and Placement for Perimeter Defense." In 2007 IEEE International Conference on Automation Science and Engineering. IEEE, 2007. http://dx.doi.org/10.1109/coase.2007.4341848.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Perimeter defense"

1

Riendeau, John, and Juergen Keil. Undersea Perimeter Security Integrated Defense Environment (UPSIDE). Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada553240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nowowiejski, Dean A. Comrades in Arms: The Influence of George S. Patton on Walton H. Walker's Pusan Perimeter Defense. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada409925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography