Academic literature on the topic 'Perimeter defense'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Perimeter defense.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Perimeter defense"
Wallace, Tom. "Optimize Perimeter Defense for Utility Security." Opflow 43, no. 5 (May 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.
Full textAndriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS." Health and Ecology Issues, no. 1 (March 28, 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.
Full textCrawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers, and J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria." Proceedings of the National Academy of Sciences 109, no. 27 (June 18, 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.
Full textDaly-Grafstein, Daniel, and Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA." Journal of Sports Analytics 6, no. 4 (January 7, 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.
Full textKim, Kwon-il, Yeon-seung Ryu, and Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter." Korean Journal of Industry Security 11, no. 1 (April 30, 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.
Full textChen, S., and Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks." IEEE Transactions on Parallel and Distributed Systems 16, no. 6 (June 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.
Full textShishika, Daigo, James Paulos, and Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games." IEEE Robotics and Automation Letters 5, no. 2 (April 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.
Full textEdwards, Paul M., and Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter." Journal of Military History 62, no. 4 (October 1998): 960. http://dx.doi.org/10.2307/120234.
Full textAl-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.
Full textSteingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (April 3, 2021): 597. http://dx.doi.org/10.3390/sym13040597.
Full textDissertations / Theses on the topic "Perimeter defense"
Lin, Kung-Sung, and 林坤松. "Fiber-Optic Multi-Defense-Area Perimeter Intrusion Detection System With Laser Cavity and Michelson Interferometer Configured in Each Defensed Area." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mc2q3c.
Full text國立清華大學
光電工程研究所
105
In this paper, we propose a perimeter intrusion detection system which uses Michelson interferometers. This system has four defense zone and each zone employs a specified wavelength to detect intrusion. The goal of this paper is trying to find the thresholds at different weathers and situations. We preset three thresholds to decide whether the disturbance is intrusion or not. When the disturbance occurs and the detected signal meets the conditions for intrusion, the proposed algorithm triggers an alarm. In other words, if we want to reduce false alarm rate effectively, we just need to preset the right thresholds at first.
Books on the topic "Perimeter defense"
Fighting on the brink: Defense of the Pusan Perimeter. Paducah, KY: Turner Pub., 1996.
Find full textWeaver, Randy. Guide to tactical perimeter defense: Becoming a security network specialist. Australia: Thomson/Course Technology, 2008.
Find full textGuide to Tactical Perimeter Defense. Course Technology, 2007.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Taylor & Francis Group, 2003.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Find full textRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.
Find full textTactical Perimeter Defense (SCP SC0-451) LATEST EXAMINATION QUESTIONS. Independently Published, 2020.
Find full textEnt, Uzal W. Fighting on the Brink: Defense of the Pusan Perimeter. Turner Publishing Company (KY), 1997.
Find full textBook chapters on the topic "Perimeter defense"
Shishika, Daigo, and Vijay Kumar. "A Review of Multi Agent Perimeter Defense Games." In Lecture Notes in Computer Science, 472–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_26.
Full textChen, Austin K., Douglas G. Macharet, Daigo Shishika, George J. Pappas, and Vijay Kumar. "Optimal Multi-robot Perimeter Defense Using Flow Networks." In Distributed Autonomous Robotic Systems, 282–93. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92790-5_22.
Full textAdler, Aviv, Oscar Mickelin, Ragesh K. Ramachandran, Gaurav S. Sukhatme, and Sertac Karaman. "The Role of Heterogeneity in Autonomous Perimeter Defense Problems." In Algorithmic Foundations of Robotics XV, 115–31. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21090-7_8.
Full textTanimoto, Shigeaki, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, and Atsushi Kanai. "Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines." In Advances in Networked-based Information Systems, 413–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_39.
Full textJenkinson, A. J. "Digital Perimeter Defences." In Digital Blood on Their Hands, 53–60. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-9.
Full textJenkinson, A. J. "Perimeter Defence Theory in Context." In Digital Blood on Their Hands, 153–54. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-24.
Full textNa, Won Shik, Jeom Goo Kim, and Intae Ryoo. "Perimeter Defence Policy Model of Cascade MPLS VPN Networks." In Computational Science and Its Applications – ICCSA 2004, 1026–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_115.
Full textKizza, Joseph, and Florence Migga Kizza. "Perimeter Defense; The Firewall." In Securing the Information Infrastructure, 209–38. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-379-1.ch011.
Full text"Defining the Defense Perimeter." In The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.2307/j.ctv1vbd1b7.8.
Full text"4 Defining the Defense Perimeter." In The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.12987/9780300262643-006.
Full textConference papers on the topic "Perimeter defense"
Lee, Elijah S., Daigo Shishika, and Vijay Kumar. "Perimeter-defense Game between Aerial Defender and Ground Intruder." In 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020. http://dx.doi.org/10.1109/cdc42340.2020.9304213.
Full textBajaj, Shivam, Eric Torng, and Shaunak D. Bopardikar. "Competitive Perimeter Defense on a Line." In 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9483308.
Full textBajaj, Shivam, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia, and David W. Casbeer. "Competitive Perimeter Defense of Conical Environments." In 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022. http://dx.doi.org/10.1109/cdc51059.2022.9993007.
Full textBlackmon, F., and J. Pollock. "Blue Rose perimeter defense and security system." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.664409.
Full textGuerrero-Bonilla, Luis, Carlos Nieto-Granda, and Magnus Egerstedt. "Robust Perimeter Defense using Control Barrier Functions." In 2021 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). IEEE, 2021. http://dx.doi.org/10.1109/mrs50823.2021.9620572.
Full textSmith III, James F. "Perimeter intrusion detection and intruder classification." In SPIE Defense, Security, and Sensing, edited by Ivan Kadar. SPIE, 2009. http://dx.doi.org/10.1117/12.819895.
Full textForrai, David P., John W. Devitt, Thomas C. Back, William J. Rogers, and Steven M. Gaulding. "EO/IR sensor performance for site perimeter security." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.604440.
Full textMacharet, Douglas G., Austin K. Chen, Daigo Shishika, George J. Pappas, and Vijay Kumar. "Adaptive Partitioning for Coordinated Multi-agent Perimeter Defense." In 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2020. http://dx.doi.org/10.1109/iros45743.2020.9341417.
Full textShishika, Daigo, and Vijay Kumar. "Local-game Decomposition for Multiplayer Perimeter-defense Problem." In 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8618879.
Full textMattikalli, Raju, Roman Fresnedo, Paul Frank, Summer Locke, and Zack Thunemann. "Optimal Sensor Selection and Placement for Perimeter Defense." In 2007 IEEE International Conference on Automation Science and Engineering. IEEE, 2007. http://dx.doi.org/10.1109/coase.2007.4341848.
Full textReports on the topic "Perimeter defense"
Riendeau, John, and Juergen Keil. Undersea Perimeter Security Integrated Defense Environment (UPSIDE). Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada553240.
Full textNowowiejski, Dean A. Comrades in Arms: The Influence of George S. Patton on Walton H. Walker's Pusan Perimeter Defense. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada409925.
Full text