Libros sobre el tema "Attacks detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Attacks detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Buscar texto completoLi, Beibei, Rongxing Lu y Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58672-0.
Texto completoRaghavan, S. V. y E. Dawson, eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. India: Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
Texto completoK, Kokula Krishna Hari, ed. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Buscar texto completoCasola, Linda y Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Texto completoE, Dawson y SpringerLink (Online service), eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Buscar texto completoNelson A. Rockefeller Institute of Government., ed. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Buscar texto completoInstitute of Medicine (U.S.). Board on Health Sciences Policy, National Research Council (U.S.). Board on Chemical Sciences and Technology, National Research Council (U.S.). Board on Life Sciences y National Academies Press (U.S.), eds. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. Washington, D.C: National Academies Press, 2011.
Buscar texto completoSalem, Malek Ben. Towards Effective Masquerade Attack Detection. [New York, N.Y.?]: [publisher not identified], 2012.
Buscar texto completoWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante y Stan Z. Li. Multi-Modal Face Presentation Attack Detection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01824-4.
Texto completoWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante y Stan Z. Li. Advances in Face Presentation Attack Detection. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32906-7.
Texto completoStewin, Patrick. Detecting Peripheral-based Attacks on the Host Memory. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13515-1.
Texto completoPande, Sagar Dhanraj y Aditya Khamparia. Networks Attack Detection on 5G Networks using Data Mining Techniques. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281.
Texto completoill, Brunkus Denise, ed. The snack attack mystery. New York: Scholastic, 1995.
Buscar texto completoChevat, Richie. Shark attack. New York: Bantam Books, 1996.
Buscar texto completoK, kokula Krishna Hari, ed. Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Buscar texto completoBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Buscar texto completoJoanne, White, Mountain Pine Beetle Initiative (Canada) y Pacific Forestry Centre, eds. Detection of red attack stage mountain pine beetle infestation with high spatial resolution satellite imagery. Victoria, B.C: Canadian Forest Service, Pacific Forestry Centre, 2005.
Buscar texto completoill, Harpster Steve, ed. The slime attack. North Mankato, Minn: Capstone Stone Arch Books, 2013.
Buscar texto completoHaberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.
Buscar texto completoNiemann, K. O. Assessment of potential for remote sensing detection of bark beetle-infested areas during green attack: A literature review. Victoria, B.C: Natural Resources Canada, Canadian Forest Service, Pacific Forestry Centre, 2004.
Buscar texto completoBhattacharyya, Dhruba Kumar y Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Buscar texto completoBhattacharyya, Dhruba Kumar y Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Buscar texto completoDDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Buscar texto completoBrooks, Richard y Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Buscar texto completoBrooks, Richard y Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Buscar texto completoBrooks, Richard y İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Buscar texto completoBrooks, Richard y Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Buscar texto completoBrooks, Richard y Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Buscar texto completoLi, Beibei, Rongxing Lu y Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2020.
Buscar texto completoBusch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez y Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Buscar texto completoLi, Beibei, Rongxing Lu y Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2021.
Buscar texto completoBusch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez y Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Buscar texto completoGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy y B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Buscar texto completoGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy y B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Buscar texto completoMedicine, Institute of, Board on Chemical Sciences and Technology, Board on Health Sciences Policy, National Research Council y Board on Life Sciences. BioWatch and Public Health Surveillance : Evaluating Systems for the Early Detection of Biological Threats: Abbreviated Version. National Academies Press, 2011.
Buscar texto completoRaghavan, S. V. y E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Buscar texto completoRaghavan, S. V. y E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Buscar texto completoComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board y Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Buscar texto completoNational Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Buscar texto completoComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board y Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Buscar texto completoRuxton, Graeme D., William L. Allen, Thomas N. Sherratt y Michael P. Speed. Avoiding Attack. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.001.0001.
Texto completoRuxton, Graeme D., William L. Allen, Thomas N. Sherratt y Michael P. Speed. Advertising elusiveness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0009.
Texto completoPell, Stephanie K. Systematic Government Access to Private-Sector Data in the United States I. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0008.
Texto completoLi, Stan Z., Escalera, Jun Wan, Guodong Guo y Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Buscar texto completoLi, Stan Z., Escalera, Jun Wan, Guodong Guo y Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Buscar texto completoLi, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo y Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Buscar texto completoLi, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo y Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Springer International Publishing AG, 2020.
Buscar texto completoCassiman, David y Wouter Meersseman. Tyrosinemia Type I. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0013.
Texto completoSaxe, Joshua y Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Buscar texto completo