Literatura académica sobre el tema "Perimeter defense"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Perimeter defense".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Perimeter defense"

1

Wallace, Tom. "Optimize Perimeter Defense for Utility Security". Opflow 43, n.º 5 (mayo de 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Andriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS". Health and Ecology Issues, n.º 1 (28 de marzo de 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.

Texto completo
Resumen
Objective : to determine the features of the changes of perimeter body sizes of male cadets in the conditions of the pedagogical process at a higher educational institution of I level of accreditation. Material and methods . We have conducted longitudinal (I, II, III years of study) determination of perimeter body sizes of 87 male cadets and analyzed the features of the changes in these parameters in the conditions of the pedagogical process during a three-year period. The analysis of the indicators was conducted using «Statistica», 6.1 (StatSoft) by parametric methods of assessment. Results. Based on the obtained data we have defined the characteristic features of the annual changes of the perimeter body parameters during the three-year period of study in conditions of the pedagogical process of a civil defense college. We have determined the increase dynamics of most of the average indicators throughout the period of study at the civil defense college, except for the perimeters of the neck, pelvis and abdomen, where the decrease of the sizes has been found. Conclusions. We have revealed reliable differences when comparing the annual changes of the perimeters of the pelvis, abdomen, thorax (during a breathing pause, inhale, exhale), the shoulder, forearm, hand, thigh, upper third of the leg, the instep of the foot. The annual changes of perimeter sizes of the neck, pelvis and abdomen in the male cadets during the second year of training were bigger than during the first one. The perimeter increase parameters of the chest (during a breathing pause, inhale, exhale), shoulder, forearm, wrist, hand, hip, upper and lower third of the leg, foot, the instep of foot in the male cadets dominated when they were in the first year of study.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Crawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers y J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria". Proceedings of the National Academy of Sciences 109, n.º 27 (18 de junio de 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Daly-Grafstein, Daniel y Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA". Journal of Sports Analytics 6, n.º 4 (7 de enero de 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.

Texto completo
Resumen
As 3-point shooting in the NBA continues to increase, the importance of perimeter defense has never been greater. Perimeter defenders are often evaluated by their ability to tightly contest shots, but how exactly does contesting a jump shot cause a decrease in expected shooting percentage, and can we use this insight to better assess perimeter defender ability? In this paper we analyze over 50,000 shot trajectories from the NBA to explain why, in terms of impact on shot trajectories, shooters tend to miss more when tightly contested. We present a variety of results derived from this shot trajectory data. Additionally, pairing trajectory data with features such as defender height, distance, and contest angle, we are able to evaluate not just perimeter defenders, but also shooters’ resilience to defensive pressure. Utilizing shot trajectories and corresponding modeled shot-make probabilities, we are able to create perimeter defensive metrics that are more accurate and less variable than traditional metrics like opponent field goal percentage.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kim, Kwon-il, Yeon-seung Ryu y Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter". Korean Journal of Industry Security 11, n.º 1 (30 de abril de 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Chen, S. y Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks". IEEE Transactions on Parallel and Distributed Systems 16, n.º 6 (junio de 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Shishika, Daigo, James Paulos y Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games". IEEE Robotics and Automation Letters 5, n.º 2 (abril de 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Edwards, Paul M. y Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter". Journal of Military History 62, n.º 4 (octubre de 1998): 960. http://dx.doi.org/10.2307/120234.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Al-Qassim, Mohammed A. y Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software". Iraqi Journal of Information & Communications Technology 1, n.º 2 (27 de julio de 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Texto completo
Resumen
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Steingartner, William, Darko Galinec y Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model". Symmetry 13, n.º 4 (3 de abril de 2021): 597. http://dx.doi.org/10.3390/sym13040597.

Texto completo
Resumen
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. This architecture leaves detection gaps that are difficult to fill with existing security controls not specifically designed for that role. Rather than using prevention alone, a strategy that attackers have consistently succeeded against, defenders are adopting a more balanced strategy that includes detection and response. Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. They also have some limitations because they are not designed to catch credential harvesting or attacks based on what appears as authorized access. They are also often seen as complex and prone to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Perimeter defense"

1

Lin, Kung-Sung y 林坤松. "Fiber-Optic Multi-Defense-Area Perimeter Intrusion Detection System With Laser Cavity and Michelson Interferometer Configured in Each Defensed Area". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mc2q3c.

Texto completo
Resumen
碩士
國立清華大學
光電工程研究所
105
In this paper, we propose a perimeter intrusion detection system which uses Michelson interferometers. This system has four defense zone and each zone employs a specified wavelength to detect intrusion. The goal of this paper is trying to find the thresholds at different weathers and situations. We preset three thresholds to decide whether the disturbance is intrusion or not. When the disturbance occurs and the detected signal meets the conditions for intrusion, the proposed algorithm triggers an alarm. In other words, if we want to reduce false alarm rate effectively, we just need to preset the right thresholds at first.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Perimeter defense"

1

Fighting on the brink: Defense of the Pusan Perimeter. Paducah, KY: Turner Pub., 1996.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Weaver, Randy. Guide to tactical perimeter defense: Becoming a security network specialist. Australia: Thomson/Course Technology, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Guide to Tactical Perimeter Defense. Course Technology, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Taylor & Francis Group, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Tactical Perimeter Defense (SCP SC0-451) LATEST EXAMINATION QUESTIONS. Independently Published, 2020.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Ent, Uzal W. Fighting on the Brink: Defense of the Pusan Perimeter. Turner Publishing Company (KY), 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Perimeter defense"

1

Shishika, Daigo y Vijay Kumar. "A Review of Multi Agent Perimeter Defense Games". En Lecture Notes in Computer Science, 472–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chen, Austin K., Douglas G. Macharet, Daigo Shishika, George J. Pappas y Vijay Kumar. "Optimal Multi-robot Perimeter Defense Using Flow Networks". En Distributed Autonomous Robotic Systems, 282–93. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92790-5_22.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Adler, Aviv, Oscar Mickelin, Ragesh K. Ramachandran, Gaurav S. Sukhatme y Sertac Karaman. "The Role of Heterogeneity in Autonomous Perimeter Defense Problems". En Algorithmic Foundations of Robotics XV, 115–31. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21090-7_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Tanimoto, Shigeaki, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato y Atsushi Kanai. "Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines". En Advances in Networked-based Information Systems, 413–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_39.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Jenkinson, A. J. "Digital Perimeter Defences". En Digital Blood on Their Hands, 53–60. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Jenkinson, A. J. "Perimeter Defence Theory in Context". En Digital Blood on Their Hands, 153–54. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-24.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Na, Won Shik, Jeom Goo Kim y Intae Ryoo. "Perimeter Defence Policy Model of Cascade MPLS VPN Networks". En Computational Science and Its Applications – ICCSA 2004, 1026–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_115.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Kizza, Joseph y Florence Migga Kizza. "Perimeter Defense; The Firewall". En Securing the Information Infrastructure, 209–38. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-379-1.ch011.

Texto completo
Resumen
As companies increasingly build private networks and connect them onto the Internet, securing such private networks has become a great concern. These networks are facing threats from two fronts: the external Internet and the users from within the company network. This requires security protocols that will effectively deal with these two fronts by first restricting access to the network from outside and controlling access between subnets from within. Ideal protocols to do such tasks are found in firewalls. A firewall is hardware, software, or a combination of both that monitors and filters traffic packets that attempt to either enter or leave the protected private network. It is a tool that separates a protected network or part of a network, and now increasingly a user’s personal computer (PC), from an unprotected network—the “bad network,” like the Internet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

"Defining the Defense Perimeter". En The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.2307/j.ctv1vbd1b7.8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

"4 Defining the Defense Perimeter". En The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.12987/9780300262643-006.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Perimeter defense"

1

Lee, Elijah S., Daigo Shishika y Vijay Kumar. "Perimeter-defense Game between Aerial Defender and Ground Intruder". En 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020. http://dx.doi.org/10.1109/cdc42340.2020.9304213.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Bajaj, Shivam, Eric Torng y Shaunak D. Bopardikar. "Competitive Perimeter Defense on a Line". En 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9483308.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bajaj, Shivam, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia y David W. Casbeer. "Competitive Perimeter Defense of Conical Environments". En 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022. http://dx.doi.org/10.1109/cdc51059.2022.9993007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Blackmon, F. y J. Pollock. "Blue Rose perimeter defense and security system". En Defense and Security Symposium, editado por Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.664409.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Guerrero-Bonilla, Luis, Carlos Nieto-Granda y Magnus Egerstedt. "Robust Perimeter Defense using Control Barrier Functions". En 2021 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). IEEE, 2021. http://dx.doi.org/10.1109/mrs50823.2021.9620572.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Smith III, James F. "Perimeter intrusion detection and intruder classification". En SPIE Defense, Security, and Sensing, editado por Ivan Kadar. SPIE, 2009. http://dx.doi.org/10.1117/12.819895.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Forrai, David P., John W. Devitt, Thomas C. Back, William J. Rogers y Steven M. Gaulding. "EO/IR sensor performance for site perimeter security". En Defense and Security, editado por Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.604440.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Macharet, Douglas G., Austin K. Chen, Daigo Shishika, George J. Pappas y Vijay Kumar. "Adaptive Partitioning for Coordinated Multi-agent Perimeter Defense". En 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2020. http://dx.doi.org/10.1109/iros45743.2020.9341417.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Shishika, Daigo y Vijay Kumar. "Local-game Decomposition for Multiplayer Perimeter-defense Problem". En 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8618879.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Mattikalli, Raju, Roman Fresnedo, Paul Frank, Summer Locke y Zack Thunemann. "Optimal Sensor Selection and Placement for Perimeter Defense". En 2007 IEEE International Conference on Automation Science and Engineering. IEEE, 2007. http://dx.doi.org/10.1109/coase.2007.4341848.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Perimeter defense"

1

Riendeau, John y Juergen Keil. Undersea Perimeter Security Integrated Defense Environment (UPSIDE). Fort Belvoir, VA: Defense Technical Information Center, noviembre de 2011. http://dx.doi.org/10.21236/ada553240.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Nowowiejski, Dean A. Comrades in Arms: The Influence of George S. Patton on Walton H. Walker's Pusan Perimeter Defense. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2001. http://dx.doi.org/10.21236/ada409925.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía