Literatura académica sobre el tema "Perimeter defense"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Perimeter defense".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Perimeter defense"
Wallace, Tom. "Optimize Perimeter Defense for Utility Security". Opflow 43, n.º 5 (mayo de 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.
Texto completoAndriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS". Health and Ecology Issues, n.º 1 (28 de marzo de 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.
Texto completoCrawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers y J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria". Proceedings of the National Academy of Sciences 109, n.º 27 (18 de junio de 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.
Texto completoDaly-Grafstein, Daniel y Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA". Journal of Sports Analytics 6, n.º 4 (7 de enero de 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.
Texto completoKim, Kwon-il, Yeon-seung Ryu y Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter". Korean Journal of Industry Security 11, n.º 1 (30 de abril de 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.
Texto completoChen, S. y Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks". IEEE Transactions on Parallel and Distributed Systems 16, n.º 6 (junio de 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.
Texto completoShishika, Daigo, James Paulos y Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games". IEEE Robotics and Automation Letters 5, n.º 2 (abril de 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.
Texto completoEdwards, Paul M. y Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter". Journal of Military History 62, n.º 4 (octubre de 1998): 960. http://dx.doi.org/10.2307/120234.
Texto completoAl-Qassim, Mohammed A. y Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software". Iraqi Journal of Information & Communications Technology 1, n.º 2 (27 de julio de 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.
Texto completoSteingartner, William, Darko Galinec y Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model". Symmetry 13, n.º 4 (3 de abril de 2021): 597. http://dx.doi.org/10.3390/sym13040597.
Texto completoTesis sobre el tema "Perimeter defense"
Lin, Kung-Sung y 林坤松. "Fiber-Optic Multi-Defense-Area Perimeter Intrusion Detection System With Laser Cavity and Michelson Interferometer Configured in Each Defensed Area". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mc2q3c.
Texto completo國立清華大學
光電工程研究所
105
In this paper, we propose a perimeter intrusion detection system which uses Michelson interferometers. This system has four defense zone and each zone employs a specified wavelength to detect intrusion. The goal of this paper is trying to find the thresholds at different weathers and situations. We preset three thresholds to decide whether the disturbance is intrusion or not. When the disturbance occurs and the detected signal meets the conditions for intrusion, the proposed algorithm triggers an alarm. In other words, if we want to reduce false alarm rate effectively, we just need to preset the right thresholds at first.
Libros sobre el tema "Perimeter defense"
Fighting on the brink: Defense of the Pusan Perimeter. Paducah, KY: Turner Pub., 1996.
Buscar texto completoWeaver, Randy. Guide to tactical perimeter defense: Becoming a security network specialist. Australia: Thomson/Course Technology, 2008.
Buscar texto completoGuide to Tactical Perimeter Defense. Course Technology, 2007.
Buscar texto completoRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Buscar texto completoRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Taylor & Francis Group, 2003.
Buscar texto completoRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Buscar texto completoRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.
Buscar texto completoRiggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.
Buscar texto completoTactical Perimeter Defense (SCP SC0-451) LATEST EXAMINATION QUESTIONS. Independently Published, 2020.
Buscar texto completoEnt, Uzal W. Fighting on the Brink: Defense of the Pusan Perimeter. Turner Publishing Company (KY), 1997.
Buscar texto completoCapítulos de libros sobre el tema "Perimeter defense"
Shishika, Daigo y Vijay Kumar. "A Review of Multi Agent Perimeter Defense Games". En Lecture Notes in Computer Science, 472–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_26.
Texto completoChen, Austin K., Douglas G. Macharet, Daigo Shishika, George J. Pappas y Vijay Kumar. "Optimal Multi-robot Perimeter Defense Using Flow Networks". En Distributed Autonomous Robotic Systems, 282–93. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92790-5_22.
Texto completoAdler, Aviv, Oscar Mickelin, Ragesh K. Ramachandran, Gaurav S. Sukhatme y Sertac Karaman. "The Role of Heterogeneity in Autonomous Perimeter Defense Problems". En Algorithmic Foundations of Robotics XV, 115–31. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21090-7_8.
Texto completoTanimoto, Shigeaki, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato y Atsushi Kanai. "Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines". En Advances in Networked-based Information Systems, 413–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_39.
Texto completoJenkinson, A. J. "Digital Perimeter Defences". En Digital Blood on Their Hands, 53–60. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-9.
Texto completoJenkinson, A. J. "Perimeter Defence Theory in Context". En Digital Blood on Their Hands, 153–54. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-24.
Texto completoNa, Won Shik, Jeom Goo Kim y Intae Ryoo. "Perimeter Defence Policy Model of Cascade MPLS VPN Networks". En Computational Science and Its Applications – ICCSA 2004, 1026–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_115.
Texto completoKizza, Joseph y Florence Migga Kizza. "Perimeter Defense; The Firewall". En Securing the Information Infrastructure, 209–38. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-379-1.ch011.
Texto completo"Defining the Defense Perimeter". En The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.2307/j.ctv1vbd1b7.8.
Texto completo"4 Defining the Defense Perimeter". En The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.12987/9780300262643-006.
Texto completoActas de conferencias sobre el tema "Perimeter defense"
Lee, Elijah S., Daigo Shishika y Vijay Kumar. "Perimeter-defense Game between Aerial Defender and Ground Intruder". En 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020. http://dx.doi.org/10.1109/cdc42340.2020.9304213.
Texto completoBajaj, Shivam, Eric Torng y Shaunak D. Bopardikar. "Competitive Perimeter Defense on a Line". En 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9483308.
Texto completoBajaj, Shivam, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia y David W. Casbeer. "Competitive Perimeter Defense of Conical Environments". En 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022. http://dx.doi.org/10.1109/cdc51059.2022.9993007.
Texto completoBlackmon, F. y J. Pollock. "Blue Rose perimeter defense and security system". En Defense and Security Symposium, editado por Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.664409.
Texto completoGuerrero-Bonilla, Luis, Carlos Nieto-Granda y Magnus Egerstedt. "Robust Perimeter Defense using Control Barrier Functions". En 2021 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). IEEE, 2021. http://dx.doi.org/10.1109/mrs50823.2021.9620572.
Texto completoSmith III, James F. "Perimeter intrusion detection and intruder classification". En SPIE Defense, Security, and Sensing, editado por Ivan Kadar. SPIE, 2009. http://dx.doi.org/10.1117/12.819895.
Texto completoForrai, David P., John W. Devitt, Thomas C. Back, William J. Rogers y Steven M. Gaulding. "EO/IR sensor performance for site perimeter security". En Defense and Security, editado por Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.604440.
Texto completoMacharet, Douglas G., Austin K. Chen, Daigo Shishika, George J. Pappas y Vijay Kumar. "Adaptive Partitioning for Coordinated Multi-agent Perimeter Defense". En 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2020. http://dx.doi.org/10.1109/iros45743.2020.9341417.
Texto completoShishika, Daigo y Vijay Kumar. "Local-game Decomposition for Multiplayer Perimeter-defense Problem". En 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8618879.
Texto completoMattikalli, Raju, Roman Fresnedo, Paul Frank, Summer Locke y Zack Thunemann. "Optimal Sensor Selection and Placement for Perimeter Defense". En 2007 IEEE International Conference on Automation Science and Engineering. IEEE, 2007. http://dx.doi.org/10.1109/coase.2007.4341848.
Texto completoInformes sobre el tema "Perimeter defense"
Riendeau, John y Juergen Keil. Undersea Perimeter Security Integrated Defense Environment (UPSIDE). Fort Belvoir, VA: Defense Technical Information Center, noviembre de 2011. http://dx.doi.org/10.21236/ada553240.
Texto completoNowowiejski, Dean A. Comrades in Arms: The Influence of George S. Patton on Walton H. Walker's Pusan Perimeter Defense. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2001. http://dx.doi.org/10.21236/ada409925.
Texto completo