Letteratura scientifica selezionata sul tema "Attack Path"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Attack Path".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Attack Path"
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi e A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Testo completoLi, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He e Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees". Information 10, n. 8 (29 luglio 2019): 251. http://dx.doi.org/10.3390/info10080251.
Testo completoHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, n. 3 (7 dicembre 2023): 1–30. http://dx.doi.org/10.1145/3626789.
Testo completoHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". ACM SIGMETRICS Performance Evaluation Review 52, n. 1 (11 giugno 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Testo completoLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu e Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm". Mathematics 10, n. 21 (24 ottobre 2022): 3938. http://dx.doi.org/10.3390/math10213938.
Testo completoLevner, Eugene, e Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes". Algorithms 17, n. 11 (4 novembre 2024): 504. http://dx.doi.org/10.3390/a17110504.
Testo completoBhavani, Y., V. Janaki e R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback". Oriental journal of computer science and technology 10, n. 2 (6 giugno 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Testo completoGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song e Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid". Drones 8, n. 9 (28 agosto 2024): 437. http://dx.doi.org/10.3390/drones8090437.
Testo completoBhavani, Yerram, Vinjamuri Janaki e Rangu Sridevi. "IP Traceback using Flow Based Classification". Recent Advances in Computer Science and Communications 13, n. 3 (12 agosto 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Testo completoAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad e Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph". Karbala International Journal of Modern Science 8, n. 3 (2 agosto 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Testo completoTesi sul tema "Attack Path"
Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks". Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Testo completoMirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks". Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Testo completoVega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment". Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.
Testo completoID: 031001316; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Houman A. Sadri.; Title from PDF title page (viewed March 26, 2013).; Thesis (M.A.)--University of Central Florida, 2012.; Includes bibliographical references (p. 89-99).
M.S.E.E.
Masters
Electrical Engineering and Computing
Engineering and Computer Science
Electrical Engineering; Controls and Robotics
Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Testo completoAnfallsstigen är ett effektivt verktyg för att visa möjliga hackningsvägarsom en angripare tar emot ett specifikt datornätverk. Det informerarockså administratörer om eventuell svaghet i ett nätverk somhjälper dem att utrulla nätverkskonfigurationsändringar. Baserat påfördefinierade datormetoder kan ett stort antal attackvägar genereras.Åtkomstvägar visar dock alla möjliga vägar för varje beräkning och representerardem med terminologier som är specifika för fältet Cybersecurity.En stor del av attackvägar och representationer är för kompliceradeför vanliga användare vilket gör det svårt att identifiera de delarsom de borde ägna mer uppmärksamhet åt. I denna avhandlingsrapportbeskrivs ett ramverk för att generera en kortfattad och användarvänligattackväg genom att gruppera kontinuerliga angreppssteg.Ramverket är utformat med 6 nivåer av hierarkisk abstraktion. Topp3 nivåer av dessa abstraktioner klassificeras baserat på den fördefinieradestrukturen av mjukvaran och namngiven strukturell uppdelning.De övriga 3 lägre nivåerna klassificeras baserat på semantik meden taxonomi för naturlig språkrepresentation som heter SCV (SecurityCommunity Vocabulary), namngiven semantikavdelning. Denna visualiseringsmetodsläpps som en del av securiCADR en cybersecurityproduktsom släpptes av Foreseeti, vilket ger en kortfattad och förståeliginteraktion genom att aggregera ursprungliga attacksteg enligtolika kunders krav.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Testo completoDube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking". Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.
Testo completoExurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés". Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Testo completoThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Testo completoTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations". Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Testo completoCyberattacker håller på att bli ett större orosmoment allteftersom vårt samhälle digitaliseras i större utsräckning, där lagring av känslig information snarare har blivit regel än undantag. Detta utgör ett behov av ett tids- och kostnadseffektivt sätt att bedömma cybersäkerheten hos ett företag. Hotmodelleringsspråket enterpriseLang är just detta, där antagandet av ett generellt företagssystem möjliggör återanvändning på flera olika system. Språket är skapat med Meta Attack Language och är baserat på kända attack- och försvarssteg från MITRE ATT&CK Enterprise matris. Eftersom alla möjliga attackvägar inte utnyttjas i lika stor utsträckning, behöver sannolikhetsfördelningar tilldelas till attack- och försvarsstegen. Arbetet som presenteras i den här rapporten inkluderar tilldelningen av sannolikhetsfördelningar till en handfull av dem, i synnerhet de kopplade till att få inital åtkomst till ett system med hjälp av användarutföranden. Utöver detta undersöks också den finansiella påverkan en attack kan ha samt om försvarsåtgärder är finansiellt lönsamma. En modell för avkastning på en sådan investering utvecklas för att kunna beräkna detta.
Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails". Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Testo completoLibri sul tema "Attack Path"
Operations, United States Congress House Committee on Government. Navy's seawolf attack submarine is proceeding along a path of high technical and financial risks: Thirty-fifth report. Washington: U.S. G.P.O., 1990.
Cerca il testo completoImpey, Rose. Pirate Patch and the black bonnet attack. London: Orchard, 2008.
Cerca il testo completoCorporation, Port Authority Trans-Hudson, a cura di. Draft scope: Permanent World Trade Center PATH terminal : environmental impact statement. New York, N.Y.]: [The Port Authority of NY & NJ], 2003.
Cerca il testo completoKostera, Monika. The University of Hope. Oxford: Oxford University Press, 2024. http://dx.doi.org/10.1093/9780191996948.001.0001.
Testo completo1530-1610, Scupoli Lorenzo, a cura di. Spiritual combat: How to win your spiritual battles and attain inner peace ; plus, Interior peace : the path to paradise. Manchester, N.H: Sophia Institute Press, 2002.
Cerca il testo completoDeMaria, Rusel, e Zach Meston. Sega Genesis Secrets, Volume 2. Rocklin, CA: Prima Publishing, 1991.
Cerca il testo completoSandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. New York: Bantam Books, 1992.
Cerca il testo completoOlson, R. M. Attack Path: A space opera adventure. RM Olson, 2021.
Cerca il testo completoThomson, Miller. Path: ANXIETY and PANIC ATTACK ELIMINATION PROGRAM. Independently Published, 2018.
Cerca il testo completoThe Way to a Healthy Heart: The Zero Heart Attack Path. Penguin Global, 2004.
Cerca il testo completoCapitoli di libri sul tema "Attack Path"
Salfer, Martin. "Single-Path Attack Graph Algorithm". In Automotive Security Analyzer for Exploitability Risks, 131–55. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_4.
Testo completoSalfer, Martin. "Multi-Path Attack Graph Algorithm". In Automotive Security Analyzer for Exploitability Risks, 157–207. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_5.
Testo completoGonda, Tom, Rami Puzis e Bracha Shapira. "Scalable Attack Path Finding for Increased Security". In Lecture Notes in Computer Science, 234–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2_18.
Testo completoKavallieratos, Georgios, e Sokratis Katsikas. "Attack Path Analysis for Cyber Physical Systems". In Computer Security, 19–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0_2.
Testo completoJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang e Wanlei Zhou. "Source Identification Under Snapshots: A Sample Path Based Source Estimator". In Malicious Attack Propagation and Source Identification, 79–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_7.
Testo completoDucousso, Soline, Sébastien Bardin e Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis". In Programming Languages and Systems, 59–89. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.
Testo completoRao, Yu, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou e Jinghua Bai. "Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network". In Communications in Computer and Information Science, 97–114. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_8.
Testo completoFiazza, Maria-Camilla, Michele Peroli e Luca Viganò. "Attack Interference: A Path to Defending Security Protocols". In E-Business and Telecommunications, 296–314. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35755-8_21.
Testo completoIdika, Nwokedi, e Bharat Bhargava. "A Kolmogorov Complexity Approach for Measuring Attack Path Complexity". In IFIP Advances in Information and Communication Technology, 281–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21424-0_23.
Testo completoShosha, Ahmed F., Joshua I. James e Pavel Gladyshev. "A Novel Methodology for Malware Intrusion Attack Path Reconstruction". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 131–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_11.
Testo completoAtti di convegni sul tema "Attack Path"
Lu, Ziang, Lu Chen, Yong Li, Guangxin Guo e Tengyan Wang. "Attack Path Extraction based on VGAE and DBSCAN". In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 9–14. IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00013.
Testo completoWang, Zijin, Minrui Fei, Yao Xiong e Aimin Wang. "Dynamic Attack Path Prediction and Visualization for Industrial Cyber-Physical Systems Under Cyber Attacks". In 2024 43rd Chinese Control Conference (CCC), 9005–10. IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662270.
Testo completoYadav, Mukesh, e Peter J. Hawrylak. "An Empirical Study on Analyzing the Evidence-Based Method in Attack Path Detection". In 2024 Resilience Week (RWS), 1–6. IEEE, 2024. https://doi.org/10.1109/rws62797.2024.10799307.
Testo completoShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, Jingbo Zhou, Kimia Zamiri Azar, Farimah Farahmandi e Mark Tehranipoor. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures". In ISTFA 2024, 332–41. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Testo completoMalpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction". In Vertical Flight Society 73rd Annual Forum & Technology Display, 1–15. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.
Testo completoSubaşi, Engin, e Muharrem Mercımek. "Attack Path Analysis and Security Concept Design for OTA Enabled Electric Power Steering System". In 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), 1–7. IEEE, 2024. https://doi.org/10.1109/asyu62119.2024.10756981.
Testo completoStelte, Bjorn. "ISP traceback - Attack path detection". In 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, 2013. http://dx.doi.org/10.1109/cns.2013.6682728.
Testo completoChen, Biqiong, Yanhua Liu, Shijin Li e Xiaoling Gao. "Attack Intent Analysis Method Based on Attack Path Graph". In ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3371676.3371680.
Testo completoLi, Shijin, Minchen Zhu e Yanbin Qiu. "Attack Intent Analysis Method Based on Attack Path Graph". In the 8th International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3290480.3290502.
Testo completoChen, Tianjiaojiao, Huixiang Zhang, Tianluo Liu e Renjie Li. "Research on Cyber Attack Modeling and Attack Path Discovery". In 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis (CMSDA). IEEE, 2022. http://dx.doi.org/10.1109/cmsda58069.2022.00068.
Testo completoRapporti di organizzazioni sul tema "Attack Path"
Floyd, Jason, e Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, ottobre 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Testo completoGhosh, Anup, Steve Noel e Sushil Jajodia. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference. Fort Belvoir, VA: Defense Technical Information Center, agosto 2011. http://dx.doi.org/10.21236/ada563714.
Testo completoKránitz, Péter Pál. Georgia’s EU-Accession Path in Light of the “Foreign Agent Law” and Hungary’s EU-Presidency. Magyar Külügyi Intézet, 2024. http://dx.doi.org/10.47683/kkielemzesek.ke-2024.17.
Testo completoPrahl, D., e M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), novembre 2014. http://dx.doi.org/10.2172/1220378.
Testo completoPrahl, D., e M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), novembre 2014. http://dx.doi.org/10.2172/1164104.
Testo completoBukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius e Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, agosto 2022. http://dx.doi.org/10.15388/cibersek.2022.
Testo completoWeinschenk, Craig, Keith Stakes e Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, dicembre 2017. http://dx.doi.org/10.54206/102376/nevx1787.
Testo completoMadrzykowski, Daniel. Firefighter Equipment Operational Environment: Evaluation of Thermal Conditions. UL Firefighter Safety Research Institute, agosto 2017. http://dx.doi.org/10.54206/102376/igfm4492.
Testo completoWeinschenk, Craig, Keith Stakes e Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, dicembre 2017. http://dx.doi.org/10.54206/102376/gmax3657.
Testo completoHausmann, Ricardo, Andrés Rodríguez-Clare e Dani Rodrik. Towards a Strategy for Economic Growth in Uruguay. Inter-American Development Bank, febbraio 2005. http://dx.doi.org/10.18235/0008722.
Testo completo