Libri sul tema "Attacks detection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Attacks detection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Li, Beibei, Rongxing Lu e Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58672-0.
Raghavan, S. V., e E. Dawson, a cura di. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. India: Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
K, Kokula Krishna Hari, a cura di. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Casola, Linda, e Dionna Ali, a cura di. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Raghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Nelson A. Rockefeller Institute of Government., a cura di. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
National Academy of Sciences (U.S.). Committee on Effectiveness of National Biosurveillance Systems, BioWatch and the Public Health System. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. Washington, D.C: National Academies Press, 2011.
Salem, Malek Ben. Towards Effective Masquerade Attack Detection. [New York, N.Y.?]: [publisher not identified], 2012.
Wan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante e Stan Z. Li. Multi-Modal Face Presentation Attack Detection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01824-4.
Wan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante e Stan Z. Li. Advances in Face Presentation Attack Detection. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32906-7.
Stewin, Patrick. Detecting Peripheral-based Attacks on the Host Memory. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13515-1.
Pande, Sagar Dhanraj, e Aditya Khamparia. Networks Attack Detection on 5G Networks using Data Mining Techniques. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281.
Levy, Elizabeth. The snack attack mystery. New York: Scholastic, 1995.
Chevat, Richie. Shark attack. New York: Bantam Books, 1996.
K, kokula Krishna Hari, a cura di. Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Joanne, White, Mountain Pine Beetle Initiative (Canada) e Pacific Forestry Centre, a cura di. Detection of red attack stage mountain pine beetle infestation with high spatial resolution satellite imagery. Victoria, B.C: Canadian Forest Service, Pacific Forestry Centre, 2005.
Yasuda, Anita. The slime attack. North Mankato, Minn: Capstone Stone Arch Books, 2013.
Haberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.
Niemann, K. O. Assessment of potential for remote sensing detection of bark beetle-infested areas during green attack: A literature review. Victoria, B.C: Natural Resources Canada, Canadian Forest Service, Pacific Forestry Centre, 2004.
Bhattacharyya, Dhruba Kumar, e Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Bhattacharyya, Dhruba Kumar, e Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Bhattacharyya, Dhruba Kumar, e Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Brooks, Richard, e Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, e Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, e İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, e Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, e Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Li, Beibei, Rongxing Lu e Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2020.
Busch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez e Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Li, Beibei, Rongxing Lu e Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2021.
Busch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez e Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy e B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy e B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Medicine, Institute of, Board on Chemical Sciences and Technology, Board on Health Sciences Policy, National Research Council e Board on Life Sciences. BioWatch and Public Health Surveillance : Evaluating Systems for the Early Detection of Biological Threats: Abbreviated Version. National Academies Press, 2011.
Raghavan, S. V., e E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Raghavan, S. V., e E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board e Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board e Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board e Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Ruxton, Graeme D., William L. Allen, Thomas N. Sherratt e Michael P. Speed. Avoiding Attack. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.001.0001.
Ruxton, Graeme D., William L. Allen, Thomas N. Sherratt e Michael P. Speed. Advertising elusiveness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0009.
Pell, Stephanie K. Systematic Government Access to Private-Sector Data in the United States I. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0008.
Li, Stan Z., Escalera, Jun Wan, Guodong Guo e Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Li, Stan Z., Escalera, Jun Wan, Guodong Guo e Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Li, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo e Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Li, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo e Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Springer International Publishing AG, 2020.
Cassiman, David, e Wouter Meersseman. Tyrosinemia Type I. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0013.
Saxe, Joshua, e Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.