Segui questo link per vedere altri tipi di pubblicazioni sul tema: Cyber defensive.

Tesi sul tema "Cyber defensive"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-44 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Cyber defensive".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.

1

Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.

Testo completo
Abstract (sommario):
This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and comput
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Wong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.

Testo completo
Abstract (sommario):
With increased dependency on the Internet, cyber attacks are fast becoming an attractive option for state adversaries, in part because of the ease of hiding one's identity. In response, governments around the world are taking measures to improve their national cyber defenses. However, these defenses, which are generally passive in nature, have been insufficient to address the threat. This thesis explores the possibility of employing active cyber defenses to improve cyber defenses at the national level. Active cyber defense refers to the use of offensive actions, such as counter hacking, pr
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Stensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.

Testo completo
Abstract (sommario):
Approved for public release; distribution is unlimited.<br>This thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norways strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control. Norway must increasingly be perceived as a serio
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.

Testo completo
Abstract (sommario):
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2007.<br>Thesis Advisor(s): Moran, Daniel ; Denning, Dorothy. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 93-102). Also available in print.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.

Testo completo
Abstract (sommario):
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses of actions by convincing the aggressor that cost exceeds the profit. In cyberspace, where the costs are lower, deterrence is disputed because of the natural interconnectedness and constant actions. The aim of this study is to investigate how the US understands cyber deterrence. This study is motivated by the current ambiguity regarding whether deterrence works in cyberspace or not. Using both theories of conventional and cyber deterrence together with theories of offense and defense, the study fo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.

Testo completo
Abstract (sommario):
Approved for public release; distribution is unlimited<br>The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber tec
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.

Testo completo
Abstract (sommario):
With recent advances in electronics and communication technologies, our daily lives are immersed in an environment of Internet-connected smart things. Despite the great convenience brought by the development of these technologies, privacy concerns and security issues are two topics that deserve more attention. On one hand, as smart things continue to grow in their abilities to sense the physical world and capabilities to send information out through the Internet, they have the potential to be used for surveillance of any individuals secretly. Nevertheless, people tend to adopt wearable devices
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.

Testo completo
Abstract (sommario):
Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usability.  Due to the proliferation of increasingly sophisticated cyber threats with exponentially destructiv
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Testo completo
Abstract (sommario):
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Flamholz, David B. "Baiting for defense against stealthy attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121858.

Testo completo
Abstract (sommario):
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 63-64).<br>The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near real time. Improvements in networked communication have enabled vast and complex dynamic control systems to exploit networked control schemes to seamlessly integrate parts and processes. These cyber-physical systems exhibit a level of flexibility t
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Dayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.

Testo completo
Abstract (sommario):
A cyber-physical system (CPS) is a complex integration of hardware and software components to perform well-defined tasks. Up to this point, many software-based attacks targeting the network and computation layers have been reported by the researchers. However, the physical layer attacks that utilize natural phenomena (e.g., electromagnetic waves) to manipulate safety-critic signals such as analog sensor outputs, digital data, and actuation signals have recently taken the attention. The purpose of this dissertation is to detect the weaknesses of cyber-physical systems against low-power Intentio
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Kazinec, Darius. "Issues of cyber warfare in international law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860.

Testo completo
Abstract (sommario):
Cyber has been around for over a decade and yet we are still faces with a situation of a very weak or rather no regulation. This is being heavily influenced by our weak technological development and due to the nature of cyberspace and the Internet. Cyber warfare poses interesting questions for us. It is one of a kind type of warfare, the one we cannot see or feel, but it‘s impacts are instantaneous and potentially devastating. States and scholars agree on that. This thesis attempts to explore possibilities of application of existing international laws to amend this situation and answer the que
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Smith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.

Testo completo
Abstract (sommario):
There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Rubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Прокопець, Я. Ю., Михайло Олександрович Думчиков, Михаил Александрович Думчиков та Mykhailo Oleksandrovych Dumchykov. "Реалізація кібербезпеки та шляхи її вдосконалення в Україні". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78670.

Testo completo
Abstract (sommario):
Сучасні глобалізаційні процеси не стоять на місці.Цифрові технології проходять шлях удосконалення, зважаючи на постійні покращення в усіх інформаційних сферах суспільного життя. Зважаючи на все більший вплив електронних технологій усе більш актуальною стає проблема захисту від загроз кібернетичного характеру. Більшість країн світу практикують надійні засоби кібербезпеки, що основані на загальнодержавній системі захисту з можливістю швидкого та ефективного виявлення кіберзагрози, а також надання спеціальним органам повноважень та технологій для попередження, припинення та запобігання кібернапад
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Lipke, Alexa. "U.S. and NATO Cyber Defense| Bridging the Resource Gap with a Centralized Market Structure." Thesis, The George Washington University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10189713.

Testo completo
Abstract (sommario):
<p> This paper will examine how the organizational structures of the U.S. military and the North Atlantic Treaty Organization (NATO) evolved to address the proliferating array of cyber threats. One of the gaps in military cybersecurity is the growing demand for qualified cyber security personnel. Estonia and other countries have employed all-volunteer cyber militias to help protect national security during emergencies. However, the U.S. and NATO are not in the political or legal position to rely upon an all-civilian group. Utilizing Thomas Malone's framework for business, the U.S. military and
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.

Testo completo
Abstract (sommario):
Cyber-physical systems (CPSs) are systems that integrate physical elements with a cyber layer that enables sensing, monitoring, and processing the data from the physical components. Examples of CPSs include autonomous vehicles, unmanned aerial vehicles (UAVs), smart grids, and the Internet of Things (IoT). In particular, many critical infrastructure (CI) that are vital to our modern day cities and communities, are CPSs. This wide range of CPSs domains represents a cornerstone of smart cities in which various CPSs are connected to provide efficient services. However, this level of connectivity
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Pombo, Rodrigo. "Política europeia de segurança no ciberespaço." Master's thesis, Academia da Força Aérea, 2019. http://hdl.handle.net/10400.26/39771.

Testo completo
Abstract (sommario):
Atualmente a Europa e o mundo estão cada vez mais dependentes da tecnologia, e o aumento do uso da internet por parte da população fez com que fossem criadas imensas oportunidades mas ao mesmo tempo apareceram as ciberameaças e ciberataques que vieram afetar não só a privacidade e segurança dos utilizadores mas também das infraestruturas dos próprios Estados. Devido ao aumento da frequência das ciberameaças e ciberataques, a UE teve que atuar e tomar medidas para assegurar a segurança dos seus cidadãos e desenvolver medidas e políticas de cibersegurança. A emergência de ciberataques como o do
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Stewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Яровенко, Ганна Миколаївна, Анна Николаевна Яровенко, Hanna Mykolaivna Yarovenko та І. Д. Нечепоренко. "Сучасні технології кіберзахисту щодо виявлення шахрайств, що здійснюються персоналом банку". Thesis, Сумський державний університет, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77725.

Testo completo
Abstract (sommario):
Шахрайство з грошовими засобами є розповсюдженим способом незаконного збагачення, незалежно від того, яким чином воно здійснювалося. Особливо актуальною ця проблема є для фінансово-кредитних установ, які безпосередньо мають справу з фінансовими операціями. Але шахрайські дії в банківській сфері за часту важко виявити на тлі величезної кількості автентичних транзакцій, що проводяться щодня. З іншого боку, не виявлення зловживань, фінансових махінацій, відмивання кримінальних доходів, незаконне отримання коштів з клієнтських рахунків, тощо може завдати шкоди репутації банку. Найтривожніш
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Kullander, Nathalia. "En analys kring det civila försvaret på lokal nivå. : En jämförande studie mellan Värmland och Örebros resurser och samarbetsförmågor." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85130.

Testo completo
Abstract (sommario):
The purpose of this essay is to study the civil defense work in Värmland and Örebro, connected to their resources whithin the respective county. To get a clear picture of how the counties are equipped when it comes to a crisis I have been focusing on the necessary principle connected to civil defense. The study also includes their work with the confederation of enterprise, warehousing and cyber security. To be able to see if they have the potential to collaborating with their resources. I use Emerson's theory of collaborative governance to see if Värmland and Örebro have the potential to work
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Kanerva, Anton, and Fredrik Helgesson. "On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.

Testo completo
Abstract (sommario):
Context. Machine learning is a constantly developing subfield within the artificial intelligence field. The number of domains in which we deploy machine learning models is constantly growing and the systems using these models spread almost unnoticeably in our daily lives through different devices. In previous years, lots of time and effort has been put into increasing the performance of these models, overshadowing the significant risks of attacks targeting the very core of the systems, the trained machine learning models themselves. A specific attack with the aim of fooling the decision-making
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Petras, Christopher M. "The convergence of U.S. military and commercial space activities : self-defense and cyber-attack, "peaceful use" and the space station, and the need for legal reform." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33058.

Testo completo
Abstract (sommario):
The ever-increasing convergence of U.S. military and commercial space activities poses new challenges to the viability of the legal concepts that have traditionally governed the use of outer space, and particularly the military use of space, from the beginning of the space age. This paper will look at two examples of where the melding of U.S. military and commercial space activities necessitates a reexamination of the applicable legal theories. Part I will examine the concept of self-defense in outer space, by considering the legality of the use of conventional military force to defend against
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Robin, Jean-Nicolas. "La matière pénale à l'épreuve du numérique." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G035/document.

Testo completo
Abstract (sommario):
Il semble aujourd'hui possible de considérer que le numérique et le cyberespace ont complètement changé les rapports de force dans notre société moderne. En se numérisant, la société permet à ses membres un accès quasi illimité et instantané à des millions de ressources et données. Par ailleurs, il facilite largement les relations personnelles et professionnelles entre les individus. Si le numérique peut être présenté comme une véritable révolution, celui-ci expose son utilisateur à de nouvelles vulnérabilités, à de nouveaux risques. Le droit pénal, en ce qu'il régit la société et choisit les
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Калетнік, В. В. "Сучасний стан адміністративно-правового забезпечення інформаційної безпеки в Україні: теоретико-правовий аналіз". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53718.

Testo completo
Abstract (sommario):
Мета: аналіз сучасного стану адміністративно-правового забезпечення інформаційної безпеки в Україні, напрацювання науково обґрунтованих пропозицій та рекомендацій з цього питання. Методи дослідження: у дослідженні автор використовував методи теоретичного аналізу та аналізу змісту, монографічний метод, метод систематизації для виявлення та конкретизації авторської позиції в рамках досліджуваних питань. При підготовці висновків та рекомендацій за результатами дослідження був використаний метод узагальнення. Результати дослідження: визначено напрями підвищення ефективності адміністративно-п
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Tsai, Chung-Weng, and 蔡仲威. "Increasing information security skills by using cyber offensive and defensive competitions." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/07725885062425976779.

Testo completo
Abstract (sommario):
碩士<br>元智大學<br>資訊管理學系<br>105<br>Information security has become a critical issue in recent years due to the increasing amount of internet hacking, To effectively prevent the endless stream of Internet hacking events, many countries in the world have devoted tremendous effort to cultivate information technology (IT) professionals. The IT staff’s skill in computer security cannot be improve solely by asking their certificates obtained through standard examination procedures without providing proper training. Many organizations urgently to find good ways effectively enhance IT security personnel’s
Gli stili APA, Harvard, Vancouver, ISO e altri
29

"A Hacker-Centric Perspective to Empower Cyber Defense." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.

Testo completo
Abstract (sommario):
abstract: Malicious hackers utilize the World Wide Web to share knowledge. Previous work has demonstrated that information mined from online hacking communities can be used as precursors to cyber-attacks. In a threatening scenario, where security alert systems are facing high false positive rates, understanding the people behind cyber incidents can help reduce the risk of attacks. However, the rapidly evolving nature of those communities leads to limitations still largely unexplored, such as: who are the skilled and influential individuals forming those groups, how they self-organize along the
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.

Testo completo
Abstract (sommario):
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies Management<br>In this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros
Gli stili APA, Harvard, Vancouver, ISO e altri
31

柯柏宇. "A Study of Virtual-Machine-Based Cyber Defense Exercises." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7gghfu.

Testo completo
Abstract (sommario):
碩士<br>國防大學理工學院<br>資訊工程碩士班<br>106<br>Now Capture The Flag (CTF) is one of the most popular type of information security competitions around the world. The attendee needs to solve a series of challenges, or patch some vulnerabilities for defending owning system to earn points. The CTF can be categorized into three types: Jeopardy, Attack-Defense and King of the Hill.. CTF is a very matured method for evaluating information security technical skills. CTFtimes.org is a CTF portal for collecting all the competitions in the world. Hacker can track their performance and write-ups in the portal. Many
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Rullo, Antonino, Andrea Pugliese, Domenico Saccà, and Sergio Greco. "Cyber defense of enterprise information systems: advanced isues and techniques." Thesis, 2014. http://hdl.handle.net/10955/1242.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
33

(10907916), Kelly Anne Cole. "Investigating Cyber Performance: An Individual Differences Study." Thesis, 2021.

Cerca il testo completo
Abstract (sommario):
<div>The persistent issues that have been identified in the cyber defense domain, such as information-overload, burn-out and high turn-over rates among cyber analysts leads us to question what the cognitive ability contribution is to a more successful cyber performance. Cyber defense researchers theorize that individual differences are determinants of cyber performance success but have yet to establish empirically the role of individual differences. Therefore, the study uses an individual differences approach under a work performance framework to study the contributions of cognitive ability (i
Gli stili APA, Harvard, Vancouver, ISO e altri
34

WU, KUAN-SHENG, and 吳冠陞. "Implementation of cyber attack and defense strategy in software defined network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m44bqg.

Testo completo
Abstract (sommario):
碩士<br>國立臺灣科技大學<br>資訊工程系<br>107<br>Due to the maturity of virtualization technology in recent years, the traditional network hardware architecture cannot flexibly manage the network of virtual machines. The emergence of the Software Define Network (SDN) will be divided into the Network Control Plane and Data Plane, can effectively manage the Network, and the number of virtual machines need to expand, the Software Define Network can also be flexible to increase the number of Software switches, and manage the switches. The Controller controls how packets are forwarded and whether they are process
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Civins, Braden Eph. "In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-08-4199.

Testo completo
Abstract (sommario):
National discourse on cyberconflict has largely focused on defensive concerns, or protecting “critical infrastructure” from cyber threats. By contrast, the U.S. government’s employment of cyberattack is shrouded in secrecy and receives scant public attention. The seminal study on U.S. cyberattack, published by the National Academy of Sciences in 2009, noted that the clandestine nature of U.S. cyber operations hinders “widespread understanding and debate about the nature and implications of U.S. cyberattack.” This secrecy has contributed to a policy and legal framework for cyberattack that th
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Ching-HuangLin and 林敬皇. "Framework Design for Cyber Attack and Defense Exercises with Empirical Cloud Data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58312539008444263933.

Testo completo
Abstract (sommario):
博士<br>國立成功大學<br>電腦與通信工程研究所<br>101<br>Cyber Security Exercise training is gaining more attention in the information security field. Actual hands-on practice will strengthen the capabilities of attack and defense. Hence, we propose The Cyber Attack and Defense Exercises Framework in the dissertation to assist academic researchers or military cyber-units in designing, planning and performing security exercises. A competition of network attacks and defense was held on the Taiwan Network Security Testing Platform (Testbed@TWISC) to collect empirical data, verify suitability and find the direction f
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Lopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.

Testo completo
Abstract (sommario):
This thesis presents a strategic analysis on the possibility of use of offensive cyber capabilities by NATO in its defensive efforts. There is a vast array of academic literature regarding the strategic value of the use of offensive capabilities in cybersecurity, and NATO's cyber posture, however, there is little available regarding the relationship between both. Through the use of tools borrowed from Strategic Studies, this thesis attempts to determine whether it is possible to formulate valid cybersecurity strategies for the use of offensive cyber capabilities from the combination of known a
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Tzy-ShiahWang and 王子夏. "Cyber-Attack Detection and Defense Based on Spectral Analysis and Community Structure Recognition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/whhzsj.

Testo completo
Abstract (sommario):
博士<br>國立成功大學<br>電腦與通信工程研究所<br>105<br>With the ever-growing number of online services nowadays, and the proliferation of wireless access services, more and more users are connecting to the Internet. However, the increasing reliance on the Internet and associated network services exposes users to the risk of malicious attacks by third parties intent on causing short-term disruption or more serious long-term damage. Among the various network security concerns, botnets are regarded as one of the leading threats to network security, and are used to conduct a wide range of malicious activities, incl
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Molina, Valdiviezo Lorena Paulina, Felice Crupi, and Angelo Furfaro. "Simulation models for the evaluation of detection and defense protocols against cyber attacks." Thesis, 2016. http://hdl.handle.net/10955/1361.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.

Cerca il testo completo
Abstract (sommario):
<p>Highly intelligent and technically savvy people are employed to hack data systems throughout the world for prominence or monetary gain. Organizations must combat these criminals with people of equal or greater ability. There have been reports of heightened threats from cyber criminals focusing upon the energy sector, with recent attacks upon natural gas pipelines and payment centers. The Center for Innovative and Strategic Transformation of Alkane Resources (CISTAR) working collaboratively with the Purdue Process Safety and Assurance Center (P2SAC) reached out to the Computer and Informatio
Gli stili APA, Harvard, Vancouver, ISO e altri
41

CHENG, YI-WEN, and 程詒文. "The Normative Framework of the State’s Right of Self-Defense as a Response to Cyber Attack." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/836597.

Testo completo
Abstract (sommario):
碩士<br>國防大學<br>法律學系<br>107<br>Awareness has been growing in recent years that modern societies, increasingly Internet-dependent, are highly vulnerable to malicious intrusion into their computers and Internet. The reality of cyber attacks have already proven remarkably threatened, which can cause physical damage and human casualties. As a result, the issues of whether cyber attacks meet the threshold of UN Charter Article 2(4) needs to be taken into consideration. This article addresses the jus ad bellum examining cyber attacks as prohibited acts under the laws governing the resort to force and
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Hsu, Chin-Ping, and 許錦萍. "The Ideal and Reality of Cross-region Joint Defense Cyber Security Policy – A Case Study of A and B-level Government Agencies." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/pb32mv.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Yang, Shih-Feng, and 楊世豐. "Research on Application of Cyber Security in Taiwan''s Defense Industry- CSC v6 of SANS Organization as the Inspection Standard." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/455bq4.

Testo completo
Abstract (sommario):
碩士<br>國立中山大學<br>管理學院高階經營碩士學程在職專班<br>107<br>In 2016, Taiwan Government selected "Aerospace Industry", "Shipbuilding Industry" and "Cybersecurity Industry" as the targets of nurturing and developing for major Defense Industries. How to assess the impact of "Cybersecurity Management" on the competitiveness of each individual Company in the Taiwan Defense Industry Supply Chains is one of the key priorities. The so-called ISMS (Information Security Management System) is a system that manages the cybersecurity inside a Company and is an impartant part of the overarching management systems. In additi
Gli stili APA, Harvard, Vancouver, ISO e altri
44

"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.

Testo completo
Abstract (sommario):
abstract: The field of cyber-defenses has played catch-up in the cat-and-mouse game of finding vulnerabilities followed by the invention of patches to defend against them. With the complexity and scale of modern-day software, it is difficult to ensure that all known vulnerabilities are patched; moreover, the attacker, with reconnaissance on their side, will eventually discover and leverage them. To take away the attacker's inherent advantage of reconnaissance, researchers have proposed the notion of proactive defenses such as Moving Target Defense (MTD) in cyber-security. In this thesis, I mak
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!