Letteratura scientifica selezionata sul tema "Cyberattaque"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cyberattaque".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Cyberattaque"
Vacheron, Charles-Hervé, Régis Fuzier, Estelle Morau, Antonia Blanie, Maryline Bordes, Julien Bordes, Jean-Louis Bourgain et al. "Cyberattaque : le nouveau défi pour les établissements de santé ?" Anesthésie & Réanimation 7, n. 4 (luglio 2021): 268–69. http://dx.doi.org/10.1016/j.anrea.2021.06.005.
Testo completoLehu, Jean-Marc. "Cyberattaque : la gestion du risque est-elle encore possible ?" La Revue des Sciences de Gestion 291-292, n. 3 (2018): 41. http://dx.doi.org/10.3917/rsg.291.0041.
Testo completoQuinson, Audrey, Janusz Wajszczak, Charlotte Fernandez Canal e François-Pierrick Desgranges. "Cyberattaque d’un centre hospitalier : de l’épée de Damoclès au tsunami". Anesthésie & Réanimation 7, n. 4 (luglio 2021): 316–17. http://dx.doi.org/10.1016/j.anrea.2021.05.001.
Testo completoBasset, Laurence. "Cyberattaque et cyberdéfense, Daniel Ventre, 2011, Paris, Lavoisier, 312 p." Études internationales 43, n. 3 (2012): 476. http://dx.doi.org/10.7202/1012824ar.
Testo completoLopez, Rébecca. "Cyberattaque et cyberdéfense / Daniel Ventre Paris, Hermès science publications Lavoisier, 2011, 312 p." Revue internationale et stratégique 85, n. 1 (1 febbraio 2012): XXXII. http://dx.doi.org/10.3917/ris.085.0141af.
Testo completoScius, Marie, Solène Brocail, Isabelle Lombard, Cécile Cadot e Farahna Samdjee. "Faire face à une cyberattaque : retour d’expérience d’une unité de reconstitution des chimiothérapies". Le Pharmacien Clinicien 59, n. 1 (marzo 2024): e14-e15. http://dx.doi.org/10.1016/j.phacli.2023.11.025.
Testo completoLibicki, Martin C. "De Tallinn à Las Vegas, une cyberattaque d’importance justifie-t-elle une réponse cinétique?" Hérodote 152-153, n. 1 (2014): 221. http://dx.doi.org/10.3917/her.152.0221.
Testo completoMennecier, Didier. "Cyberattaques et hôpital". Médecine de Catastrophe - Urgences Collectives 4, n. 4 (dicembre 2020): 327–30. http://dx.doi.org/10.1016/j.pxur.2020.06.006.
Testo completoFévrier, Rémy. "Covid-19 et cyberattaques". Revue Française de Gestion 46, n. 293 (novembre 2020): 81–94. http://dx.doi.org/10.3166/rfg.2020.00479.
Testo completoDelépine, Justin. "Cyberattaques : sommes-nous prêts ?" Alternatives Économiques N° 424, n. 6 (1 giugno 2022): 56–59. http://dx.doi.org/10.3917/ae.424.0056.
Testo completoTesi sul tema "Cyberattaque"
Coste, Benjamin. "Détection contextuelle de cyberattaques par gestion de confiance à bord d'un navire". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0106/document.
Testo completoNavigation and ship’s management are two essential aspects for the security of the ship itself and people on board as much as the maritime environment protection. Modern ships ensure these functions by increasingly embedding connected and automated technologies such as sensors, actuators, programmable logic controllers and pieces of software. However, the security of this objects as well as the trust in the information they produce cannot be guaranteed: they can be deceived or under the control of a malicious third party. In this context, a novel approach of data falsification detection is proposed. It is based on trust assessment of information system components which can be seen as inter-related functional blocks producing, processing and receiving pieces of information. The trust one can have inproduction blocks, called information sources, is assessed through its ability to report real situation of the ship. Trust is then propagated to the remainder part of the system. A simulator was made thanks to which we experiment several scenarios including intentional modification of numerical data. In these cases and under some conditions, the variability of trust give us the ability to identify the attack occurrence as much as its target. Our proposition is not restricted to naval information systems and can be employed in various situations even with human factor
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Testo completoTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Timbert, Michaël. "Protections des processeurs contre les cyber-attaques par vérification de l’intégrité du flot d’exécution". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT028.
Testo completoCyber attacks are based on intrusions into digital systems by exploiting bugs to take control over the system. Many protections have been developed to thwart cyber attack, among them we can quote code obfuscation, memory integrity check, instruction set randomization, address space layout randomization (ASLR), canary, sand boxing, process isolation, virtualization and access right restriction. Modern processors provide security by zone isolation systems (Protection ring, MMU, NX bit, TrustZone), Control Flow Integrity (CFI) is a new technique proposed by Abadi et al. to mitigate program corruption. This technique gave rise to many implementations but none are complete, fast and easily incorporable to existing processor. This thesis is inspired from previous work on HCODE which implements code integrity by computing signature for each executed basic block. HCODE is an hardware block designed to be plugged in read only on the interface between the processor and the instruction cache. In this thesis we present CCFI solution, improvement of HCODE, which is now able to provide Code Integrity and Control Flow Integrity. We propose CCFI architecture able to protect direct and indirect jumps as well as interruptions. The proposed solution is based on both hardware modules and software modifications to ensure speed and flexibility of the solution. To ensure a full CFI protection metadata are embedded with the code. These metadata describes the Control Flow Graph
Skaf, Faten. "La justice pénale face à la cybercriminalité". Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0218.
Testo completoNowdays, Criminal justice is confronted to digital and the development of dematerialized data, whose heritage value is still increasing, raise challenges of ideological, sociological, economical, geopolitical and of course legal nature. Criminal justice needs to deal with cybercrime which make light of time, space and legislation because illicit acts now take place in cyberspace. However, so that the criminal justice system can contribute effectively to fight against cybercrime, states should be able to lean on a set of legal rules against crime and criminal justice systems which work correctly, should have the necessary abilities to get to the bottom of legal affairs which can be complex and cooperate in cybercrime repression on the international level
Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe". Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Testo completoComputer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression
Libri sul tema "Cyberattaque"
Cyberattaque et cyberdéfense. Paris: Hermès science publications, 2011.
Cerca il testo completoEVASION NE DANGER: CYBERATTAQUE ! Santillana Français, 2019.
Cerca il testo completoDuport, Florence Esposito. CYBERATTAQUE À LA BANQUE. PEARSON DISTRIBUCIÓN, 2017.
Cerca il testo completoKOKO, Charles. BOÎTIER de SÉCURITÉ NATIONALE: Piratage et Cyberattaques Contre les Infrastructures Critiques - le défi de la Cyberguerre Aux Portes de l'Europe et du Royaume-Uni. Independently Published, 2022.
Cerca il testo completoCapitoli di libri sul tema "Cyberattaque"
Dahmen, Ulla, e Nicolas Krämer. "Angriff aus der Dunkelheit: Cyberattacke auf das Lukaskrankenhaus Neuss". In Cybersecurity Best Practices, 13–21. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9_2.
Testo completoBEN CHEHIDA DOUSS, Aida, e Ryma ABASSI. "Vulnérabilités dans la e-santé et contre-mesures". In Gestion de la sécurité en e-santé, 27–51. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch2.
Testo completoMiramont, Delphine. "Cyberattaques et espace extra-atmosphérique : interférences et régime juridique". In Droit de l'espace extra−atmosphérique, 147–60. Presses de l’Université Toulouse 1 Capitole, 2021. http://dx.doi.org/10.4000/books.putc.14788.
Testo completo