Książki na temat „Attacks detection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych książek naukowych na temat „Attacks detection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj książki z różnych dziedzin i twórz odpowiednie bibliografie.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Znajdź pełny tekst źródłaLi, Beibei, Rongxing Lu i Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58672-0.
Pełny tekst źródłaRaghavan, S. V., i E. Dawson, red. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. India: Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
Pełny tekst źródłaK, Kokula Krishna Hari, red. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Znajdź pełny tekst źródłaCasola, Linda, i Dionna Ali, red. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Pełny tekst źródłaRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Znajdź pełny tekst źródłaNelson A. Rockefeller Institute of Government., red. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Znajdź pełny tekst źródłaNational Academy of Sciences (U.S.). Committee on Effectiveness of National Biosurveillance Systems, BioWatch and the Public Health System. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. Washington, D.C: National Academies Press, 2011.
Znajdź pełny tekst źródłaSalem, Malek Ben. Towards Effective Masquerade Attack Detection. [New York, N.Y.?]: [publisher not identified], 2012.
Znajdź pełny tekst źródłaWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante i Stan Z. Li. Multi-Modal Face Presentation Attack Detection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01824-4.
Pełny tekst źródłaWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante i Stan Z. Li. Advances in Face Presentation Attack Detection. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32906-7.
Pełny tekst źródłaStewin, Patrick. Detecting Peripheral-based Attacks on the Host Memory. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13515-1.
Pełny tekst źródłaPande, Sagar Dhanraj, i Aditya Khamparia. Networks Attack Detection on 5G Networks using Data Mining Techniques. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281.
Pełny tekst źródłaill, Brunkus Denise, red. The snack attack mystery. New York: Scholastic, 1995.
Znajdź pełny tekst źródłaChevat, Richie. Shark attack. New York: Bantam Books, 1996.
Znajdź pełny tekst źródłaK, kokula Krishna Hari, red. Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Znajdź pełny tekst źródłaBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Znajdź pełny tekst źródłaJoanne, White, Mountain Pine Beetle Initiative (Canada) i Pacific Forestry Centre, red. Detection of red attack stage mountain pine beetle infestation with high spatial resolution satellite imagery. Victoria, B.C: Canadian Forest Service, Pacific Forestry Centre, 2005.
Znajdź pełny tekst źródłaYasuda, Anita. The slime attack. North Mankato, Minn: Capstone Stone Arch Books, 2013.
Znajdź pełny tekst źródłaHaberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.
Znajdź pełny tekst źródłaNiemann, K. O. Assessment of potential for remote sensing detection of bark beetle-infested areas during green attack: A literature review. Victoria, B.C: Natural Resources Canada, Canadian Forest Service, Pacific Forestry Centre, 2004.
Znajdź pełny tekst źródłaBhattacharyya, Dhruba Kumar, i Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaBhattacharyya, Dhruba Kumar, i Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaBhattacharyya, Dhruba Kumar, i Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaBrooks, Richard, i Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaBrooks, Richard, i Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaBrooks, Richard, i İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaBrooks, Richard, i Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaBrooks, Richard, i Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaLi, Beibei, Rongxing Lu i Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2020.
Znajdź pełny tekst źródłaBusch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez i Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Znajdź pełny tekst źródłaLi, Beibei, Rongxing Lu i Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2021.
Znajdź pełny tekst źródłaBusch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez i Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Znajdź pełny tekst źródłaGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy i B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Znajdź pełny tekst źródłaGunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy i B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Znajdź pełny tekst źródłaMedicine, Institute of, Board on Chemical Sciences and Technology, Board on Health Sciences Policy, National Research Council i Board on Life Sciences. BioWatch and Public Health Surveillance : Evaluating Systems for the Early Detection of Biological Threats: Abbreviated Version. National Academies Press, 2011.
Znajdź pełny tekst źródłaRaghavan, S. V., i E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Znajdź pełny tekst źródłaRaghavan, S. V., i E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Znajdź pełny tekst źródłaComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board i Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Znajdź pełny tekst źródłaComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board i Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Znajdź pełny tekst źródłaComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board i Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Znajdź pełny tekst źródłaRuxton, Graeme D., William L. Allen, Thomas N. Sherratt i Michael P. Speed. Avoiding Attack. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.001.0001.
Pełny tekst źródłaRuxton, Graeme D., William L. Allen, Thomas N. Sherratt i Michael P. Speed. Advertising elusiveness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0009.
Pełny tekst źródłaPell, Stephanie K. Systematic Government Access to Private-Sector Data in the United States I. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0008.
Pełny tekst źródłaLi, Stan Z., Escalera, Jun Wan, Guodong Guo i Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Znajdź pełny tekst źródłaLi, Stan Z., Escalera, Jun Wan, Guodong Guo i Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Znajdź pełny tekst źródłaLi, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo i Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Znajdź pełny tekst źródłaLi, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo i Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Springer International Publishing AG, 2020.
Znajdź pełny tekst źródłaCassiman, David, i Wouter Meersseman. Tyrosinemia Type I. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0013.
Pełny tekst źródłaSaxe, Joshua, i Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Znajdź pełny tekst źródła