Gotowa bibliografia na temat „Perimeter defense”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Perimeter defense”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Perimeter defense"

1

Wallace, Tom. "Optimize Perimeter Defense for Utility Security". Opflow 43, nr 5 (maj 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Andriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS". Health and Ecology Issues, nr 1 (28.03.2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.

Pełny tekst źródła
Streszczenie:
Objective : to determine the features of the changes of perimeter body sizes of male cadets in the conditions of the pedagogical process at a higher educational institution of I level of accreditation. Material and methods . We have conducted longitudinal (I, II, III years of study) determination of perimeter body sizes of 87 male cadets and analyzed the features of the changes in these parameters in the conditions of the pedagogical process during a three-year period. The analysis of the indicators was conducted using «Statistica», 6.1 (StatSoft) by parametric methods of assessment. Results. Based on the obtained data we have defined the characteristic features of the annual changes of the perimeter body parameters during the three-year period of study in conditions of the pedagogical process of a civil defense college. We have determined the increase dynamics of most of the average indicators throughout the period of study at the civil defense college, except for the perimeters of the neck, pelvis and abdomen, where the decrease of the sizes has been found. Conclusions. We have revealed reliable differences when comparing the annual changes of the perimeters of the pelvis, abdomen, thorax (during a breathing pause, inhale, exhale), the shoulder, forearm, hand, thigh, upper third of the leg, the instep of the foot. The annual changes of perimeter sizes of the neck, pelvis and abdomen in the male cadets during the second year of training were bigger than during the first one. The perimeter increase parameters of the chest (during a breathing pause, inhale, exhale), shoulder, forearm, wrist, hand, hip, upper and lower third of the leg, foot, the instep of foot in the male cadets dominated when they were in the first year of study.
Style APA, Harvard, Vancouver, ISO itp.
3

Crawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers i J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria". Proceedings of the National Academy of Sciences 109, nr 27 (18.06.2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Daly-Grafstein, Daniel, i Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA". Journal of Sports Analytics 6, nr 4 (7.01.2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.

Pełny tekst źródła
Streszczenie:
As 3-point shooting in the NBA continues to increase, the importance of perimeter defense has never been greater. Perimeter defenders are often evaluated by their ability to tightly contest shots, but how exactly does contesting a jump shot cause a decrease in expected shooting percentage, and can we use this insight to better assess perimeter defender ability? In this paper we analyze over 50,000 shot trajectories from the NBA to explain why, in terms of impact on shot trajectories, shooters tend to miss more when tightly contested. We present a variety of results derived from this shot trajectory data. Additionally, pairing trajectory data with features such as defender height, distance, and contest angle, we are able to evaluate not just perimeter defenders, but also shooters’ resilience to defensive pressure. Utilizing shot trajectories and corresponding modeled shot-make probabilities, we are able to create perimeter defensive metrics that are more accurate and less variable than traditional metrics like opponent field goal percentage.
Style APA, Harvard, Vancouver, ISO itp.
5

Kim, Kwon-il, Yeon-seung Ryu i Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter". Korean Journal of Industry Security 11, nr 1 (30.04.2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chen, S., i Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks". IEEE Transactions on Parallel and Distributed Systems 16, nr 6 (czerwiec 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shishika, Daigo, James Paulos i Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games". IEEE Robotics and Automation Letters 5, nr 2 (kwiecień 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Edwards, Paul M., i Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter". Journal of Military History 62, nr 4 (październik 1998): 960. http://dx.doi.org/10.2307/120234.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Al-Qassim, Mohammed A., i Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software". Iraqi Journal of Information & Communications Technology 1, nr 2 (27.07.2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Pełny tekst źródła
Streszczenie:
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
Style APA, Harvard, Vancouver, ISO itp.
10

Steingartner, William, Darko Galinec i Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model". Symmetry 13, nr 4 (3.04.2021): 597. http://dx.doi.org/10.3390/sym13040597.

Pełny tekst źródła
Streszczenie:
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. This architecture leaves detection gaps that are difficult to fill with existing security controls not specifically designed for that role. Rather than using prevention alone, a strategy that attackers have consistently succeeded against, defenders are adopting a more balanced strategy that includes detection and response. Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. They also have some limitations because they are not designed to catch credential harvesting or attacks based on what appears as authorized access. They are also often seen as complex and prone to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Perimeter defense"

1

Lin, Kung-Sung, i 林坤松. "Fiber-Optic Multi-Defense-Area Perimeter Intrusion Detection System With Laser Cavity and Michelson Interferometer Configured in Each Defensed Area". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mc2q3c.

Pełny tekst źródła
Streszczenie:
碩士
國立清華大學
光電工程研究所
105
In this paper, we propose a perimeter intrusion detection system which uses Michelson interferometers. This system has four defense zone and each zone employs a specified wavelength to detect intrusion. The goal of this paper is trying to find the thresholds at different weathers and situations. We preset three thresholds to decide whether the disturbance is intrusion or not. When the disturbance occurs and the detected signal meets the conditions for intrusion, the proposed algorithm triggers an alarm. In other words, if we want to reduce false alarm rate effectively, we just need to preset the right thresholds at first.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Perimeter defense"

1

Fighting on the brink: Defense of the Pusan Perimeter. Paducah, KY: Turner Pub., 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Weaver, Randy. Guide to tactical perimeter defense: Becoming a security network specialist. Australia: Thomson/Course Technology, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Guide to Tactical Perimeter Defense. Course Technology, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Taylor & Francis Group, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Tactical Perimeter Defense (SCP SC0-451) LATEST EXAMINATION QUESTIONS. Independently Published, 2020.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Ent, Uzal W. Fighting on the Brink: Defense of the Pusan Perimeter. Turner Publishing Company (KY), 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Perimeter defense"

1

Shishika, Daigo, i Vijay Kumar. "A Review of Multi Agent Perimeter Defense Games". W Lecture Notes in Computer Science, 472–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_26.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chen, Austin K., Douglas G. Macharet, Daigo Shishika, George J. Pappas i Vijay Kumar. "Optimal Multi-robot Perimeter Defense Using Flow Networks". W Distributed Autonomous Robotic Systems, 282–93. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92790-5_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Adler, Aviv, Oscar Mickelin, Ragesh K. Ramachandran, Gaurav S. Sukhatme i Sertac Karaman. "The Role of Heterogeneity in Autonomous Perimeter Defense Problems". W Algorithmic Foundations of Robotics XV, 115–31. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21090-7_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Tanimoto, Shigeaki, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato i Atsushi Kanai. "Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines". W Advances in Networked-based Information Systems, 413–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_39.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Jenkinson, A. J. "Digital Perimeter Defences". W Digital Blood on Their Hands, 53–60. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Jenkinson, A. J. "Perimeter Defence Theory in Context". W Digital Blood on Their Hands, 153–54. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Na, Won Shik, Jeom Goo Kim i Intae Ryoo. "Perimeter Defence Policy Model of Cascade MPLS VPN Networks". W Computational Science and Its Applications – ICCSA 2004, 1026–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_115.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kizza, Joseph, i Florence Migga Kizza. "Perimeter Defense; The Firewall". W Securing the Information Infrastructure, 209–38. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-379-1.ch011.

Pełny tekst źródła
Streszczenie:
As companies increasingly build private networks and connect them onto the Internet, securing such private networks has become a great concern. These networks are facing threats from two fronts: the external Internet and the users from within the company network. This requires security protocols that will effectively deal with these two fronts by first restricting access to the network from outside and controlling access between subnets from within. Ideal protocols to do such tasks are found in firewalls. A firewall is hardware, software, or a combination of both that monitors and filters traffic packets that attempt to either enter or leave the protected private network. It is a tool that separates a protected network or part of a network, and now increasingly a user’s personal computer (PC), from an unprotected network—the “bad network,” like the Internet.
Style APA, Harvard, Vancouver, ISO itp.
9

"Defining the Defense Perimeter". W The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.2307/j.ctv1vbd1b7.8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

"4 Defining the Defense Perimeter". W The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.12987/9780300262643-006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Perimeter defense"

1

Lee, Elijah S., Daigo Shishika i Vijay Kumar. "Perimeter-defense Game between Aerial Defender and Ground Intruder". W 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020. http://dx.doi.org/10.1109/cdc42340.2020.9304213.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bajaj, Shivam, Eric Torng i Shaunak D. Bopardikar. "Competitive Perimeter Defense on a Line". W 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9483308.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bajaj, Shivam, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia i David W. Casbeer. "Competitive Perimeter Defense of Conical Environments". W 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022. http://dx.doi.org/10.1109/cdc51059.2022.9993007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Blackmon, F., i J. Pollock. "Blue Rose perimeter defense and security system". W Defense and Security Symposium, redaktor Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.664409.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Guerrero-Bonilla, Luis, Carlos Nieto-Granda i Magnus Egerstedt. "Robust Perimeter Defense using Control Barrier Functions". W 2021 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). IEEE, 2021. http://dx.doi.org/10.1109/mrs50823.2021.9620572.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Smith III, James F. "Perimeter intrusion detection and intruder classification". W SPIE Defense, Security, and Sensing, redaktor Ivan Kadar. SPIE, 2009. http://dx.doi.org/10.1117/12.819895.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Forrai, David P., John W. Devitt, Thomas C. Back, William J. Rogers i Steven M. Gaulding. "EO/IR sensor performance for site perimeter security". W Defense and Security, redaktor Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.604440.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Macharet, Douglas G., Austin K. Chen, Daigo Shishika, George J. Pappas i Vijay Kumar. "Adaptive Partitioning for Coordinated Multi-agent Perimeter Defense". W 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2020. http://dx.doi.org/10.1109/iros45743.2020.9341417.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Shishika, Daigo, i Vijay Kumar. "Local-game Decomposition for Multiplayer Perimeter-defense Problem". W 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8618879.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Mattikalli, Raju, Roman Fresnedo, Paul Frank, Summer Locke i Zack Thunemann. "Optimal Sensor Selection and Placement for Perimeter Defense". W 2007 IEEE International Conference on Automation Science and Engineering. IEEE, 2007. http://dx.doi.org/10.1109/coase.2007.4341848.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Perimeter defense"

1

Riendeau, John, i Juergen Keil. Undersea Perimeter Security Integrated Defense Environment (UPSIDE). Fort Belvoir, VA: Defense Technical Information Center, listopad 2011. http://dx.doi.org/10.21236/ada553240.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nowowiejski, Dean A. Comrades in Arms: The Influence of George S. Patton on Walton H. Walker's Pusan Perimeter Defense. Fort Belvoir, VA: Defense Technical Information Center, maj 2001. http://dx.doi.org/10.21236/ada409925.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii