Literatura científica selecionada sobre o tema "Attack Path"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Attack Path".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Attack Path"
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi e A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completo da fonteLi, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He e Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees". Information 10, n.º 8 (29 de julho de 2019): 251. http://dx.doi.org/10.3390/info10080251.
Texto completo da fonteHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, n.º 3 (7 de dezembro de 2023): 1–30. http://dx.doi.org/10.1145/3626789.
Texto completo da fonteHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". ACM SIGMETRICS Performance Evaluation Review 52, n.º 1 (11 de junho de 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Texto completo da fonteLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu e Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm". Mathematics 10, n.º 21 (24 de outubro de 2022): 3938. http://dx.doi.org/10.3390/math10213938.
Texto completo da fonteLevner, Eugene, e Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes". Algorithms 17, n.º 11 (4 de novembro de 2024): 504. http://dx.doi.org/10.3390/a17110504.
Texto completo da fonteBhavani, Y., V. Janaki e R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback". Oriental journal of computer science and technology 10, n.º 2 (6 de junho de 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Texto completo da fonteGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song e Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid". Drones 8, n.º 9 (28 de agosto de 2024): 437. http://dx.doi.org/10.3390/drones8090437.
Texto completo da fonteBhavani, Yerram, Vinjamuri Janaki e Rangu Sridevi. "IP Traceback using Flow Based Classification". Recent Advances in Computer Science and Communications 13, n.º 3 (12 de agosto de 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Texto completo da fonteAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad e Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph". Karbala International Journal of Modern Science 8, n.º 3 (2 de agosto de 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Texto completo da fonteTeses / dissertações sobre o assunto "Attack Path"
Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks". Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Texto completo da fonteMirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks". Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Texto completo da fonteVega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment". Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.
Texto completo da fonteID: 031001316; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Houman A. Sadri.; Title from PDF title page (viewed March 26, 2013).; Thesis (M.A.)--University of Central Florida, 2012.; Includes bibliographical references (p. 89-99).
M.S.E.E.
Masters
Electrical Engineering and Computing
Engineering and Computer Science
Electrical Engineering; Controls and Robotics
Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Texto completo da fonteAnfallsstigen är ett effektivt verktyg för att visa möjliga hackningsvägarsom en angripare tar emot ett specifikt datornätverk. Det informerarockså administratörer om eventuell svaghet i ett nätverk somhjälper dem att utrulla nätverkskonfigurationsändringar. Baserat påfördefinierade datormetoder kan ett stort antal attackvägar genereras.Åtkomstvägar visar dock alla möjliga vägar för varje beräkning och representerardem med terminologier som är specifika för fältet Cybersecurity.En stor del av attackvägar och representationer är för kompliceradeför vanliga användare vilket gör det svårt att identifiera de delarsom de borde ägna mer uppmärksamhet åt. I denna avhandlingsrapportbeskrivs ett ramverk för att generera en kortfattad och användarvänligattackväg genom att gruppera kontinuerliga angreppssteg.Ramverket är utformat med 6 nivåer av hierarkisk abstraktion. Topp3 nivåer av dessa abstraktioner klassificeras baserat på den fördefinieradestrukturen av mjukvaran och namngiven strukturell uppdelning.De övriga 3 lägre nivåerna klassificeras baserat på semantik meden taxonomi för naturlig språkrepresentation som heter SCV (SecurityCommunity Vocabulary), namngiven semantikavdelning. Denna visualiseringsmetodsläpps som en del av securiCADR en cybersecurityproduktsom släpptes av Foreseeti, vilket ger en kortfattad och förståeliginteraktion genom att aggregera ursprungliga attacksteg enligtolika kunders krav.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Texto completo da fonteDube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking". Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.
Texto completo da fonteExurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés". Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Texto completo da fonteThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Texto completo da fonteTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations". Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Texto completo da fonteCyberattacker håller på att bli ett större orosmoment allteftersom vårt samhälle digitaliseras i större utsräckning, där lagring av känslig information snarare har blivit regel än undantag. Detta utgör ett behov av ett tids- och kostnadseffektivt sätt att bedömma cybersäkerheten hos ett företag. Hotmodelleringsspråket enterpriseLang är just detta, där antagandet av ett generellt företagssystem möjliggör återanvändning på flera olika system. Språket är skapat med Meta Attack Language och är baserat på kända attack- och försvarssteg från MITRE ATT&CK Enterprise matris. Eftersom alla möjliga attackvägar inte utnyttjas i lika stor utsträckning, behöver sannolikhetsfördelningar tilldelas till attack- och försvarsstegen. Arbetet som presenteras i den här rapporten inkluderar tilldelningen av sannolikhetsfördelningar till en handfull av dem, i synnerhet de kopplade till att få inital åtkomst till ett system med hjälp av användarutföranden. Utöver detta undersöks också den finansiella påverkan en attack kan ha samt om försvarsåtgärder är finansiellt lönsamma. En modell för avkastning på en sådan investering utvecklas för att kunna beräkna detta.
Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails". Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Texto completo da fonteLivros sobre o assunto "Attack Path"
Operations, United States Congress House Committee on Government. Navy's seawolf attack submarine is proceeding along a path of high technical and financial risks: Thirty-fifth report. Washington: U.S. G.P.O., 1990.
Encontre o texto completo da fonteImpey, Rose. Pirate Patch and the black bonnet attack. London: Orchard, 2008.
Encontre o texto completo da fonteCorporation, Port Authority Trans-Hudson, ed. Draft scope: Permanent World Trade Center PATH terminal : environmental impact statement. New York, N.Y.]: [The Port Authority of NY & NJ], 2003.
Encontre o texto completo da fonteKostera, Monika. The University of Hope. Oxford: Oxford University Press, 2024. http://dx.doi.org/10.1093/9780191996948.001.0001.
Texto completo da fonte1530-1610, Scupoli Lorenzo, ed. Spiritual combat: How to win your spiritual battles and attain inner peace ; plus, Interior peace : the path to paradise. Manchester, N.H: Sophia Institute Press, 2002.
Encontre o texto completo da fonteDeMaria, Rusel, e Zach Meston. Sega Genesis Secrets, Volume 2. Rocklin, CA: Prima Publishing, 1991.
Encontre o texto completo da fonteSandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. New York: Bantam Books, 1992.
Encontre o texto completo da fonteOlson, R. M. Attack Path: A space opera adventure. RM Olson, 2021.
Encontre o texto completo da fonteThomson, Miller. Path: ANXIETY and PANIC ATTACK ELIMINATION PROGRAM. Independently Published, 2018.
Encontre o texto completo da fonteThe Way to a Healthy Heart: The Zero Heart Attack Path. Penguin Global, 2004.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Attack Path"
Salfer, Martin. "Single-Path Attack Graph Algorithm". In Automotive Security Analyzer for Exploitability Risks, 131–55. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_4.
Texto completo da fonteSalfer, Martin. "Multi-Path Attack Graph Algorithm". In Automotive Security Analyzer for Exploitability Risks, 157–207. Wiesbaden: Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43506-6_5.
Texto completo da fonteGonda, Tom, Rami Puzis e Bracha Shapira. "Scalable Attack Path Finding for Increased Security". In Lecture Notes in Computer Science, 234–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60080-2_18.
Texto completo da fonteKavallieratos, Georgios, e Sokratis Katsikas. "Attack Path Analysis for Cyber Physical Systems". In Computer Security, 19–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64330-0_2.
Texto completo da fonteJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang e Wanlei Zhou. "Source Identification Under Snapshots: A Sample Path Based Source Estimator". In Malicious Attack Propagation and Source Identification, 79–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_7.
Texto completo da fonteDucousso, Soline, Sébastien Bardin e Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis". In Programming Languages and Systems, 59–89. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.
Texto completo da fonteRao, Yu, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou e Jinghua Bai. "Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network". In Communications in Computer and Information Science, 97–114. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_8.
Texto completo da fonteFiazza, Maria-Camilla, Michele Peroli e Luca Viganò. "Attack Interference: A Path to Defending Security Protocols". In E-Business and Telecommunications, 296–314. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35755-8_21.
Texto completo da fonteIdika, Nwokedi, e Bharat Bhargava. "A Kolmogorov Complexity Approach for Measuring Attack Path Complexity". In IFIP Advances in Information and Communication Technology, 281–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21424-0_23.
Texto completo da fonteShosha, Ahmed F., Joshua I. James e Pavel Gladyshev. "A Novel Methodology for Malware Intrusion Attack Path Reconstruction". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 131–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_11.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Attack Path"
Lu, Ziang, Lu Chen, Yong Li, Guangxin Guo e Tengyan Wang. "Attack Path Extraction based on VGAE and DBSCAN". In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech), 9–14. IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00013.
Texto completo da fonteWang, Zijin, Minrui Fei, Yao Xiong e Aimin Wang. "Dynamic Attack Path Prediction and Visualization for Industrial Cyber-Physical Systems Under Cyber Attacks". In 2024 43rd Chinese Control Conference (CCC), 9005–10. IEEE, 2024. http://dx.doi.org/10.23919/ccc63176.2024.10662270.
Texto completo da fonteYadav, Mukesh, e Peter J. Hawrylak. "An Empirical Study on Analyzing the Evidence-Based Method in Attack Path Detection". In 2024 Resilience Week (RWS), 1–6. IEEE, 2024. https://doi.org/10.1109/rws62797.2024.10799307.
Texto completo da fonteShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, Jingbo Zhou, Kimia Zamiri Azar, Farimah Farahmandi e Mark Tehranipoor. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures". In ISTFA 2024, 332–41. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Texto completo da fonteMalpica, Carlos. "Parametric Investigation on the Use of Lateral and Longitudinal Rotor Trim Flapping for Tiltrotor Noise Reduction". In Vertical Flight Society 73rd Annual Forum & Technology Display, 1–15. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12287.
Texto completo da fonteSubaşi, Engin, e Muharrem Mercımek. "Attack Path Analysis and Security Concept Design for OTA Enabled Electric Power Steering System". In 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), 1–7. IEEE, 2024. https://doi.org/10.1109/asyu62119.2024.10756981.
Texto completo da fonteStelte, Bjorn. "ISP traceback - Attack path detection". In 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, 2013. http://dx.doi.org/10.1109/cns.2013.6682728.
Texto completo da fonteChen, Biqiong, Yanhua Liu, Shijin Li e Xiaoling Gao. "Attack Intent Analysis Method Based on Attack Path Graph". In ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3371676.3371680.
Texto completo da fonteLi, Shijin, Minchen Zhu e Yanbin Qiu. "Attack Intent Analysis Method Based on Attack Path Graph". In the 8th International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3290480.3290502.
Texto completo da fonteChen, Tianjiaojiao, Huixiang Zhang, Tianluo Liu e Renjie Li. "Research on Cyber Attack Modeling and Attack Path Discovery". In 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis (CMSDA). IEEE, 2022. http://dx.doi.org/10.1109/cmsda58069.2022.00068.
Texto completo da fonteRelatórios de organizações sobre o assunto "Attack Path"
Floyd, Jason, e Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, outubro de 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Texto completo da fonteGhosh, Anup, Steve Noel e Sushil Jajodia. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference. Fort Belvoir, VA: Defense Technical Information Center, agosto de 2011. http://dx.doi.org/10.21236/ada563714.
Texto completo da fonteKránitz, Péter Pál. Georgia’s EU-Accession Path in Light of the “Foreign Agent Law” and Hungary’s EU-Presidency. Magyar Külügyi Intézet, 2024. http://dx.doi.org/10.47683/kkielemzesek.ke-2024.17.
Texto completo da fontePrahl, D., e M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), novembro de 2014. http://dx.doi.org/10.2172/1220378.
Texto completo da fontePrahl, D., e M. Shaffer. Moisture Risk in Unvented Attics Due to Air Leakage Paths. Office of Scientific and Technical Information (OSTI), novembro de 2014. http://dx.doi.org/10.2172/1164104.
Texto completo da fonteBukauskas, Linas, Agnė Brilingaitė, Kęstutis Ikamas, Aušrius Juozapavičius e Daiva Lepaitė. Cybersecurity competence map of Lithuania. Vilnius University, Lithuania, agosto de 2022. http://dx.doi.org/10.15388/cibersek.2022.
Texto completo da fonteWeinschenk, Craig, Keith Stakes e Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, dezembro de 2017. http://dx.doi.org/10.54206/102376/nevx1787.
Texto completo da fonteMadrzykowski, Daniel. Firefighter Equipment Operational Environment: Evaluation of Thermal Conditions. UL Firefighter Safety Research Institute, agosto de 2017. http://dx.doi.org/10.54206/102376/igfm4492.
Texto completo da fonteWeinschenk, Craig, Keith Stakes e Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, dezembro de 2017. http://dx.doi.org/10.54206/102376/gmax3657.
Texto completo da fonteHausmann, Ricardo, Andrés Rodríguez-Clare e Dani Rodrik. Towards a Strategy for Economic Growth in Uruguay. Inter-American Development Bank, fevereiro de 2005. http://dx.doi.org/10.18235/0008722.
Texto completo da fonte