Добірка наукової літератури з теми "Attack Investigation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Attack Investigation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Attack Investigation"
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Повний текст джерелаWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Повний текст джерелаZhu, Ying. "Attack Pattern Discovery in Forensic Investigation of Network Attacks." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1349–57. http://dx.doi.org/10.1109/jsac.2011.110802.
Повний текст джерелаStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Повний текст джерелаD, Yuvaraj, Sivaram M, A. Mohamed Uvaze Ahamed, and Nageswari S. "Some Investigation on DDOS Attack Models in Mobile Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (September 25, 2019): 71. http://dx.doi.org/10.3991/ijim.v13i10.11304.
Повний текст джерелаKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (January 30, 2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Повний текст джерелаYeng, Prosper Kandabongee, Muhammad Ali Fauzi, Bian Yang, and Peter Nimbe. "Investigation into Phishing Risk Behaviour among Healthcare Staff." Information 13, no. 8 (August 18, 2022): 392. http://dx.doi.org/10.3390/info13080392.
Повний текст джерелаZharova, O. Yu. "APPLICATION OF NETWORK LOAD ANALYSIS SYSTEM FOR DETECTING START OF DDOS ATTACK." Issues of radio electronics, no. 11 (November 20, 2018): 48–52. http://dx.doi.org/10.21778/2218-5453-2018-11-48-52.
Повний текст джерелаWu, Siwei, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, and Kui Ren. "Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum." ACM Transactions on Software Engineering and Methodology 31, no. 3 (July 31, 2022): 1–33. http://dx.doi.org/10.1145/3505263.
Повний текст джерелаMHolkar, Amit, Neha Shinde Holkar, and Dhiiraj Nitnawwre. "Investigation of Application Attack on MANET." International Journal of Computer Applications 71, no. 14 (June 26, 2013): 42–45. http://dx.doi.org/10.5120/12430-9190.
Повний текст джерелаДисертації з теми "Attack Investigation"
Fang, Pengcheng. "REPTRACKER:TOWARDS AUTOMATIC ATTACK INVESTIGATION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1550696995596089.
Повний текст джерелаVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Повний текст джерелаMathre, John Mark. "Computational investigation of incompressible airfoil flows at high angles of attack." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/22965.
Повний текст джерелаCebeci's viscous/inviscid interaction program was applied to the analysis of steady, two dimensional, incompressible flow past four airfoils, the NACA 66₃-018, 0010 (Modified), 4412 and the Wortmann FX 63-137. Detailed comparisons with the available experimental results show that the essential features are correctly modelled, but that significant discrepancies are found in regions of flow separations.
http://archive.org/details/computationalinv00math
Lieutenant, United States Navy
Tait, Sean William. "An investigation of fore-body aerodynamics during the velocity vector roll." Thesis, University of the West of Scotland, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.265929.
Повний текст джерелаChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Повний текст джерелаJhangiani, Rajiv Sunil. "Processing terror : an investigation into the immediate and short-term psychological effects of a terrorist attack." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2780.
Повний текст джерелаBrueckner, Rene. "Accelerating the thaumasite form of sulfate attack and an investigation of its effects on skin friction." Thesis, University of Birmingham, 2008. http://etheses.bham.ac.uk//id/eprint/176/.
Повний текст джерелаHovmark, Olle, and Emma Schüldt. "Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280102.
Повний текст джерелаCyberattacker mot alla typer av system är ett växande problem i samhället. Eftersom Mac-operativsystemen blir allt vanligare, blir attackerna mot dem också vanligare. Probabilistiska attackgrafer är ett sätt att modellera och visualisera cyberattacker. Meta Attack Language är ett språk som kan användas för att skapa domänspecifika språk som i sin tur kan användas för att modellera en cyberattack på den specifika domänen med en probabilistisk attackgraf. Denna rapport undersöker hur Meta Attack Language kan utvidgas så att det kan användas för att skapa attackgrafer som innehåller digitala forensiska bevis, genom att undersöka attacker mot Mac- operativsystem där bevis i form av property-list-filer har lämnats. MITRE ATT&CK-matrisen är en kunskapsbas med information om cyberattacker. En studie av denna matris gjordes för att ta reda på vilka olika typer av bevis som har hittats efter attacker på ett Mac-operativsystem samt för att motivera varför denna rapport fokuserar på bevis i form av property-list-filer. En studie av grå litteratur gjordes sedan för att undersöka olika typer av attacker som har lämnat bevis i form av property-list-filer. Studierna visade att det finns en mängd bevis som kan lämnas från ett angrepp på ett Mac-operativsystem och att de flesta bevis i form av property-list-filer användes av attackeraren för att göra attacken tålig mot sådant som omstart av systemet. De visade också att property-list-filerna ofta placerades i rotkatalogen i filsystemet. Studierna visade också att motståndaren ofta försökte dölja filerna genom att ge dem namn som vanligtvis används på ett Mac-operativsystem. Efter studierna genomförts skapades en lista med krav som måste uppfyllas av en utvidgning av Meta Attack. Denna lista baserades på resultaten från studierna och inkluderade krav som säger att det till exempel måste finnas sätt att uttrycka namnet och platsen för en fil, metoder som angriparen använder för att undvika upptäckt, samband mellan olika typer av bevis och samband mellan bevis och attacksteg.
Waring, Howard Linton. "An investigation into the nature and response to treatment of panic attack symptoms in general practice attenders." Thesis, University of Aberdeen, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.277490.
Повний текст джерелаSommers, John Douglas. "An experimental investigation of support strut interference on a three-percent fighter model at high angles of attack." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25926.
Повний текст джерелаКниги з теми "Attack Investigation"
Holmes, Cameron H. Developing plans to attack drug traffickers' assets. Washington, DC (633 Indiana Ave., NW., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 1992.
Знайти повний текст джерелаHolmes, Cameron H. Developing plans to attack drug traffickers' assets. Washington, DC (633 Indiana Ave., NW., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 1992.
Знайти повний текст джерелаForum, Police Executive Research, and United States. Bureau of Justice Assistance., eds. Developing plans to attack drug traffickers' assets. Washington, DC (633 Indiana Ave., NW., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 1992.
Знайти повний текст джерела1970-, Giles Matthew F., and Rothwell Peter M, eds. Transient ischemic attack and stroke: Diagnosis, investigation, and management. Cambridge: Cambridge University Press, 2009.
Знайти повний текст джерелаRooney, Anne. Computer science and IT: Investigating a cyber attack. Chicago, Ill: Capstone Heinemann Library, 2014.
Знайти повний текст джерелаOn the attack against ROK Ship Cheonan. [Seoul]: Ministry of National Defense Republic of Korea, 2010.
Знайти повний текст джерелаMathre, John Mark. Computational investigation of incompressible airfoil flows at high angles of attack. Monterey, Calif: Naval Postgraduate School, 1988.
Знайти повний текст джерелаGuillemin, Jeanne. American anthrax: Fear, crime, and the investigation of the nation's deadliest bioterror attack. New York: Times Books, 2011.
Знайти повний текст джерелаKeeley, Jennifer. Deterring and investigating attack: The role of the FBI and CIA. San Diego, [Calif.]: Lucent Books, 2004.
Знайти повний текст джерелаSehgal, A. K. Investigation of nose bluntness and angle of attack effects on slender bodies in viscous hypertension flows. Norfolk, Va: Dept. of Mechanical Engineering & Mechanics, College of Engineering & Technology, Old Dominion University, 1991.
Знайти повний текст джерелаЧастини книг з теми "Attack Investigation"
Sembiring, Irwan, and Yonathan Satrio Nugroho. "Network Forensics Investigation for Botnet Attack." In IT Convergence and Security 2017, 228–36. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6454-8_29.
Повний текст джерелаMiyakawa, Junichi, Yuichi Shimbo, and Shigeru Aso. "Numerical and Experimental Investigation on Dynamic Stall Vortex." In Fluid Dynamics of High Angle of Attack, 79–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-52460-8_4.
Повний текст джерелаCheng, Bin, Tsubasa Kikuta, Yoshinao Toshimitsu, and Takamichi Saito. "Investigation of Power Consumption Attack on Android Devices." In Advanced Information Networking and Applications, 567–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75075-6_46.
Повний текст джерелаM. Milajerdi, Sadegh, Birhanu Eshete, Rigel Gjomemo, and Venkat N. Venkatakrishnan. "ProPatrol: Attack Investigation via Extracted High-Level Tasks." In Information Systems Security, 107–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_6.
Повний текст джерелаNelson, Robert C., and Andrew S. Arena. "Experimental Investigation of Wing Rock of Slender Wings and Aircraft Configurations." In Fluid Dynamics of High Angle of Attack, 413–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-52460-8_29.
Повний текст джерелаYin, Xieyuan, Xiyun Lu, and Lixian Zhuang. "Investigation on the Flow Characteristics for Oscillating Airfoils at High Incidence." In Fluid Dynamics of High Angle of Attack, 133–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-52460-8_8.
Повний текст джерелаSzynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains, 120–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Повний текст джерелаYin, Libo, Chonghua Wang, Jun Li, Rongchao Yin, Yang Jiao, and Hao Jiang. "When Side Channel Becomes Good: Kernel Malware Attack Investigation." In Lecture Notes in Computer Science, 571–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24265-7_49.
Повний текст джерелаWang, Kai, Guillaume Lavoué, Florence Denis, and Atilla Baskurt. "Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation." In Information Hiding, 50–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77370-2_4.
Повний текст джерелаSurya, S., and S. Ramamoorthy. "An Investigation of Paralysis Attack Using Machine Learning Approach." In Proceedings of International Conference on Deep Learning, Computing and Intelligence, 143–53. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5652-1_12.
Повний текст джерелаТези доповідей конференцій з теми "Attack Investigation"
Yasir Khalid, Uwe Dippel, and Salman Yussof. "Measurement program: Investigation on cache-timing attack." In 2009 IEEE 9th Malaysia International Conference on Communications (MICC). IEEE, 2009. http://dx.doi.org/10.1109/micc.2009.5431494.
Повний текст джерелаMellor, Jake, Allen Shelton, and Sara Tehranipoor. "Investigation of Reinforcement Learning-based Attack on Logic Locking." In 2021 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 2021. http://dx.doi.org/10.1109/hst53381.2021.9619800.
Повний текст джерелаAlibeigi, Sepideh. "Wind Tunnel Investigation of the Flow Field on Slender Sharp-Edged Half Delta Wings." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-37014.
Повний текст джерелаJun, Jae-Hyun, Hyunju Oh, and Sung-Ho Kim. "DDoS flooding attack detection through a step-by-step investigation." In 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications (NESEA). IEEE, 2011. http://dx.doi.org/10.1109/nesea.2011.6144944.
Повний текст джерелаXu, Zhiqiang, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, and Dan Meng. "DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833632.
Повний текст джерела"Investigation of Concrete Deterioration Due toSulfate Attack--A Case History." In SP-100: Concrete Durability: Proceedings of Katharine and Bryant Mather International Symposium. American Concrete Institute, 1987. http://dx.doi.org/10.14359/3129.
Повний текст джерелаTaylor, Gordon, Ismet Gursul, and Doug Greenwell. "An Investigation of Support Interference in High Angle of Attack Testing." In 41st Aerospace Sciences Meeting and Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2003. http://dx.doi.org/10.2514/6.2003-1105.
Повний текст джерелаHAWK, J., R. BARNETT, P. O'NEIL, and N. WALTERS. "Investigation of high angle of attack vortical flows over delta wings." In 28th Aerospace Sciences Meeting. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1990. http://dx.doi.org/10.2514/6.1990-101.
Повний текст джерелаKwon, Yonghwi, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, et al. "MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/ndss.2018.23306.
Повний текст джерелаHassan, Wajih Ul, Mohammad A. Noureddine, Pubali Datta, and Adam Bates. "OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24270.
Повний текст джерелаЗвіти організацій з теми "Attack Investigation"
Rogers, Lawrence W., and Michael G. Alexander. Hydrodynamic Investigation of Vortical Flows for an ATTAC Configuration with Canards. Fort Belvoir, VA: Defense Technical Information Center, June 1992. http://dx.doi.org/10.21236/ada253928.
Повний текст джерелаAvni, Adi, and Kirankumar S. Mysore. Functional Genomics Approach to Identify Signaling Components Involved in Defense Responses Induced by the Ethylene Inducing Xyalanase Elicitor. United States Department of Agriculture, December 2009. http://dx.doi.org/10.32747/2009.7697100.bard.
Повний текст джерелаSchutt, Timothy C., and Manoj K. Shukla. Computational Investigation on Interactions Between Some Munitions Compounds and Humic Substances. Engineer Research and Development Center (U.S.), February 2021. http://dx.doi.org/10.21079/11681/39703.
Повний текст джерелаStakes, Keith, and Joseph Willi. Study of the Fire Service Training Environment: Safety, Fidelity, and Exposure -- Acquired Structures. UL Firefighter Safety Research Institute, March 2019. http://dx.doi.org/10.54206/102376/ceci9490.
Повний текст джерелаJeong, Stephen, Sarah Stawiski, Sol Bukin, and Heather Champion. Stemming the Great Resignation through Leadership Development. Center for Creative Leadership, 2022. http://dx.doi.org/10.35613/ccl.2022.2051.
Повний текст джерелаMathur, Shishur, and Ralph Robinson. Transportation Utility Fee to Fund Transit in California. Mineta Transportation Institute, June 2022. http://dx.doi.org/10.31979/mti.2022.2032.
Повний текст джерелаSessa, Guido, and Gregory B. Martin. molecular link from PAMP perception to a MAPK cascade associated with tomato disease resistance. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597918.bard.
Повний текст джерелаHeinz, Kevin, Itamar Glazer, Moshe Coll, Amanda Chau, and Andrew Chow. Use of multiple biological control agents for control of western flower thrips. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7613875.bard.
Повний текст джерелаRukundo, Solomon. Tax Amnesties in Africa: An Analysis of the Voluntary Disclosure Programme in Uganda. Institute of Development Studies (IDS), December 2020. http://dx.doi.org/10.19088/ictd.2020.005.
Повний текст джерелаElizur, Abigail, Amir Sagi, Gideon Hulata, Clive Jones, and Wayne Knibb. Improving Crustacean Aquaculture Production Efficiencies through Development of Monosex Populations Using Endocrine and Molecular Manipulations. United States Department of Agriculture, June 2010. http://dx.doi.org/10.32747/2010.7613890.bard.
Повний текст джерела