Добірка наукової літератури з теми "Attack on the network"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Attack on the network".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Attack on the network"
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Повний текст джерелаSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Повний текст джерелаGlăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.
Повний текст джерелаWinda Andrini Wulandari. "THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 3, no. 1 (April 20, 2018): 18–25. http://dx.doi.org/10.20527/jtiulm.v3i1.24.
Повний текст джерелаKamaleshwar, T., R. Lakshminarayanan, Yuvaraja Teekaraman, Ramya Kuppusamy, and Arun Radhakrishnan. "Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN." Wireless Communications and Mobile Computing 2021 (December 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/5143124.
Повний текст джерелаPark, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (November 14, 2020): 8079. http://dx.doi.org/10.3390/app10228079.
Повний текст джерелаQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Повний текст джерелаGandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.
Повний текст джерелаSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Повний текст джерелаMoskal, Stephen, Shanchieh Jay Yang, and Michael E. Kuhl. "Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (August 15, 2017): 13–29. http://dx.doi.org/10.1177/1548512917725408.
Повний текст джерелаДисертації з теми "Attack on the network"
Avidan, Lenoy. "Dynamic Shifting of Virtual Network Topologies for Network Attack Prevention." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/1986.
Повний текст джерелаKaraaslan, Ibrahim. "Anti-sensor Network: Distortion-based Distributed Attack In Wireless Sensor Networks." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609276/index.pdf.
Повний текст джерелаGerbert, Oscar. "Attack on the Chaos Sensor Network Protocol." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480.
Повний текст джерелаVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Повний текст джерелаTan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Повний текст джерелаHamid, Thaier K. A. "Attack graph approach to dynamic network vulnerability analysis and countermeasures." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/576432.
Повний текст джерелаSchuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.
Повний текст джерелаThesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Klaus, Christian. "Network design for reliability and resilience to attack." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41406.
Повний текст джерелаWe define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy network arcs, and then (3) the defender operates the damaged network optimally by ending a shortest path. The solution identifies a network design that minimizes post-attack path length. We show how the tri-level problem is equivalent to a single-level mixed integer program (MIP) with an exponential number of rows and columns, and solve that MIP using simultaneous row and column generation. Methods extend to network operations denied through general now constructs. The second problem considers a stochastic logistics network where arcs are present randomly and independently. Shipping from a source to a destination may be delayed until a path connecting the two is available. In the presence of storage capacity, cargo can be shipped partway. The problem's solution identifies the storage locations that minimize the cargo's waiting time for shipment. We develop and demonstrate practical methods to solve this #P-complete problem on a model instance derived from a Department of Defense humanitarian shipping network.
Mohammadnia, Hamzeh. "IoT-NETZ: Spoong Attack Mitigation in IoT Network." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260250.
Повний текст джерелаDen fenomenala tillväxten av IoT och populariteten hos mobilstationerna har snabbt ökat efterfrågan på WLAN-nätverk (känd som IEEE 802.11 och WiFi). WLAN är ett billigt alternativ för mobilnätet och är ett olicensierat spektrum för att bygga huvudplanen för att bädda in Internet i allt-och-var som helst. Samtidigt är det inte trivialt att övervaka antalet IoT och WiFi-aktiverade enheter över bostäder och företag. Därför kräver framtida WiFi nätverksarkitektur ett smidigt hantering paradigm för att tillhandahålla internt stöd och säkerhet för WiFi-nätverk.Användningen av IoT och mobilanvändningsapplikationer är beroende av skalbarhet och högpresterande beräkningar av moln. Cloud computing har helt centraliserat den nuvarande datacenters nätverksarkitektur och det ger beräkningsintensiva, höghastighetsnätverk och realtidssvar påbegäran från IoT. IoT-till-moln kommunikationen är kärnan i nätverkssäkerhetshänsyn och de har ett allvarligt behov av ständig förbättring och säkerhetshärdning inom deras internätverk. Baserat på antalet undersökningar och analyser av genererad trafik av IoT har det observerats. Det finns det betydande antalet massiva spoofing-orienterade attacker som riktar sig mot molntjänster, lanseras från komprometterad IoT.På grundval av att granska tidigare undersökningar om IoTs mest genomförda nätverksattacker finns det en utmanande och gemensam egenskap som ofta utnyttjats i de många massiva internetattackerna. Detta arbete kommer att undersöka de befintliga lösningarna som har implementerats för att skydda både traditionella och mjukvariga nätverksparadigmer. Därefter föreslår det tillvägagångssättet för detta arbete som möjliggör IoT-värdnät skyddade genom att använda SDWN inom den föreslagna modellen för att mildra poofing-orienterade nätverksattacker. Dessutom erbjuder den föreslagna lösningen miljöhållbarhet genom att spara strömförbrukning i nätverksenheter under nätverksdrift. Den praktiska förbättringen av den föreslagna modellen mäts och utvärderas inom den omgivande miljön av Mininet-WiFi.
Kenar, Serkan. "An Extensible Framework For Automated Network Attack Signature Generation." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611418/index.pdf.
Повний текст джерелаКниги з теми "Attack on the network"
College), Symposium on Computer Network Attack and International Law (1999 Naval War. Computer network attack and international law. Newport, R. I: Naval War College, 2002.
Знайти повний текст джерелаHarrison, R. F. Neur al networks,heart attack and bayesian decisions: An application oof the Boltzmann perceptron network. Sheffield: University of Sheffield, Dept. of Automatic Control & Systems Engineering, 1994.
Знайти повний текст джерелаProwell, Stacy J. Seven deadliest network attacks. Burlington, MA: Syngress, 2010.
Знайти повний текст джерелаMonte, Matthew. Network Attacks & Exploitation. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183440.
Повний текст джерелаRob, Kraus, and Borkin Mike, eds. Seven deadliest network attacks. Amsterdam: Syngress, 2010.
Знайти повний текст джерелаNetwork security attacks and countermeasures. Hershey, PA: Information Science Reference, 2015.
Знайти повний текст джерелаPerez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Amsterdam: Syngress, 2010.
Знайти повний текст джерелаKarppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. [Espoo, Finland]: VTT Technical Research Centre of Finland, 2005.
Знайти повний текст джерелаWilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.
Знайти повний текст джерелаZhou, Qing. Network Robustness under Large-Scale Attacks. New York, NY: Springer New York, 2013.
Знайти повний текст джерелаЧастини книг з теми "Attack on the network"
Wang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Attack Graph and Network Hardening." In Network Hardening, 15–22. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_3.
Повний текст джерелаMendel, Florian, Tomislav Nad, and Martin Schläffer. "Collision Attack on Boole." In Applied Cryptography and Network Security, 369–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_23.
Повний текст джерелаYang, Qing, and Lin Huang. "Mobile Network Security." In Inside Radio: An Attack and Defense Guide, 267–342. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8_8.
Повний текст джерелаTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining, 1200–1206. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-6170-8_348.
Повний текст джерелаTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining, 1671–77. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_348.
Повний текст джерелаTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining, 1–7. New York, NY: Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4614-7163-9_348-1.
Повний текст джерелаLee, Heejo, and Jong Kim. "Attack Resiliency of Network Topologies." In Parallel and Distributed Computing: Applications and Technologies, 638–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30501-9_123.
Повний текст джерелаYu, Hongbo, Gaoli Wang, Guoyan Zhang, and Xiaoyun Wang. "The Second-Preimage Attack on MD4." In Cryptology and Network Security, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599371_1.
Повний текст джерелаTodo, Yosuke, and Kazumaro Aoki. "FFT Key Recovery for Integral Attack." In Cryptology and Network Security, 64–81. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_5.
Повний текст джерелаYang, Lin, Meiqin Wang, and Siyuan Qiao. "Side Channel Cube Attack on PRESENT." In Cryptology and Network Security, 379–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10433-6_25.
Повний текст джерелаТези доповідей конференцій з теми "Attack on the network"
Alzubi, Saif, Frederic T. Stahl, and Mohamed M. Gaber. "Towards Intrusion Detection Of Previously Unknown Network Attacks." In 35th ECMS International Conference on Modelling and Simulation. ECMS, 2021. http://dx.doi.org/10.7148/2021-0035.
Повний текст джерелаChen, Yu, Shahin Jabbari, Michael Kearns, Sanjeev Khanna, and Jamie Morgenstern. "Network Formation under Random Attack and Probabilistic Spread." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/26.
Повний текст джерелаIsaac Gabriel, Odun-Ayo. "A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p11.
Повний текст джерелаIngols, Kyle, Matthew Chu, Richard Lippmann, Seth Webster, and Stephen Boyer. "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.21.
Повний текст джерелаLei, Jie, and Zhi-tang Li. "Using Network Attack Graph to Predict the Future Attacks." In 2007 Second International Conference on Communications and Networking in China. IEEE, 2007. http://dx.doi.org/10.1109/chinacom.2007.4469413.
Повний текст джерелаLi, Man, and Jinjing Cao. "Network Attack Defense Awareness." In Next Generation Computer and Information Technology 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.111.34.
Повний текст джерелаFu, Yangyang, Zheng O’Neill, Jin Wen, and Veronica Adetola. "Evaluating the Impact of Cyber-Attacks on Grid-Interactive Efficient Buildings." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-73694.
Повний текст джерелаWang, Weifeng, Xinyu Zhang, Likai Dong, Yuling Fan, Xinyi Diao, and Tao Xu. "Network Attack Detection based on Domain Attack Behavior Analysis." In 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2020. http://dx.doi.org/10.1109/cisp-bmei51763.2020.9263663.
Повний текст джерелаKasthurirathna, Dharshana, Andy Dong, Mahendrarajah Piraveenan, and Irem Y. Tumer. "The Failure Tolerance of Mechatronic Software Systems to Random and Targeted Attacks." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12188.
Повний текст джерелаTrifonov, R., D. Gotseva, and P. Stoynov. "Brute Force Network Attack Detection through Neural Networks." In 2021 XXX International Scientific Conference Electronics (ET). IEEE, 2021. http://dx.doi.org/10.1109/et52713.2021.9579905.
Повний текст джерелаЗвіти організацій з теми "Attack on the network"
May, Jack, and James Petersen. Network Attack Program. Fort Belvoir, VA: Defense Technical Information Center, June 2001. http://dx.doi.org/10.21236/ada387940.
Повний текст джерелаLenderman, Curtis C. Computer Network Attack: An Operational Tool? Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada415427.
Повний текст джерелаBusby, Daniel J. Peacetime Use of Computer Network Attack. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377624.
Повний текст джерелаTayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, May 2022. http://dx.doi.org/10.31979/mti.2022.2132.
Повний текст джерелаSalowey, J., and S. Hanna. The Network Endpoint Assessment (NEA) Asokan Attack Analysis. RFC Editor, December 2012. http://dx.doi.org/10.17487/rfc6813.
Повний текст джерелаKahn, Russell L. Attack Analyzer: A Network Analysis and Visualization Tool. Fort Belvoir, VA: Defense Technical Information Center, February 2007. http://dx.doi.org/10.21236/ada464353.
Повний текст джерелаKirichek, Galina, Vladyslav Harkusha, Artur Timenko, and Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3743.
Повний текст джерелаFU, Fabian. End-to-End and Network-wide Attack Defense Solution -Overhaul Carrier Network Security. Denmark: River Publishers, July 2016. http://dx.doi.org/10.13052/popcas006.
Повний текст джерелаWilliamson, Jennie M. Information Operations: Computer Network Attack in the 21st Century. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada402018.
Повний текст джерелаHanson, Kraig. Organization of DoD Computer Network Defense, Exploitation, and Attack Forces. Fort Belvoir, VA: Defense Technical Information Center, March 2009. http://dx.doi.org/10.21236/ada500822.
Повний текст джерела