Книги з теми "Attacks detection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Attacks detection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Li, Beibei, Rongxing Lu, and Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58672-0.
Raghavan, S. V., and E. Dawson, eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. India: Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6.
K, Kokula Krishna Hari, ed. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Casola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Raghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Nelson A. Rockefeller Institute of Government., ed. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
National Academy of Sciences (U.S.). Committee on Effectiveness of National Biosurveillance Systems, BioWatch and the Public Health System. BioWatch and public health surveillance: Evaluating systems for the early detection of biological threats. Washington, D.C: National Academies Press, 2011.
Salem, Malek Ben. Towards Effective Masquerade Attack Detection. [New York, N.Y.?]: [publisher not identified], 2012.
Wan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante, and Stan Z. Li. Multi-Modal Face Presentation Attack Detection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-031-01824-4.
Wan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante, and Stan Z. Li. Advances in Face Presentation Attack Detection. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-32906-7.
Stewin, Patrick. Detecting Peripheral-based Attacks on the Host Memory. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13515-1.
Pande, Sagar Dhanraj, and Aditya Khamparia. Networks Attack Detection on 5G Networks using Data Mining Techniques. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003470281.
Levy, Elizabeth. The snack attack mystery. New York: Scholastic, 1995.
Chevat, Richie. Shark attack. New York: Bantam Books, 1996.
K, kokula Krishna Hari, ed. Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique: ICCS 2014. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Joanne, White, Mountain Pine Beetle Initiative (Canada), and Pacific Forestry Centre, eds. Detection of red attack stage mountain pine beetle infestation with high spatial resolution satellite imagery. Victoria, B.C: Canadian Forest Service, Pacific Forestry Centre, 2005.
Yasuda, Anita. The slime attack. North Mankato, Minn: Capstone Stone Arch Books, 2013.
Haberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.
Niemann, K. O. Assessment of potential for remote sensing detection of bark beetle-infested areas during green attack: A literature review. Victoria, B.C: Natural Resources Canada, Canadian Forest Service, Pacific Forestry Centre, 2004.
Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, and İlker Özçelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Brooks, Richard, and Ilker Ozcelik. Distributed Denial of Service Attacks: Real-World Detection and Mitigation. Taylor & Francis Group, 2020.
Li, Beibei, Rongxing Lu, and Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2020.
Busch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez, and Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Li, Beibei, Rongxing Lu, and Gaoxi Xiao. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer International Publishing AG, 2021.
Busch, Christoph, Christian Rathgeb, Ruben Vera-Rodriguez, and Ruben Tolosana. Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks. Springer International Publishing AG, 2021.
Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2018.
Gunasekhar, T., K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019.
Medicine, Institute of, Board on Chemical Sciences and Technology, Board on Health Sciences Policy, National Research Council, and Board on Life Sciences. BioWatch and Public Health Surveillance : Evaluating Systems for the Early Detection of Biological Threats: Abbreviated Version. National Academies Press, 2011.
Raghavan, S. V., and E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2011.
Raghavan, S. V., and E. Dawson. An Investigation into the Detection and Mitigation of Denial of Service Attacks: Critical Information Infrastructure Protection. Springer, 2013.
Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Computer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Ruxton, Graeme D., William L. Allen, Thomas N. Sherratt, and Michael P. Speed. Avoiding Attack. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.001.0001.
Ruxton, Graeme D., William L. Allen, Thomas N. Sherratt, and Michael P. Speed. Advertising elusiveness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0009.
Pell, Stephanie K. Systematic Government Access to Private-Sector Data in the United States I. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0008.
Li, Stan Z., Escalera, Jun Wan, Guodong Guo, and Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Li, Stan Z., Escalera, Jun Wan, Guodong Guo, and Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Li, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo, and Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Morgan & Claypool Publishers, 2020.
Li, Stan Z., Jun Wan, Sergio Escalera, Guodong Guo, and Hugo Jair Escalante. Multi-Modal Face Presentation Attack Detection. Springer International Publishing AG, 2020.
Cassiman, David, and Wouter Meersseman. Tyrosinemia Type I. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199972135.003.0013.
Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.