Добірка наукової літератури з теми "Perimeter defense"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Perimeter defense".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Perimeter defense"

1

Wallace, Tom. "Optimize Perimeter Defense for Utility Security." Opflow 43, no. 5 (May 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Andriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS." Health and Ecology Issues, no. 1 (March 28, 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.

Повний текст джерела
Анотація:
Objective : to determine the features of the changes of perimeter body sizes of male cadets in the conditions of the pedagogical process at a higher educational institution of I level of accreditation. Material and methods . We have conducted longitudinal (I, II, III years of study) determination of perimeter body sizes of 87 male cadets and analyzed the features of the changes in these parameters in the conditions of the pedagogical process during a three-year period. The analysis of the indicators was conducted using «Statistica», 6.1 (StatSoft) by parametric methods of assessment. Results. Based on the obtained data we have defined the characteristic features of the annual changes of the perimeter body parameters during the three-year period of study in conditions of the pedagogical process of a civil defense college. We have determined the increase dynamics of most of the average indicators throughout the period of study at the civil defense college, except for the perimeters of the neck, pelvis and abdomen, where the decrease of the sizes has been found. Conclusions. We have revealed reliable differences when comparing the annual changes of the perimeters of the pelvis, abdomen, thorax (during a breathing pause, inhale, exhale), the shoulder, forearm, hand, thigh, upper third of the leg, the instep of the foot. The annual changes of perimeter sizes of the neck, pelvis and abdomen in the male cadets during the second year of training were bigger than during the first one. The perimeter increase parameters of the chest (during a breathing pause, inhale, exhale), shoulder, forearm, wrist, hand, hip, upper and lower third of the leg, foot, the instep of foot in the male cadets dominated when they were in the first year of study.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Crawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers, and J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria." Proceedings of the National Academy of Sciences 109, no. 27 (June 18, 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Daly-Grafstein, Daniel, and Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA." Journal of Sports Analytics 6, no. 4 (January 7, 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.

Повний текст джерела
Анотація:
As 3-point shooting in the NBA continues to increase, the importance of perimeter defense has never been greater. Perimeter defenders are often evaluated by their ability to tightly contest shots, but how exactly does contesting a jump shot cause a decrease in expected shooting percentage, and can we use this insight to better assess perimeter defender ability? In this paper we analyze over 50,000 shot trajectories from the NBA to explain why, in terms of impact on shot trajectories, shooters tend to miss more when tightly contested. We present a variety of results derived from this shot trajectory data. Additionally, pairing trajectory data with features such as defender height, distance, and contest angle, we are able to evaluate not just perimeter defenders, but also shooters’ resilience to defensive pressure. Utilizing shot trajectories and corresponding modeled shot-make probabilities, we are able to create perimeter defensive metrics that are more accurate and less variable than traditional metrics like opponent field goal percentage.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kim, Kwon-il, Yeon-seung Ryu, and Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter." Korean Journal of Industry Security 11, no. 1 (April 30, 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chen, S., and Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks." IEEE Transactions on Parallel and Distributed Systems 16, no. 6 (June 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Shishika, Daigo, James Paulos, and Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games." IEEE Robotics and Automation Letters 5, no. 2 (April 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Edwards, Paul M., and Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter." Journal of Military History 62, no. 4 (October 1998): 960. http://dx.doi.org/10.2307/120234.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Al-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Повний текст джерела
Анотація:
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Steingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (April 3, 2021): 597. http://dx.doi.org/10.3390/sym13040597.

Повний текст джерела
Анотація:
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. This architecture leaves detection gaps that are difficult to fill with existing security controls not specifically designed for that role. Rather than using prevention alone, a strategy that attackers have consistently succeeded against, defenders are adopting a more balanced strategy that includes detection and response. Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. They also have some limitations because they are not designed to catch credential harvesting or attacks based on what appears as authorized access. They are also often seen as complex and prone to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Perimeter defense"

1

Lin, Kung-Sung, and 林坤松. "Fiber-Optic Multi-Defense-Area Perimeter Intrusion Detection System With Laser Cavity and Michelson Interferometer Configured in Each Defensed Area." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/mc2q3c.

Повний текст джерела
Анотація:
碩士
國立清華大學
光電工程研究所
105
In this paper, we propose a perimeter intrusion detection system which uses Michelson interferometers. This system has four defense zone and each zone employs a specified wavelength to detect intrusion. The goal of this paper is trying to find the thresholds at different weathers and situations. We preset three thresholds to decide whether the disturbance is intrusion or not. When the disturbance occurs and the detected signal meets the conditions for intrusion, the proposed algorithm triggers an alarm. In other words, if we want to reduce false alarm rate effectively, we just need to preset the right thresholds at first.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Perimeter defense"

1

Fighting on the brink: Defense of the Pusan Perimeter. Paducah, KY: Turner Pub., 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Weaver, Randy. Guide to tactical perimeter defense: Becoming a security network specialist. Australia: Thomson/Course Technology, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Guide to Tactical Perimeter Defense. Course Technology, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Taylor & Francis Group, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. Auerbach Publishers, Incorporated, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Riggs, Cliff. Network Perimeter Security: Building Defense In-Depth. AUERBACH, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tactical Perimeter Defense (SCP SC0-451) LATEST EXAMINATION QUESTIONS. Independently Published, 2020.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ent, Uzal W. Fighting on the Brink: Defense of the Pusan Perimeter. Turner Publishing Company (KY), 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Perimeter defense"

1

Shishika, Daigo, and Vijay Kumar. "A Review of Multi Agent Perimeter Defense Games." In Lecture Notes in Computer Science, 472–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chen, Austin K., Douglas G. Macharet, Daigo Shishika, George J. Pappas, and Vijay Kumar. "Optimal Multi-robot Perimeter Defense Using Flow Networks." In Distributed Autonomous Robotic Systems, 282–93. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92790-5_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Adler, Aviv, Oscar Mickelin, Ragesh K. Ramachandran, Gaurav S. Sukhatme, and Sertac Karaman. "The Role of Heterogeneity in Autonomous Perimeter Defense Problems." In Algorithmic Foundations of Robotics XV, 115–31. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21090-7_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tanimoto, Shigeaki, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, and Atsushi Kanai. "Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines." In Advances in Networked-based Information Systems, 413–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29029-0_39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jenkinson, A. J. "Digital Perimeter Defences." In Digital Blood on Their Hands, 53–60. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jenkinson, A. J. "Perimeter Defence Theory in Context." In Digital Blood on Their Hands, 153–54. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-24.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Na, Won Shik, Jeom Goo Kim, and Intae Ryoo. "Perimeter Defence Policy Model of Cascade MPLS VPN Networks." In Computational Science and Its Applications – ICCSA 2004, 1026–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24707-4_115.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kizza, Joseph, and Florence Migga Kizza. "Perimeter Defense; The Firewall." In Securing the Information Infrastructure, 209–38. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-379-1.ch011.

Повний текст джерела
Анотація:
As companies increasingly build private networks and connect them onto the Internet, securing such private networks has become a great concern. These networks are facing threats from two fronts: the external Internet and the users from within the company network. This requires security protocols that will effectively deal with these two fronts by first restricting access to the network from outside and controlling access between subnets from within. Ideal protocols to do such tasks are found in firewalls. A firewall is hardware, software, or a combination of both that monitors and filters traffic packets that attempt to either enter or leave the protected private network. It is a tool that separates a protected network or part of a network, and now increasingly a user’s personal computer (PC), from an unprotected network—the “bad network,” like the Internet.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

"Defining the Defense Perimeter." In The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.2307/j.ctv1vbd1b7.8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"4 Defining the Defense Perimeter." In The Strategy of Denial, 65–78. Yale University Press, 2021. http://dx.doi.org/10.12987/9780300262643-006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Perimeter defense"

1

Lee, Elijah S., Daigo Shishika, and Vijay Kumar. "Perimeter-defense Game between Aerial Defender and Ground Intruder." In 2020 59th IEEE Conference on Decision and Control (CDC). IEEE, 2020. http://dx.doi.org/10.1109/cdc42340.2020.9304213.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bajaj, Shivam, Eric Torng, and Shaunak D. Bopardikar. "Competitive Perimeter Defense on a Line." In 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9483308.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Bajaj, Shivam, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia, and David W. Casbeer. "Competitive Perimeter Defense of Conical Environments." In 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022. http://dx.doi.org/10.1109/cdc51059.2022.9993007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Blackmon, F., and J. Pollock. "Blue Rose perimeter defense and security system." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.664409.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Guerrero-Bonilla, Luis, Carlos Nieto-Granda, and Magnus Egerstedt. "Robust Perimeter Defense using Control Barrier Functions." In 2021 International Symposium on Multi-Robot and Multi-Agent Systems (MRS). IEEE, 2021. http://dx.doi.org/10.1109/mrs50823.2021.9620572.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Smith III, James F. "Perimeter intrusion detection and intruder classification." In SPIE Defense, Security, and Sensing, edited by Ivan Kadar. SPIE, 2009. http://dx.doi.org/10.1117/12.819895.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Forrai, David P., John W. Devitt, Thomas C. Back, William J. Rogers, and Steven M. Gaulding. "EO/IR sensor performance for site perimeter security." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.604440.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Macharet, Douglas G., Austin K. Chen, Daigo Shishika, George J. Pappas, and Vijay Kumar. "Adaptive Partitioning for Coordinated Multi-agent Perimeter Defense." In 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2020. http://dx.doi.org/10.1109/iros45743.2020.9341417.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Shishika, Daigo, and Vijay Kumar. "Local-game Decomposition for Multiplayer Perimeter-defense Problem." In 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8618879.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mattikalli, Raju, Roman Fresnedo, Paul Frank, Summer Locke, and Zack Thunemann. "Optimal Sensor Selection and Placement for Perimeter Defense." In 2007 IEEE International Conference on Automation Science and Engineering. IEEE, 2007. http://dx.doi.org/10.1109/coase.2007.4341848.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Perimeter defense"

1

Riendeau, John, and Juergen Keil. Undersea Perimeter Security Integrated Defense Environment (UPSIDE). Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada553240.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Nowowiejski, Dean A. Comrades in Arms: The Influence of George S. Patton on Walton H. Walker's Pusan Perimeter Defense. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada409925.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії