Search

Your search keyword '"active defense"' showing total 551 results

Search Constraints

Start Over You searched for: Descriptor "active defense" Remove constraint Descriptor: "active defense"
551 results on '"active defense"'

Search Results

201. Detection and Defense of SYN Flood Attack Based on Winpcap

202. MDSA: Security Scheduling Mechanism for a Reliable SDN Control Layer Based on Mimic Defense

203. Active Defense Techniques

204. Pressing pause: A new approach for international cybersecurity norm development

205. Деякі підходи щодо стратегії протистояння та протидії агресору

206. Towards Building Active Defense Systems for Software Applications

207. The Self-learning Network Defense Based on Game Theory

208. Moving Target Defense Techniques: A Survey

209. Rethinking Active Defense: A Comparative Analysis of Proactive Cybersecurity Policymaking

211. Effects of estrus cycle stage on defensive behavior in female Long-Evans hooded rats

213. Adaptive nonsingular terminal sliding mode cooperative guidance law in active defense scenario

214. Engage Attackers with Active Defense

215. Research on the Prevention System Models and Defense Process of Network Cultural Safety

216. Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory

217. Deception strategies for web application security: application-layer approaches and a testing platform

218. Adaptive Kalman filter for tracking of fast accelerating targets

219. Suppression of false targets from active defense radar sensors

220. Increasing Cyber Resiliency of Industrial Control Systems

221. The Gauls under siege: defending against Rome

222. Framework and principles for active cyber defense

223. The Application of Data Mining in the Honeypot System

224. Coupling immunity and programmed cell suicide in prokaryotes: Life-or-death choices

225. An Approach To A Graph-Based Active Cyber Defense Model

226. Guidance strategies for interceptor against active defense spacecraft in two-on-two engagement.

227. Nest defense of the red-backed shrike Lanius collurio against five corvid species

228. Defense induced by a bis-aryl methanone compound leads to resistance in potato against Phytophthora infestans

229. Research the Computer Forensics Based on Network

230. Privateers in cyberspace: Aargh!

235. An Active Defense Models Based on Trust Evaluation of Heterogeneous Wireless Networks

236. AHEAD

237. Preventive strike vs. counter intelligence and protection for a target under attack

238. Research on lightning warning method based on the characteristics of atmospheric electric field

239. Catalase activity in healthy and inflamed pulp tissues of permanent teeth in young people

240. A study of aircraft-defense missile cooperative active defense technology

241. Feature Design and Selection Based on Web Application-Oriented Active Threat Awareness Model

243. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

244. Active protection against PCB physical tampering

245. Defining Sufficient Household Preparedness for Active Wildfire Defense: Toward an Australian Baseline

246. Private-Sector Cyberweapons: Strategic and Other Consequences

249. Immuno-inspired Security Defense Mechanisms for Computer Systems

250. Mechanisms of the innate immunity in the respiratory system

Catalog

Books, media, physical & digital resources