Search

Your search keyword '"targeted attacks"' showing total 104 results

Search Constraints

Start Over You searched for: Descriptor "targeted attacks" Remove constraint Descriptor: "targeted attacks"
104 results on '"targeted attacks"'

Search Results

1. Information security outsourcing in a resource-sharing environment: The impacts of attack modes.

2. IG-Based Method for Voiceprint Universal Adversarial Perturbation Generation.

3. Targeted Clean-Label Poisoning Attacks on Federated Learning

4. DEVELOPMENT OF A MULTILOOP SECURITY SYSTEM OF INFORMATION INTERACTIONS IN SOCIO-CYBERPHYSICAL SYSTEMS.

5. Enhancing the Transferability of Targeted Attacks with Adversarial Perturbation Transform.

6. Elephant Herding Robustness Evolution Algorithm With Multi-Clan Co-Evolution Against Cyber Attacks for Scale-Free Internet of Things in Smart Cities

8. IG-Based Method for Voiceprint Universal Adversarial Perturbation Generation

9. Robustness of knowledge networks under targeted attacks: Electric vehicle field of China evidence.

10. Propagation of Bankruptcy Risk over Scale-Free Economic Networks.

11. Evaluation of the vulnerability in water distribution systems through targeted attacks

12. Probabilistic Analysis of Targeted Attacks Using Transform-Domain Adversarial Examples

13. A possible quadruple point in networks of directed networks under targeted attacks

14. The Robustness of Interdependent Directed Networks With Intra-layer Angular Correlations

15. Spearphishing Malware: Do We Really Know the Unknown?

16. Analysis on Structural Vulnerability Under the Asymmetric Information

17. Propagation of Bankruptcy Risk over Scale-Free Economic Networks

18. Physics-aware targeted attacks against maritime industrial control systems.

19. Malware Analysis and Detection via Activity Trees in User-Dependent Environment

20. Nodal vulnerability to targeted attacks in power grids

21. Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information.

23. Hacker Behavior, Network Effects, and the Security Software Market.

24. Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers.

25. Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

26. FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources

27. Studying node centrality based on the hidden hyperbolic metric space of complex networks.

28. Infrastructure upgrade framework for Content Delivery Networks robust to targeted attacks.

29. Mitigating Covert Compromises : A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

30. Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game

31. Customized Normalcy Profiles for the Detection of Targeted Attacks

33. Robustness quantification of hierarchical complex networks under targeted failures.

34. Robustness of networks formed from interdependent correlated networks under intentional attacks.

35. Optimal Cost-Based Strengthening of Complex Networks

36. Optimal Cost-Based Strengthening of Complex Networks

37. Robustness Comparison of 15 Real Telecommunication Networks: Structural and Centrality Measurements.

38. The Cousins of Stuxnet: Duqu, Flame, and Gauss

39. Information security investment for competitive firms with hacker behavior and security requirements.

40. Insider threats in banking sybersecurity: overview

41. Analysis of a multistage attack embedded in a video file.

42. Measuring the robustness of network controllability

43. Инсайдерские угрозы в банковской кибербезопасности: обзор

44. Analysis of Internet robustness in attacks.

45. ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ ПРИ РЕАЛИЗАЦИИ КОНЦЕПЦИИ BYOD

46. Systematic Review and Quantitative Comparison of Cyberattack Scenario Detection and Projection

47. Robustness quantification of hierarchical complex networks under targeted failures

48. When Does Targeting Make Sense for an Attacker?

49. Targeted Cyberattacks: A Superset of Advanced Persistent Threats.

50. The Cousins of Stuxnet: Duqu, Flame, and Gauss.

Catalog

Books, media, physical & digital resources