ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Center for Infrastructure Assurance and Security - Attack and Defense Exercises
Mapping Intimacies
◽
10.21236/ada523898
◽
2010
◽
Author(s):
Gregory B. White
Keyword(s):
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Related Documents
Cited By
References
Design of Network Security Attack and Defense Target Range System Based on Cloud Computing
Proceedings of the 2018 International Conference on Information Hiding and Image Processing - IHIP 2018
◽
10.1145/3292425.3292440
◽
2018
◽
Author(s):
Zuyuan Huang
◽
Jing Zhou
Keyword(s):
Cloud Computing
◽
Network Security
◽
Target Range
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Web Session Security: Attack and Defense Techniques
Case Studies in Secure Computing
◽
10.1201/b17352-23
◽
2014
◽
pp. 412-427
◽
Cited By ~ 4
Keyword(s):
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Enterprise information security attack and defense strategy under ATP environment
Computational Intelligence and Industrial Engineering
◽
10.2495/ciie140451
◽
2014
◽
Author(s):
Jun-xi Liu
Keyword(s):
Information Security
◽
Enterprise Information
◽
Defense Strategy
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Research and Practice of “Device-Device” Security Attack and Defense Based on IoT + AI
Computer Science and Application
◽
10.12677/csa.2020.103048
◽
2020
◽
Vol 10
(03)
◽
pp. 464-470
Author(s):
峰 刘
Keyword(s):
Research And Practice
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications
Science of Cyber Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-03026-1_12
◽
2018
◽
pp. 172-180
Author(s):
Yexia Cheng
◽
Yuejin Du
◽
Jin Peng
◽
Shen He
◽
Jun Fu
◽
...
Keyword(s):
Defense Mechanisms
◽
Security Attack
◽
Attack And Defense
◽
Logic System
Start Chat
Download Full-text
Review on the IT security: Attack and defense
2016 International Conference on Engineering & MIS (ICEMIS)
◽
10.1109/icemis.2016.7745386
◽
2016
◽
Cited By ~ 3
Author(s):
Salah-ddine Krit
◽
Elbachir Haimoud
Keyword(s):
It Security
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Overview of Smartphone Security: Attack and Defense Techniques
Computer and Cyber Security
◽
10.1201/9780429424878-10
◽
2018
◽
pp. 249-279
Author(s):
Diksha Goel
◽
Ankit Kumar Jain
Keyword(s):
Smartphone Security
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
A Security Attack and Defense in the Grid Environment
Recent Advances in Parallel Virtual Machine and Message Passing Interface - Lecture Notes in Computer Science
◽
10.1007/3-540-45825-5_8
◽
2002
◽
pp. 10-10
Author(s):
Barton P. Miller
Keyword(s):
Grid Environment
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Research of LAN Security Attack and Defense Technology
Proceedings of the 2016 2nd Workshop on Advanced Research and Technology in Industry Applications
◽
10.2991/wartia-16.2016.44
◽
2016
◽
Author(s):
Ying Peng
◽
Rongfu Wang
Keyword(s):
Security Attack
◽
Defense Technology
◽
Attack And Defense
Start Chat
Download Full-text
Overview of Wireless Security, Attack and Defense
Inside Radio: An Attack and Defense Guide
◽
10.1007/978-981-10-8447-8_1
◽
2018
◽
pp. 1-5
◽
Cited By ~ 1
Author(s):
Qing Yang
◽
Lin Huang
Keyword(s):
Wireless Security
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close