Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,495,947 papers from all fields of science
Search
Sign In
Create Free Account
Automated threat
An automated threat is a type of computer security threat to a computer network or web application, characterised by the malicious use of automated…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Credential stuffing
Threat (computer)
Web application
Broader (1)
Malware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
"LUDO" - Kids playing Distributed Denial of Service
Jessica Steinberger
,
J. J. C. D. Santanna
,
+8 authors
A. Pras
2016
Corpus ID: 2058635
Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services…
Expand
2013
2013
Low power multi-camera system and algorithms for automated threat detection
David J. Huber
,
D. Khosla
,
Yang Chen
,
Darrel J. Van Buer
,
K. Martin
Defense, Security, and Sensing
2013
Corpus ID: 122169541
A key to any robust automated surveillance system is continuous, wide field-of-view sensor coverage and high accuracy target…
Expand
2013
2013
Silhouette classification by using manifold learning for automated threat detection
Johanna Carvajal-González
,
J. Valencia-Aguirre
,
G. Castellanos-Domínguez
International Carnahan Conference on Security…
2013
Corpus ID: 9245379
Video surveillance systems have become an essential tool to enhance security in both public and private places, especially to…
Expand
2012
2012
Advanced Millimeter-Wave Imaging Enhances Security Screening
D. Sheen
,
B. Bernacki
,
D. McMakin
2012
Corpus ID: 110258512
Millimeter-wave imaging is rapidly gaining acceptance for passenger screening at airports and other secured facilities. This…
Expand
2011
2011
Portable and autonomous X-ray equipment for in-situ threat materials identification by effective atomic number high-accuracy measurement
M. Iovea
,
M. Neagu
,
G. Mateiasi
,
O. Duliu
Defense + Commercial Sensing
2011
Corpus ID: 62161453
A novel portable and autonomous X-ray dual-energy Radioscopy equipment, developed for bomb squad interventions and NDT…
Expand
2010
2010
Automated threat identification for UML
George Yee
,
Xingli Xie
,
S. Majumdar
International Conference on Security and…
2010
Corpus ID: 16534633
In tandem with the growing important roles of software in modern society is the increasing number of threats to software…
Expand
2009
2009
Supporting Multi Camera Tracking by Monocular Deformable Graph Tracking
Nicolas H. Lehment
,
D. Arsic
,
Atanas Lyutskanov
,
Björn Schuller
,
G. Rigoll
2009
Corpus ID: 17133032
Abstract The reliable detection and tracking of objects, in particu-lar humans, in video sequences is a requirement for…
Expand
Review
2003
Review
2003
Enhancing situation awareness for air defence via automated threat analysis
M. Oxenham
Sixth International Conference of Information…
2003
Corpus ID: 62480678
For tactical air defence missions, it is desirable to eqloit information technology to develop systems that support the…
Expand
2003
2003
Threat response management system (TRMS)
P. Benjamin
,
S. Ramachandran
IEMC '03 Proceedings. Managing Technologically…
2003
Corpus ID: 168048379
We describe the motivations, concept of operation, and architecture of a threat response management system (TRMS): an information…
Expand
2002
2002
- 1-Situation and Threat Refinement Approach for Combating the Asymmetric Threat
A. Pawlowski
,
Sergio Gigli
,
Frank J. Vetesi
,
Lockheed Martin
2002
Corpus ID: 16860541
In order to combat the present and future asymmetric threats to national and international security, information fusion…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE