Alternative names (6)
counteractedBy • counteracts • countermeasure • countermeasureType • counterplay • hasCountermeasuresRandom triples
| Subject | Object |
|---|---|
| gptkb:Memory_Bomb | resource limits |
| gptkb:Shtora-1_countermeasures | Semi-automatic command to line of sight (SACLOS) missiles |
| gptkb:Return-oriented_programming | non-executable stack |
| gptkb:C&C_(Command_and_Control) | intrusion detection systems |
| gptkb:Sicilian_Defence,_Najdorf_Variation | active |
| gptkb:Smurf_attack | disabling IP-directed broadcasts |
| gptkb:Domain_Generation_Algorithm | blacklisting |
| gptkb:Speculative_Execution | Microcode Updates |
| gptkb:Yrden | gptkb:Wraiths |
| gptkb:SAM_dumping | LSA protection |
| gptkb:Domain_Generation_Algorithm | machine learning detection |
| gptkb:Dridex | endpoint protection |
| gptkb:Sukhoi_Su-34 | gptkb:electronic_warfare |
| gptkb:padding_oracle_attack | authenticated encryption |
| gptkb:Trojan_(software) | gptkb:security |
| gptkb:chosen-plaintext_attack | use of strong encryption schemes |
| gptkb:Ransomware-as-a-Service | network segmentation |
| gptkb:Cambridge_Springs_Defense | against White's center |
| gptkb:Admiral_Grigorovich-class_frigates | PK-10 decoy launchers |
| gptkb:fast-flux_DNS | sinkholing |