Zeitschriftenartikel zum Thema „Higher-order attack“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Higher-order attack" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
DONG, Le, Wen-Ling WU, Shuang WU und Jian ZOU. „Another Look at the Integral Attack by the Higher-Order Differential Attack“. Chinese Journal of Computers 35, Nr. 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
Der volle Inhalt der QuelleTSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA und Maki SHIGERI. „Higher Order Differential Attack on 6-Round MISTY1“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, Nr. 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Der volle Inhalt der QuelleSugio, Nobuyuki, Naoki Shibayama und Yasutaka Igarashi. „Higher-order Differential Attack on Reduced-round SLIM“. Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Der volle Inhalt der QuelleYao, Jian Bo, und Tao Zhang. „Insert Random Time-Delay Defense High Order Side-Channel Attack“. Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
Der volle Inhalt der QuelleSUGIO, N., H. AONO, S. HONGO und T. KANEKO. „A Study on Higher Order Differential Attack of KASUMI“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, Nr. 1 (01.01.2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Der volle Inhalt der QuelleCayrol, Claudette, und Marie-Christine Lagasquie-Schiex. „Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports“. International Journal on Artificial Intelligence Tools 29, Nr. 03n04 (Juni 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Der volle Inhalt der QuelleZhao, Pu, Pin-yu Chen, Siyue Wang und Xue Lin. „Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 04 (03.04.2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Der volle Inhalt der QuelleChancellor, Dinah. „Higher-Order Thinking: A “Basic” Skill For Everyone“. Arithmetic Teacher 38, Nr. 6 (Februar 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Der volle Inhalt der QuelleKaedi, S., M. Doostari und M. B. Ghaznavi-Ghoushchi. „NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA“. Journal of Circuits, Systems and Computers 27, Nr. 12 (22.06.2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Der volle Inhalt der QuelleNarote, Prof Amit, Vamika Zutshi, Aditi Potdar und Radhika Vichare. „D-Dos Attack Prediction Using Machine Learning Algorithms“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 3 (31.03.2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Der volle Inhalt der QuelleRamachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith und H. S. Mohan. „Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture“. Journal of Electrical and Computer Engineering 2023 (28.09.2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Der volle Inhalt der QuelleWei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein und Yu-Gang Jiang. „Towards Transferable Adversarial Attacks on Vision Transformers“. Proceedings of the AAAI Conference on Artificial Intelligence 36, Nr. 3 (28.06.2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Der volle Inhalt der QuelleThanh, Bui The, und Ngo Kien Trung. „Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System“. Journal Européen des Systèmes Automatisés 55, Nr. 5 (30.11.2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Der volle Inhalt der QuelleSălăgean, Ana, R. Winter, Matei Mandache-Sălăgean und Raphael C. W. Phan. „Higher order differentiation over finite fields with applications to generalising the cube attack“. Designs, Codes and Cryptography 84, Nr. 3 (21.09.2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Der volle Inhalt der QuellePadmaja, K., und K. Padmaja. „Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment“. Webology 18, Nr. 2 (23.12.2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Der volle Inhalt der QuelleYang, Zhifei, Wenmin Li, Fei Gao und Qiaoyan Wen. „FAPA: Transferable Adversarial Attacks Based on Foreground Attention“. Security and Communication Networks 2022 (29.10.2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Der volle Inhalt der QuelleLe, Duc, Minh Dao und Quyen Nguyen. „Comparison of machine learning algorithms for DDoS attack detection in SDN“. Information and Control Systems, Nr. 3 (15.06.2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Der volle Inhalt der QuelleFargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu und Ricardo Fuller. „Refractory Gout Attack“. Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Der volle Inhalt der QuelleLiu, Fengchun, Sen Zhang, Weining Ma und Jingguo Qu. „Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine“. Mathematics 10, Nr. 15 (01.08.2022): 2713. http://dx.doi.org/10.3390/math10152713.
Der volle Inhalt der QuelleYan, Ruoyu. „Combining Renyi Entropy and EWMA to Detect Common Attacks in Network“. International Journal of Pattern Recognition and Artificial Intelligence 30, Nr. 10 (23.11.2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Der volle Inhalt der QuelleBaigang, Mi, und Yu Jingyi. „An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack“. International Journal of Aerospace Engineering 2021 (08.09.2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
Der volle Inhalt der QuelleOMORI, ITSUKI. „A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential.“ Japanese Journal of Electrocardiology 10, Nr. 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Der volle Inhalt der QuelleSárkány, Zoltán, Kinga Sárkány und A. Horváth. „Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics“. Acta Medica Marisiensis 62, Nr. 1 (01.03.2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Der volle Inhalt der QuelleSingh, Anurag, und Dr Subhadra Shaw. „Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 5 (31.05.2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Der volle Inhalt der QuelleThaper, Rohit, und Amandeep Verma. „Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing“. Journal of Cases on Information Technology 17, Nr. 3 (Juli 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Der volle Inhalt der QuelleUeno, Rei, Naofumi Homma, Akiko Inoue und Kazuhiko Minematsu. „Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme“. IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, Nr. 1 (04.12.2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Der volle Inhalt der QuelleDong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu und André L. M. Vilela. „Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information“. Chaos: An Interdisciplinary Journal of Nonlinear Science 32, Nr. 6 (Juni 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Der volle Inhalt der QuelleLu, Jiqiang, Yongzhuang Wei, Jongsung Kim und Enes Pasalic. „The higher-order meet-in-the-middle attack and its application to the Camellia block cipher“. Theoretical Computer Science 527 (März 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Der volle Inhalt der QuelleAl-Shabi, Mohammed. „Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV“. International Journal of Communication Networks and Information Security (IJCNIS) 14, Nr. 2 (31.08.2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Der volle Inhalt der QuelleYildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker und A. Tufan. „AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER“. Annals of the Rheumatic Diseases 81, Suppl 1 (23.05.2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
Der volle Inhalt der QuelleJIN, Xiaying, Yang LI und Quan PAN. „DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models“. Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, Nr. 6 (Dezember 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Der volle Inhalt der QuelleLombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley und K. N. E. Fitza. „Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain“. Bulletin of Entomological Research 106, Nr. 5 (24.02.2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Der volle Inhalt der QuelleLiu, Hongjuan, Zhiliang Zhu, Hai Yu und Qian Zhu. „Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption“. Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Der volle Inhalt der QuellePeng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han und Wei Wang. „Targeting attack hypergraph networks“. Chaos: An Interdisciplinary Journal of Nonlinear Science 32, Nr. 7 (Juli 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Der volle Inhalt der QuelleYildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk und A. Tufan. „POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN“. Annals of the Rheumatic Diseases 81, Suppl 1 (23.05.2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Der volle Inhalt der QuelleLi, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang und Chengbin Jin. „The Notion of Transparency Order, Revisited“. Computer Journal 63, Nr. 12 (03.07.2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Der volle Inhalt der QuelleLi, Jiang, Xiaohui Liu und Chunjin Wei. „Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations“. Applied Mathematics Letters 129 (Juli 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Der volle Inhalt der QuelleBranciard, C., N. Gisin, N. Lutkenhaus und V. Scarani. „Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography“. Quantum Information and Computation 7, Nr. 7 (September 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Der volle Inhalt der QuelleDeng, Ya Juan, und Shao Rong Hu. „Topology Characteristic of Hub-and-Spoke Transportation Network“. Applied Mechanics and Materials 361-363 (August 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Der volle Inhalt der QuelleAbreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi und Rafael Timóteo de Sousa Júnior. „Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique“. Sensors 20, Nr. 20 (16.10.2020): 5845. http://dx.doi.org/10.3390/s20205845.
Der volle Inhalt der QuelleZhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng und Zhaohua Li. „VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model“. Mathematics 12, Nr. 9 (24.04.2024): 1286. http://dx.doi.org/10.3390/math12091286.
Der volle Inhalt der QuelleLuo, Yuling, Dezheng Zhang und Junxiu Liu. „A Chaotic Block Cryptographic System Resistant to Power Analysis Attack“. International Journal of Bifurcation and Chaos 29, Nr. 08 (Juli 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Der volle Inhalt der QuelleCarvallo, P., E. Carvallo, R. Rivas, L. Carvallo und M. Del Sol. „Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack“. International Journal of Medical and Surgical Sciences 3, Nr. 1 (26.10.2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Der volle Inhalt der QuelleYin, Ziwei, Kun Li und Hongjun Bi. „Trusted Multi-Domain DDoS Detection Based on Federated Learning“. Sensors 22, Nr. 20 (12.10.2022): 7753. http://dx.doi.org/10.3390/s22207753.
Der volle Inhalt der QuelleSagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee und Ishaani Priyadarshini. „A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment“. Future Internet 14, Nr. 10 (19.10.2022): 301. http://dx.doi.org/10.3390/fi14100301.
Der volle Inhalt der QuelleHadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad und Rohmah Pari. „Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test“. Polymers 14, Nr. 19 (24.09.2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Der volle Inhalt der QuelleKhare, Surbhi, und Abhishek Badholia. „BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 3 (05.04.2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Der volle Inhalt der QuelleMialhe, PJ. „Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP“. Brazilian Journal of Biology 74, Nr. 3 (August 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Der volle Inhalt der QuelleDomingo, Luis R., Mar Ríos-Gutiérrez und Patricia Pérez. „Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory“. Chemistry 4, Nr. 3 (26.07.2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Der volle Inhalt der QuelleSalem, Ahmed, Xuening Liao, Yulong Shen und Xiaohong Jiang. „Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework“. Wireless Communications and Mobile Computing 2018 (28.08.2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.
Der volle Inhalt der Quelle