Journal articles on the topic 'Attack Investigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack Investigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Full textWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Full textZhu, Ying. "Attack Pattern Discovery in Forensic Investigation of Network Attacks." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1349–57. http://dx.doi.org/10.1109/jsac.2011.110802.
Full textStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Full textD, Yuvaraj, Sivaram M, A. Mohamed Uvaze Ahamed, and Nageswari S. "Some Investigation on DDOS Attack Models in Mobile Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (September 25, 2019): 71. http://dx.doi.org/10.3991/ijim.v13i10.11304.
Full textKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (January 30, 2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Full textYeng, Prosper Kandabongee, Muhammad Ali Fauzi, Bian Yang, and Peter Nimbe. "Investigation into Phishing Risk Behaviour among Healthcare Staff." Information 13, no. 8 (August 18, 2022): 392. http://dx.doi.org/10.3390/info13080392.
Full textZharova, O. Yu. "APPLICATION OF NETWORK LOAD ANALYSIS SYSTEM FOR DETECTING START OF DDOS ATTACK." Issues of radio electronics, no. 11 (November 20, 2018): 48–52. http://dx.doi.org/10.21778/2218-5453-2018-11-48-52.
Full textWu, Siwei, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, and Kui Ren. "Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum." ACM Transactions on Software Engineering and Methodology 31, no. 3 (July 31, 2022): 1–33. http://dx.doi.org/10.1145/3505263.
Full textMHolkar, Amit, Neha Shinde Holkar, and Dhiiraj Nitnawwre. "Investigation of Application Attack on MANET." International Journal of Computer Applications 71, no. 14 (June 26, 2013): 42–45. http://dx.doi.org/10.5120/12430-9190.
Full textBoateng, Terry Kwaku. "Attack Intention Recognition Techniques." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 301–8. http://dx.doi.org/10.22624/aims/crp-bk3-p48.
Full textQuroturohman, Denis. "PENETRATION TESTING DALAM FORENSIK DIGITAL PADA JARINGAN FAKULTAS TEKNIK UNIVERSITAS IBN KHALDUN BOGOR DENGAN PING OF DEATH." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 4, no. 2 (November 3, 2021): 81. http://dx.doi.org/10.32832/inova-tif.v4i2.5812.
Full textEnriquez, Raul G., Juan M. Fernandez-G, Ismael Leon, William F. Reynolds, Ji Ping Yang, and Margaret Yu. "Investigation of the effect of ring size on the product distribution for the Schiff base reaction of 2-acetylcycloalkanones with diamino alkanes." Canadian Journal of Chemistry 73, no. 1 (January 1, 1995): 16–21. http://dx.doi.org/10.1139/v95-004.
Full textRevyakina, Yelena, Larissa Cherckesova, Olga Safaryan, Denis Korochentsev, Nikolay Boldyrikhin, and Yuri Ivanov. "Possibilities of conducting XSS-attacks and the development of countermeasures." E3S Web of Conferences 224 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202022401040.
Full textPicado, C., JA Castillo, JM Montserrat, and A. Agusti-Vidal. "Aspirin-intolerance as a precipitating factor of life-threatening attacks of asthma requiring mechanical ventilation." European Respiratory Journal 2, no. 2 (February 1, 1989): 127–29. http://dx.doi.org/10.1183/09031936.93.02020127.
Full textEchaves, Victor D., Dan M. Harman, and Amy L. Harman. "Site Quality in Relation to Damage by Locust Borer, Megacyllene robiniae Forster in Black Locust." Journal of Entomological Science 33, no. 1 (January 1, 1998): 106–12. http://dx.doi.org/10.18474/0749-8004-33.1.106.
Full textZhou, Xingchen, Ming Xu, Yiming Wu, and Ning Zheng. "Deep Model Poisoning Attack on Federated Learning." Future Internet 13, no. 3 (March 14, 2021): 73. http://dx.doi.org/10.3390/fi13030073.
Full textAgghey, Abel Z., Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, and Jema D. Ndibwile. "Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach." Symmetry 13, no. 11 (November 17, 2021): 2192. http://dx.doi.org/10.3390/sym13112192.
Full textRokhmah, Siti, and Ihsan Cahyo Utomo. "Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks." International Journal of Computer and Information System (IJCIS) 1, no. 1 (May 18, 2020): 11–15. http://dx.doi.org/10.29040/ijcis.v1i1.7.
Full textGupta, Ramesh K. "The Investigation of the Corrosive Effects of Sulphates and Salts on the Concrete and the Study of Environmental Changes on it." Journal of Cement Based Composites 1, no. 2 (June 3, 2020): 1–5. http://dx.doi.org/10.36937/cebacom.2020.002.001.
Full textTanasheva, N. K. "INVESTIGATION OF THE AERODYNAMIC FORCES OF A TRIANGULAR WIND TURBINE BLADE FOR THE LOW WIND SPEEDS." Eurasian Physical Technical Journal 18, no. 4 (38) (December 21, 2021): 59–64. http://dx.doi.org/10.31489/2021no4/59-64.
Full textEbrahimian, Mahsa, and Rasha Kashef. "Detecting Shilling Attacks Using Hybrid Deep Learning Models." Symmetry 12, no. 11 (October 31, 2020): 1805. http://dx.doi.org/10.3390/sym12111805.
Full textCavanna, Andrea E., and Stefano Seri. "Neurophysiological investigations for the diagnosis of non-epileptic attack disorder in neuropsychiatry services: from safety standards to improved effectiveness." Acta Neuropsychiatrica 28, no. 4 (March 23, 2016): 185–94. http://dx.doi.org/10.1017/neu.2016.10.
Full textCao, Yu Ji, Shi Ying Zhang, and Peng Gao. "Investigation of Attack Angle Character for Hypersonic Inlet." Advanced Materials Research 468-471 (February 2012): 1978–81. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1978.
Full textTan, Cheng, Lei Zhao, Weijie Liu, Lai Xu, and Lina Wang. "CAPT: Context-aware provenance tracing for attack investigation." China Communications 15, no. 2 (February 2018): 153–69. http://dx.doi.org/10.1109/cc.2018.8300279.
Full textNehdi, M. L., A. R. Suleiman, and A. M. Soliman. "Investigation of concrete exposed to dual sulfate attack." Cement and Concrete Research 64 (October 2014): 42–53. http://dx.doi.org/10.1016/j.cemconres.2014.06.002.
Full textNovita, Novita, Hasbi Amiruddin, Husaini Ibrahim, Teuku Muhammad Jamil, Syaukani Syaukani, Emiko Oguri, and Katsuyuki Eguchi. "Investigation of Termite Attack on Cultural Heritage Buildings: A Case Study in Aceh Province, Indonesia." Insects 11, no. 6 (June 22, 2020): 385. http://dx.doi.org/10.3390/insects11060385.
Full textAhmad Fitriadhy, Intan Nur Nabila, Christina Bangi Grosnin, Faisal Mahmuddin, and Suandar Baso. "Computational Investigation into Prediction of Lift Force and Resistance of a Hydrofoil Ship." CFD Letters 14, no. 4 (May 6, 2022): 51–66. http://dx.doi.org/10.37934/cfdl.14.4.5166.
Full textDas, More Swami, A. Govardhan, and Vijaya Lakshmi Doddapaneni. "A Model of Cloud Forensic Application With Assurance of Cloud Log." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 114–29. http://dx.doi.org/10.4018/ijdcf.20210901.oa7.
Full textTang, Hui, Yulong Lei, Xingzhong Li, and Yao Fu. "Numerical investigation of the aerodynamic characteristics and attitude stability of a bio-inspired corrugated airfoil for MAV or UAV applications." Energies 12, no. 20 (October 22, 2019): 4021. http://dx.doi.org/10.3390/en12204021.
Full textJayaraj, Irrai Anbu, Bharanidharan Shanmugam, Sami Azam, and Ganthan Narayana Samy. "A Systematic Review of Radio Frequency Threats in IoMT." Journal of Sensor and Actuator Networks 11, no. 4 (September 28, 2022): 62. http://dx.doi.org/10.3390/jsan11040062.
Full textHajtmanek, Roman, Martin Kontšek, Juraj Smieško, and Jana Uramová. "One-Parameter Statistical Methods to Recognize DDoS Attacks." Symmetry 14, no. 11 (November 11, 2022): 2388. http://dx.doi.org/10.3390/sym14112388.
Full textStepanov, Robert, Vladimir Pakhov, Andrey Bozhenko, Alexander Kusyumov, Sergey Mikhailov, and Nikolay Tarasov. "Experimental investigation of wing tip vortices in the near-field." EPJ Web of Conferences 196 (2019): 00025. http://dx.doi.org/10.1051/epjconf/201919600025.
Full textSelzer, R. "Environmental Influences on the Bending Properties of Sisal Fiber Reinforced Polymer Composites." Advanced Composites Letters 4, no. 3 (May 1995): 096369359500400. http://dx.doi.org/10.1177/096369359500400304.
Full textHagedorn, Andreas, Agneta Snoer, Rigmor Jensen, Bryan Haddock, and Mads Barloese. "The spectrum of cluster headache: A case report of 4600 attacks." Cephalalgia 39, no. 9 (March 26, 2019): 1134–42. http://dx.doi.org/10.1177/0333102419833081.
Full textDesai, Venkappayya R., and Nadim M. Aziz. "An Experimental Investigation of Cross-Flow Turbine Efficiency." Journal of Fluids Engineering 116, no. 3 (September 1, 1994): 545–50. http://dx.doi.org/10.1115/1.2910311.
Full textKalimuthu, R., R. C. Mehta, and E. Rathakrishnan. "Experimental investigation on spiked body in hypersonic flow." Aeronautical Journal 112, no. 1136 (October 2008): 593–98. http://dx.doi.org/10.1017/s0001924000002554.
Full textSchneegass, Stefan, Alia Saad, Roman Heger, Sarah Delgado Rodriguez, Romina Poguntke, and Florian Alt. "An Investigation of Shoulder Surfing Attacks on Touch-Based Unlock Events." Proceedings of the ACM on Human-Computer Interaction 6, MHCI (September 19, 2022): 1–14. http://dx.doi.org/10.1145/3546742.
Full textFeng, Xiao Xin, Xiu Juan Li, and Qing Min Wei. "Investigation of Sulphate Attack on C-S-H Gel." Advanced Materials Research 287-290 (July 2011): 1116–20. http://dx.doi.org/10.4028/www.scientific.net/amr.287-290.1116.
Full textAli Ahmed, Abdulghani. "INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME." International Journal of Computer Systems & Software Engineering 1, no. 1 (February 15, 2015): 93–105. http://dx.doi.org/10.15282/ijsecs.1.2015.8.0008.
Full textRishi Sahu, Divya, and Deepak Singh Tomar. "DNS Pharming through PHP Injection: Attack Scenario and Investigation." International Journal of Computer Network and Information Security 7, no. 4 (March 8, 2015): 21–28. http://dx.doi.org/10.5815/ijcnis.2015.04.03.
Full textVijayalakshmi, Akshaya, Darrel D. Muehling, and Russell N. Laczniak. "An Investigation of Consumers' Responses to Comparative “Attack” Ads." Journal of Promotion Management 21, no. 6 (November 2, 2015): 760–75. http://dx.doi.org/10.1080/10496491.2015.1088921.
Full textJellinger, K. A. "Transient Ischemic Attack and Stroke - Diagnosis, Investigation and Management." European Journal of Neurology 16, no. 7 (May 12, 2009): e140-e140. http://dx.doi.org/10.1111/j.1468-1331.2009.02682.x.
Full textBamford, J. "ASSESSMENT AND INVESTIGATION OF STROKE AND TRANSIENT ISCHAEMIC ATTACK." Journal of Neurology, Neurosurgery & Psychiatry 70, no. 90001 (April 1, 2001): 3i—6. http://dx.doi.org/10.1136/jnnp.70.suppl_1.i3.
Full textChen, Chunyu, Mingjian Cui, Xinan Wang, Kaifeng Zhang, and Shengfei Yin. "An Investigation of Coordinated Attack on Load Frequency Control." IEEE Access 6 (2018): 30414–23. http://dx.doi.org/10.1109/access.2018.2845300.
Full textRazavi, Seyed Esmail, and Ali Atashbar Orang. "A comparative investigation of hydrofoil at angles of attack." International Journal for Numerical Methods in Fluids 68, no. 9 (May 5, 2011): 1087–101. http://dx.doi.org/10.1002/fld.2593.
Full textYounis, Samaira, Casper E. Christensen, Nikolaj M. Toft, Thomas Søborg, Faisal M. Amin, Anders Hougaard, and Messoud Ashina. "Investigation of distinct molecular pathways in migraine induction using calcitonin gene-related peptide and sildenafil." Cephalalgia 39, no. 14 (November 4, 2019): 1776–88. http://dx.doi.org/10.1177/0333102419882474.
Full textLam, K., Y. F. Lin, Y. Liu, and L. Zou. "Numerical Investigation of Flow past a Wavy Airfoil." Applied Mechanics and Materials 110-116 (October 2011): 4269–75. http://dx.doi.org/10.4028/www.scientific.net/amm.110-116.4269.
Full textKorkmaz, Tanzer, Yusuf Ozgur Bicer, Erdinc Serin, Sinan Seyhan, and Serap Koybasi Sanal. "Salivary α-Amylase Levels in Vertigo: Can it be an Autonomic Dysfunction?" Ear, Nose & Throat Journal 97, no. 9 (September 2018): 278–82. http://dx.doi.org/10.1177/014556131809700917.
Full textPugliese, Aldo, Zhi Gang Yang, and Qi Liang Li. "CFD Research and Investigation of 2011 P4/5 Competition Rear Wing." Applied Mechanics and Materials 275-277 (January 2013): 665–71. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.665.
Full text