Journal articles on the topic 'Higher-order attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Higher-order attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
DONG, Le, Wen-Ling WU, Shuang WU, and Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack." Chinese Journal of Computers 35, no. 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
TSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA, and Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Sugio, Nobuyuki, Naoki Shibayama, and Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM." Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Yao, Jian Bo, and Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack." Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
SUGIO, N., H. AONO, S. HONGO, and T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Cayrol, Claudette, and Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports." International Journal on Artificial Intelligence Tools 29, no. 03n04 (June 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Zhao, Pu, Pin-yu Chen, Siyue Wang, and Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Chancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone." Arithmetic Teacher 38, no. 6 (February 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Kaedi, S., M. Doostari, and M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA." Journal of Circuits, Systems and Computers 27, no. 12 (June 22, 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Narote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Ramachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith, and H. S. Mohan. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture." Journal of Electrical and Computer Engineering 2023 (September 28, 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Wei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein, and Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 3 (June 28, 2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Thanh, Bui The, and Ngo Kien Trung. "Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System." Journal Européen des Systèmes Automatisés 55, no. 5 (November 30, 2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Sălăgean, Ana, R. Winter, Matei Mandache-Sălăgean, and Raphael C. W. Phan. "Higher order differentiation over finite fields with applications to generalising the cube attack." Designs, Codes and Cryptography 84, no. 3 (September 21, 2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Padmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (December 23, 2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Yang, Zhifei, Wenmin Li, Fei Gao, and Qiaoyan Wen. "FAPA: Transferable Adversarial Attacks Based on Foreground Attention." Security and Communication Networks 2022 (October 29, 2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Le, Duc, Minh Dao, and Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN." Information and Control Systems, no. 3 (June 15, 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Fargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu, and Ricardo Fuller. "Refractory Gout Attack." Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Liu, Fengchun, Sen Zhang, Weining Ma, and Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine." Mathematics 10, no. 15 (August 1, 2022): 2713. http://dx.doi.org/10.3390/math10152713.
Yan, Ruoyu. "Combining Renyi Entropy and EWMA to Detect Common Attacks in Network." International Journal of Pattern Recognition and Artificial Intelligence 30, no. 10 (November 23, 2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Baigang, Mi, and Yu Jingyi. "An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack." International Journal of Aerospace Engineering 2021 (September 8, 2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
OMORI, ITSUKI. "A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential." Japanese Journal of Electrocardiology 10, no. 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Sárkány, Zoltán, Kinga Sárkány, and A. Horváth. "Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics." Acta Medica Marisiensis 62, no. 1 (March 1, 2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Singh, Anurag, and Dr Subhadra Shaw. "Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Thaper, Rohit, and Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing." Journal of Cases on Information Technology 17, no. 3 (July 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Ueno, Rei, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (December 4, 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Dong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu, and André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 6 (June 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Lu, Jiqiang, Yongzhuang Wei, Jongsung Kim, and Enes Pasalic. "The higher-order meet-in-the-middle attack and its application to the Camellia block cipher." Theoretical Computer Science 527 (March 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Al-Shabi, Mohammed. "Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 2 (August 31, 2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Yildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker, and A. Tufan. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
JIN, Xiaying, Yang LI, and Quan PAN. "DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, no. 6 (December 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Lombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley, and K. N. E. Fitza. "Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain." Bulletin of Entomological Research 106, no. 5 (February 24, 2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Liu, Hongjuan, Zhiliang Zhu, Hai Yu, and Qian Zhu. "Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Peng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han, and Wei Wang. "Targeting attack hypergraph networks." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 7 (July 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Yildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk, and A. Tufan. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Li, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang, and Chengbin Jin. "The Notion of Transparency Order, Revisited." Computer Journal 63, no. 12 (July 3, 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Li, Jiang, Xiaohui Liu, and Chunjin Wei. "Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations." Applied Mathematics Letters 129 (July 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Branciard, C., N. Gisin, N. Lutkenhaus, and V. Scarani. "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography." Quantum Information and Computation 7, no. 7 (September 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Deng, Ya Juan, and Shao Rong Hu. "Topology Characteristic of Hub-and-Spoke Transportation Network." Applied Mechanics and Materials 361-363 (August 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Abreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi, and Rafael Timóteo de Sousa Júnior. "Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique." Sensors 20, no. 20 (October 16, 2020): 5845. http://dx.doi.org/10.3390/s20205845.
Zhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng, and Zhaohua Li. "VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model." Mathematics 12, no. 9 (April 24, 2024): 1286. http://dx.doi.org/10.3390/math12091286.
Luo, Yuling, Dezheng Zhang, and Junxiu Liu. "A Chaotic Block Cryptographic System Resistant to Power Analysis Attack." International Journal of Bifurcation and Chaos 29, no. 08 (July 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Carvallo, P., E. Carvallo, R. Rivas, L. Carvallo, and M. Del Sol. "Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack." International Journal of Medical and Surgical Sciences 3, no. 1 (October 26, 2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Yin, Ziwei, Kun Li, and Hongjun Bi. "Trusted Multi-Domain DDoS Detection Based on Federated Learning." Sensors 22, no. 20 (October 12, 2022): 7753. http://dx.doi.org/10.3390/s22207753.
Sagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee, and Ishaani Priyadarshini. "A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment." Future Internet 14, no. 10 (October 19, 2022): 301. http://dx.doi.org/10.3390/fi14100301.
Hadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad, and Rohmah Pari. "Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test." Polymers 14, no. 19 (September 24, 2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Khare, Surbhi, and Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (April 5, 2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Mialhe, PJ. "Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP." Brazilian Journal of Biology 74, no. 3 (August 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Domingo, Luis R., Mar Ríos-Gutiérrez, and Patricia Pérez. "Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory." Chemistry 4, no. 3 (July 26, 2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Salem, Ahmed, Xuening Liao, Yulong Shen, and Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.