Journal articles on the topic 'Perimeter defense'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Perimeter defense.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wallace, Tom. "Optimize Perimeter Defense for Utility Security." Opflow 43, no. 5 (May 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.
Full textAndriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS." Health and Ecology Issues, no. 1 (March 28, 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.
Full textCrawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers, and J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria." Proceedings of the National Academy of Sciences 109, no. 27 (June 18, 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.
Full textDaly-Grafstein, Daniel, and Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA." Journal of Sports Analytics 6, no. 4 (January 7, 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.
Full textKim, Kwon-il, Yeon-seung Ryu, and Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter." Korean Journal of Industry Security 11, no. 1 (April 30, 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.
Full textChen, S., and Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks." IEEE Transactions on Parallel and Distributed Systems 16, no. 6 (June 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.
Full textShishika, Daigo, James Paulos, and Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games." IEEE Robotics and Automation Letters 5, no. 2 (April 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.
Full textEdwards, Paul M., and Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter." Journal of Military History 62, no. 4 (October 1998): 960. http://dx.doi.org/10.2307/120234.
Full textAl-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.
Full textSteingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (April 3, 2021): 597. http://dx.doi.org/10.3390/sym13040597.
Full textNOPONEN, HELZI, ANN MARKUSEN, KARL DRIESSEN, and YANG SHAO. "Is There a Trade and Defense Perimeter? The Regional Impacts of Trade and Defense Spending in the United States, 1978-1986." Growth and Change 27, no. 4 (October 1996): 405–33. http://dx.doi.org/10.1111/j.1468-2257.1996.tb00975.x.
Full textYungblud, Valerii T., and Denis A. Sadakov. "Inclusion of the Republic of Korea in the US Defense Perimeter after the Korean War." Vestnik of Saint Petersburg University. History 66, no. 1 (2021): 226–44. http://dx.doi.org/10.21638/11701/spbu02.2021.114.
Full textTang, Zhi Jie, Ping Long Liu, Qian Luo, and Zhi Feng Ye. "Main Control System Design for Balanced Tension-Type Electronic Fence." Applied Mechanics and Materials 687-691 (November 2014): 349–52. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.349.
Full textMohamed, Osama, and Rania Khattab. "Assessment of Progressive Collapse Resistance of Steel Structures with Moment Resisting Frames." Buildings 9, no. 1 (January 9, 2019): 19. http://dx.doi.org/10.3390/buildings9010019.
Full textLi, Xianfeng, Sen Xu, and Xiaopeng Hua. "Pattern Recognition of Grating Perimeter Intrusion Behavior in Deep Learning Method." Symmetry 13, no. 1 (January 6, 2021): 87. http://dx.doi.org/10.3390/sym13010087.
Full textMol, Arjan, Ton Van der Plas, Robert McCall, and Merel Kroeders. "PREDICTING THE RESHAPING OF TEMPORARILY EXPOSED BUNDS WITH XBEACH-G." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 31. http://dx.doi.org/10.9753/icce.v36.sediment.31.
Full textGolovan, V., S. Tarasenko, O. Budur, K. Dekhtyarenko, and R. Bubenshchikov. "SUBSTANTIATION OF PRINCIPLES OF STRUCTURE AND EVALUATION OF EFFICIENCY OF PERIMETER SYSTEMS OF PROTECTION OF ARSENALS, BASES AND WAREHOUSES." Collection of scientific works of Odesa Military Academy 1, no. 14 (January 25, 2021): 112–22. http://dx.doi.org/10.37129/2313-7509.2020.14.1.112-122.
Full textDulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Full textDyda, Iryna. "UKRAINIAN URBAN TRADITIONS: RELEVANCE IN THE CONDITIONS OF MODERN CHALLENGES." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Arhìtektura 4, no. 2 (December 22, 2022): 79–86. http://dx.doi.org/10.23939/sa2022.02.079.
Full textBhattacharya, Deepak. "Spiritualism Seeks Sword for Self Defense Konark, World Heritage Site: Hieroglyphics – Katha." Historical Journal 14, no. 1 (March 7, 2023): 21–37. http://dx.doi.org/10.3126/hj.v14i1.52956.
Full textHuang, Yun, Ya Jie Zhu, and Heng Hui Lian. "Research and Realization of Apron Protection System Based on Internet of Things." Advanced Materials Research 912-914 (April 2014): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1339.
Full textLu, Hainan, Ningning Wang, Nian Fang, and Lutang Wang. "Signal recognition method based on Mel frequency cepstral coefficients and fast dynamic time warping for optical fiber perimeter defense systems." Applied Optics 61, no. 7 (March 1, 2022): 1758. http://dx.doi.org/10.1364/ao.448754.
Full textShvaiba, D. N. "System for Ensuring Social and Economic Security of Industrial Sector." Science & Technique 18, no. 1 (February 12, 2019): 70–74. http://dx.doi.org/10.21122/2227-1031-2019-18-1-70-74.
Full textDeidda, M., C. Musa, and G. Vacca. "A GIS OF SARDINIA'S COASTAL DEFENSE SYSTEM (XVI – XVIII CENTURY)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-4/W7 (June 30, 2015): 17–22. http://dx.doi.org/10.5194/isprsarchives-xl-4-w7-17-2015.
Full textSoroushian, Siavash, Esmaeel Rahmanishamsi, Ki P. Ryu, Manos Maragakis, and Andrei M. Reinhorn. "Experimental Fragility Analysis of Suspension Ceiling Systems." Earthquake Spectra 32, no. 2 (May 2016): 881–908. http://dx.doi.org/10.1193/071514eqs109m.
Full textRodriguez, Annette R., Jieh-Juen Yu, Christopher Navara, James P. Chambers, M. Neal Guentzel, and Bernard P. Arulanandam. "Contribution of FcɛRI-associated vesicles to mast cell–macrophage communication following Francisella tularensis infection." Innate Immunity 22, no. 7 (August 22, 2016): 567–74. http://dx.doi.org/10.1177/1753425916663639.
Full textMadni, Azad, and Carla Madni. "Architectural Framework for Exploring Adaptive Human-Machine Teaming Options in Simulated Dynamic Environments." Systems 6, no. 4 (December 13, 2018): 44. http://dx.doi.org/10.3390/systems6040044.
Full textSharma, Vishal, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, and Sun-Young Lee. "A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT." Security and Communication Networks 2017 (2017): 1–24. http://dx.doi.org/10.1155/2017/4749085.
Full textAhn, Ezekiel, Jacob Botkin, Vishnutej Ellur, Yoonjung Lee, Kabita Poudel, Louis K. Prom, and Clint Magill. "Genome-Wide Association Study of Seed Morphology Traits in Senegalese Sorghum Cultivars." Plants 12, no. 12 (June 16, 2023): 2344. http://dx.doi.org/10.3390/plants12122344.
Full textCarpenter, John E., Amy C. Clayton, Kevin C. Halling, Daniel J. Bonthius, Erin M. Buckingham, Wallen Jackson, Steven M. Dotzler, J. Patrick Card, Lynn W. Enquist, and Charles Grose. "Defensive Perimeter in the Central Nervous System: Predominance of Astrocytes and Astrogliosis during Recovery from Varicella-Zoster Virus Encephalitis." Journal of Virology 90, no. 1 (October 21, 2015): 379–91. http://dx.doi.org/10.1128/jvi.02389-15.
Full textTan, Choon Seng, Douglas L. Van Bossuyt, and Britta Hale. "System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment." Systems 9, no. 4 (November 3, 2021): 79. http://dx.doi.org/10.3390/systems9040079.
Full textAlconini, Sonia. "The Southeastern Inka Frontier against the Chiriguanos: Structure and Dynamics of the Inka Imperial Borderlands." Latin American Antiquity 15, no. 4 (December 2004): 389–418. http://dx.doi.org/10.2307/4141585.
Full textOzhiganova, Marina, and Emil Kurtametov. "Using Neural Networks to Protect Web Applications." NBI Technologies, no. 2 (December 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.
Full textKriytchenko, A. A. "THE VARIANT OF SYSTEMATIZATION OF THE HILL-FORTS OF SCYTHIAN AGE OF DNIEPER-DON FOREST-STEPPE INTERFLUVE." Archaeology and Early History of Ukraine 31, no. 2 (March 25, 2019): 76–82. http://dx.doi.org/10.37445/adiu.2019.02.05.
Full textKarki, Sonali, and Dr Kiran V. "Performance Comparison of SSH Libraries." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 18, 2021): 868–73. http://dx.doi.org/10.51201/jusst/21/05357.
Full textVlasov, N. V. "The Contemporary Chinese Policy in Southeast Asia." MGIMO Review of International Relations, no. 3(42) (June 28, 2015): 60–67. http://dx.doi.org/10.24833/2071-8160-2015-3-42-60-67.
Full textSchwenk, J. Tyler, Steven D. Sloan, Julian Ivanov, and Richard D. Miller. "Surface-wave methods for anomaly detection." GEOPHYSICS 81, no. 4 (July 2016): EN29—EN42. http://dx.doi.org/10.1190/geo2015-0356.1.
Full textRybchynskyi, Nestor-Mykolai. "GRAPHIC RECONSTRUCTION OF DEFENSE BULWARK OF THE THIRD FORTIFIED SETTLEMENT OF IX - X CENTURIES. IN THE KOROSTEN CITY (ON BASIS OF ARCHAEOLOGICAL DATA)." Current Issues in Research, Conservation and Restoration of Historic Fortifications 14, no. 2021 (2021): 132–42. http://dx.doi.org/10.23939/fortifications2020.14.132.
Full textRyabchenko, A. G., and E. V. Orel. "Military threat in Krasnodar. 1942-1943." Scientific bulletin of the Southern Institute of Management, no. 4 (December 25, 2018): 112–17. http://dx.doi.org/10.31775/2305-3100-2018-4-112-117.
Full textSkorospelov, Petr P. "“A Special Form of Making Foreign Policy by the Threat of War to Imperialists”. A Case Study of Military-Political Activity of Central Committee Presidium under N.S. Khrushchev, 1954–1964. Part 1." Vostok. Afro-aziatskie obshchestva: istoriia i sovremennost, no. 2 (2022): 9. http://dx.doi.org/10.31857/s086919080019661-4.
Full textKhokhon, Mykhailo. "BASILIAN ORDER MONASTERY IN SCHEPLOTY. HISTORY, ARCHITECTURE AND PROBLEMS OF PRESERVATION." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Arhìtektura 4, no. 2 (December 22, 2022): 198–204. http://dx.doi.org/10.23939/sa2022.02.198.
Full textLevine, Ari Daniel. "Walls and Gates, Windows and Mirrors: Urban Defences, Cultural Memory, and Security Theatre in Song Kaifeng." East Asian Science, Technology, and Medicine 39, no. 1 (June 25, 2014): 55–118. http://dx.doi.org/10.1163/26669323-03901003.
Full textPryshchepa, B. A. "THE CASTLE OF CZARTORYSKI PRINCES IN KLEVAN: STAGES OF DEVELOPMENT, PLANNING AND BUILDINGS." Archaeology and Early History of Ukraine 43, no. 2 (June 30, 2022): 111–20. http://dx.doi.org/10.37445/adiu.2022.02.08.
Full textAmineh, Mehdi Parvizi, and Henk Houweling. "Global Energy Security and Its Geopolitical Impediments—The Case of the Caspian Region." Perspectives on Global Development and Technology 6, no. 1-3 (2007): 365–88. http://dx.doi.org/10.1163/156914907x207793.
Full textAkunna, Gabryel G., LC Saalu, A. Irozuoke, and E. Joshua. "Rats kidney morphological particularities and functions post-treatment with vernonia amygdalina extract and low-dose lead acetate." European Journal of Anatomy 27 (January 2023): 91–102. http://dx.doi.org/10.52083/ztzk6810.
Full textMohanty, Sudeshna, Subhrasmita Mahapatra, Sanat Ku Panda, Plavan Ku Rath, Manoj Ku Sarangi, and Olga I. Bylya. "Development and Optimization of Perimeter Traversing Robot." Applied Mechanics and Materials 186 (June 2012): 280–88. http://dx.doi.org/10.4028/www.scientific.net/amm.186.280.
Full textRogobete, M. "An Unmanned Underwater Vehicle Defence System." Scientific Bulletin of Naval Academy XXV, no. 1 (August 15, 2022): 16–22. http://dx.doi.org/10.21279/1454-864x-22-i1-002.
Full textLin, Kung-Sung, Kung-Hua Yeh, Yan-Ju Chiang, and Likarn Wang. "Fiber-Optic Perimeter Intrusion Detection by Employing a Fiber Laser Cavity in Each Defensed Zone." IEEE Sensors Journal 18, no. 20 (October 15, 2018): 8352–60. http://dx.doi.org/10.1109/jsen.2018.2866223.
Full textPortela i Valls, S., M. J. Viñals, and G. Muñoz Cosme. "ACTIONS FOR THE ENHANCEMENT OF HERITAGE. THE CASE OF THE TOWN WALLS OF MORELLA (CASTELLÓN, SPAIN)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-M-1-2020 (July 24, 2020): 877–84. http://dx.doi.org/10.5194/isprs-archives-xliv-m-1-2020-877-2020.
Full textSalzer, Thomas E. "A Low-Impedance Projection Welding Device for Large Package Hermetic Sealing." International Symposium on Microelectronics 2015, no. 1 (October 1, 2015): 000810–16. http://dx.doi.org/10.4071/isom-2015-thp32.
Full text