Academic literature on the topic 'SILENT ATTACK'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SILENT ATTACK.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SILENT ATTACK"
Sushma, Vasamsetti Ramya Sri, K. Nikhil, K. Ashish Reddy, and L. Sunitha. "Diagnosis of Cardiovascular Disease using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 371–78. http://dx.doi.org/10.22214/ijraset.2023.49209.
Full textSharma, Bhuvan, and Spinder Kaur. "Analysis and Solutions of Silent Heart Attack Using Python." International Journal of Computer Sciences and Engineering 10, no. 1 (January 31, 2022): 37–40. http://dx.doi.org/10.26438/ijcse/v10i1.3740.
Full textAnastasilakis, Dimitrios A., Polyzois Makras, Stergios A. Polyzos, and Athanasios D. Anastasilakis. "Asymptomatic and normocalcemic hyperparathyroidism, the silent attack: a combo-endocrinology overview." Hormones 18, no. 1 (September 25, 2018): 65–70. http://dx.doi.org/10.1007/s42000-018-0069-6.
Full textTeitelbaum, Michael, Rafail A. Kotronias, Luciano A. Sposato, and Rodrigo Bagur. "Cerebral Embolic Protection in TAVI: Friend or Foe." Interventional Cardiology Review 14, no. 1 (February 25, 2019): 22–25. http://dx.doi.org/10.15420/icr.2018.32.2.
Full textMykland, Martin Syvertsen, Martin Uglem, Lars Jacob Stovner, Eiliv Brenner, Mari Storli Snoen, Gøril Bruvik Gravdahl, Trond Sand, and Petter Moe Omland. "Insufficient sleep may alter cortical excitability near the migraine attack: A blinded TMS crossover study." Cephalalgia 43, no. 3 (February 14, 2023): 033310242211483. http://dx.doi.org/10.1177/03331024221148391.
Full textLi, Ying, Nan Liu, Yonghua Huang, Wei Wei, Fei Chen, and Weiwei Zhang. "Risk Factors for Silent Lacunar Infarction in Patients with Transient Ischemic Attack." Medical Science Monitor 22 (February 11, 2016): 447–53. http://dx.doi.org/10.12659/msm.895759.
Full textYang, Tiancheng, Ankit Mittal, Yunsi Fei, and Aatmesh Shrivastava. "Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, no. 1 (January 2021): 124–35. http://dx.doi.org/10.1109/tvlsi.2020.3034878.
Full textDemirel, Esra Aciman, Ufuk Emre, Aysun Ünal, Banu Özen, H. Tuğrul Atasoy, and Fürüzan Öztürk. "Evaluation of silent cerebral lesions in patients with first ischemic stroke attack." Neurology, Psychiatry and Brain Research 18, no. 1 (January 2012): 22–26. http://dx.doi.org/10.1016/j.npbr.2011.12.001.
Full textHoward, George, Gregory W. Evans, and James F. Toole. "Silent cerebral infarctions in transient ischemic attack populations: Implications of advancing technology." Journal of Stroke and Cerebrovascular Diseases 4 (January 1994): S47—S50. http://dx.doi.org/10.1016/s1052-3057(10)80257-5.
Full textJati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (November 18, 2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.
Full textDissertations / Theses on the topic "SILENT ATTACK"
Paris, Antoine. "Synthèses de dérivés silylés en séries pyridinique et diazinique. Application de la réaction d'ipso-désilylation à l'élaboration de polyhétérocycles." Rouen, 1997. http://www.theses.fr/1997ROUES053.
Full textCHEN, TING-WEI, and 陳庭葦. "Silent attack-Discussion on the Behavior of Network Bullying." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c4yuw8.
Full text正修科技大學
資訊管理研究所
105
The Internet is far away, a plain little things, one on the Internet, through the masses of the masses of mutual transmission, and even public trial, often resulting in the event of the second person in the event of injury. However, most of the message will be sent out of the message, holding the curiosity and play the majority of the mentality, do not think this behavior is wrong? I do not know the network to help spread or fun based on fun and free to share Audio and video, most likely have violated the law but no knowledge. Therefore, this study is aimed at the well-known community, relying on the power of the Internet and was even the attention of the event, and with interviews with well-known secondary school tutors and the use of questionnaires to the three information derived from the integration The following points: 1. On the Internet to share and spread indecent or false audio and video, most people are holding a fun and curious, rather than absolute malicious. 2. In the questionnaire survey, that part of the people who share the forwarding does not know this behavior may have violated the law, and know their own behavior is wrong, but often holding a lucky mind. 3. According to the survey in this study, even if most people are aware of the Internet to send and distribute some indecent or false audio and video text is a violation of the law, but still can not help but "we are doing, I will not be so untrue. " 4. Finally, this study argues that, although not in the chaos with the heavy code, but for the behavior of the rules and deeds on the Internet, it is necessary and clear, can not be vague, because often distributed anonymous network of others, are holding a lucky mind And make an act.
MUKOKO, FUNGAYI DONEWELL. "USING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKS." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380.
Full textBooks on the topic "SILENT ATTACK"
Verma, Virendra. Fall of Dera Baba Nanak Bridge: A silent night attack. Dehradun, U.P: Youth Education Publications, 1989.
Find full textCalvert, James F. Silent running: My years on a World War II attack submarine. New York: J. Wiley, 1995.
Find full textP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, N.J: John Wiley, 2005.
Find full textP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, NJ: John Wiley, 2004.
Find full textKristen, Strom Terry, and Fox Barry, eds. Syndrome X: Overcoming the silent killer that can give you a heart attack. New York: Simon and Schuster, 2000.
Find full textMiller, Vickie Gail. Doris Miller: A silent medal of honor. Austin, Tex: Eakin Press, 1997.
Find full textReader's Digest (Australia) Pty. Ltd., ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1990.
Find full textPty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney [Australia]: Reader's Digest, 1987.
Find full textPty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1986.
Find full textSilent siege-II: Japanese attacks on North America in World War II. 2nd ed. Medford, Or: Webb Research Group, 1988.
Find full textBook chapters on the topic "SILENT ATTACK"
Mukoko, Fungayi Donewell, Aman Jatain, and Yojna Arora. "Cloud Silent Attack Strategies Analysis Alongside Proposed Generic Modelling." In Advances in Intelligent Systems and Computing, 491–501. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3590-9_38.
Full textMajumder, Sharmistha, Mrinal Kanti Deb Barma, Ashim Saha, and A. B. Roy. "Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning." In Studies in Computational Intelligence, 145–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97113-7_9.
Full text"The Revolution in Heart Attack Treatment." In Fighting the Silent Killer, 147–57. A K Peters/CRC Press, 1993. http://dx.doi.org/10.1201/9781439864753-16.
Full textBell, Derrick. "The School Desegregation Era." In Silent Covenants. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195172720.003.0014.
Full textJoseph, Theyamma, and Jacquline C. Vadasseril. "Diabetes a Silent Killer: A Threat for Cardiorespiratory Fitness." In Cardiorespiratory Fitness - New Topics [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.108164.
Full textAdams, Andrea C. "Cerebrovascular Disease." In Mayo Clinic Essential Neurology, 352–92. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190206895.003.0011.
Full textDelgado, James P. "Controversy and Inquiry." In The Curse of the Somers, 115—C6.F2. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197575222.003.0007.
Full textInouye, Melissa Wei-Tsing. "The Handwritten Hymnbook (1958–1974)." In China and the True Jesus, 212–34. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190923464.003.0008.
Full textvan Schaik, Carel P., and John Terborgh. "The Silent Crisis: The State of Rain Forest Nature Preserves." In Last Stand. Oxford University Press, 1997. http://dx.doi.org/10.1093/oso/9780195095548.003.0008.
Full textYanık, Lerna K., and Fulya Hisarlıoğlu. "‘They wrote history with their bodies’: Necrogeopolitics, Necropolitical Spaces and the Everyday Spatial Politics of Death in Turkey." In Turkey's Necropolitical Laboratory, 46–70. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474450263.003.0003.
Full textConference papers on the topic "SILENT ATTACK"
Grande, C. E. Lopez, and R. S. Guadron. "Social engineering: The silent attack." In 2015 IEEE Thirty-Fifth Central American and Panama Convention (CONCAPAN XXXV). IEEE, 2015. http://dx.doi.org/10.1109/concapan.2015.7428452.
Full textCroft, Neil. "On forensics: A silent SMS attack." In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320454.
Full textKoch, Robert, and Mario Golling. "Silent Battles: Towards Unmasking Hidden Cyber Attack." In 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8757146.
Full textChen, Ting, Haiyang Tang, Xiaodong Lin, Kuang Zhou, and Xiaosong Zhang. "Silent Battery Draining Attack against Android Systems by Subverting Doze Mode." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842268.
Full textGreitzer, Edward M. "Some Aerodynamic Problems of Aircraft Engines: Fifty Years After." In ASME Turbo Expo 2007: Power for Land, Sea, and Air. ASMEDC, 2007. http://dx.doi.org/10.1115/gt2007-28364.
Full textCerkovnik, Mark, and Wasy Akhtar. "Inclusion of Crack Face Pressure in Reference Stress for Thick Walled Risers and Flowlines." In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-11021.
Full textMukoko, Fungayi Donewell, and Vikas Thada. "A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks." In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2018. http://dx.doi.org/10.1109/ic3i44769.2018.9007279.
Full textHajipour, Mohammad, Mohammad Ali Akhaee, and Ramin Toosi. "Listening to Sounds of Silence for Audio replay attack detection." In 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS). IEEE, 2021. http://dx.doi.org/10.1109/icspis54653.2021.9729353.
Full textPayre, William, Jaume Perellomarch, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, Siraj Shaikh, Hoang Nguyen, and Stewart Birrell. "Understanding drivers' trust after software malfunctions and cyber intrusions of digital displays in an automated car." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002463.
Full textKhalil Bhuiyan, Md Ebrahim, Dustin Smith, Eric J. Voss, Chin-Chuan Wei, and Mohammad Shavezipur. "Surface Functionalization of Silicon MEMS Biochemical Sensors for the Detection of Foodborne Pathogens." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-69708.
Full textReports on the topic "SILENT ATTACK"
Mizrach, Amos, Michal Mazor, Amots Hetzroni, Joseph Grinshpun, Richard Mankin, Dennis Shuman, Nancy Epsky, and Robert Heath. Male Song as a Tool for Trapping Female Medflies. United States Department of Agriculture, December 2002. http://dx.doi.org/10.32747/2002.7586535.bard.
Full text