Academic literature on the topic 'Synchronized attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Synchronized attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Synchronized attack"
Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 22, 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Full textManaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Full textWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Full textO'Connell, Michael, and Aaron Bernard. "A Serious Cause of Panic Attack." Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.
Full textButcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide." Journal of Genocide Research 15, no. 3 (September 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.
Full textLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Full textManaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (September 29, 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Full textRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Full textUllah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard, and Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1." Cancers 12, no. 9 (September 18, 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.
Full textDissertations / Theses on the topic "Synchronized attack"
Gomes, Lara Elena. "Comparação entre forças propulsivas efetivas calculadas e medida durante um palmateio de sustentação." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2010. http://hdl.handle.net/10183/27677.
Full textPropulsive force generated during sculling motion results from drag and lift propulsive forces, and the component acting in the direction of motion is the effective propulsive force. These forces may be calculated using hydrodynamic equations, but these equations do not consider all mechanisms that contribute to the propulsion. Thus, the main purpose of this study was to compare the calculated effective propulsive force using the hydrodynamic equations and the measured effective propulsive force during a support sculling motion (vertical position with the head above the water‟s surface) in each phase of sculling. For this, a practitioner of synchronized swimming performed sculling motion in a vertical position with the head above the water‟s surface during 15 seconds, while kinematic and kinetic data were obtained by 3D videogrammetry and dynamometry respectively. Graphical techniques from Bland and Altman were used to compare the measured effective propulsive force and calculated effective propulsive force during sculling motion. The calculated effective propulsive force and the measured effective propulsive force were different, the measured being greater than the calculated. Moreover, the results indicated sculling motion performed was not symmetric, that is, the orientation and propulsive forces between the right and left hands were different. Therefore, the result of this study highlights the importance of the unsteady mechanisms for the propulsion during sculling motion, because the calculated forces using the hydrodynamic equations presented low values throughout the sculling motion.
KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textBooks on the topic "Synchronized attack"
Government, U. S. Planning Considerations: Complex Coordinated Terrorist Attacks - Homeland Security Threat Background and Characteristics, Synchronized and Independent Teams at Multiple Locations. Independently Published, 2019.
Find full textBook chapters on the topic "Synchronized attack"
Barbu, Guillaume, and Hugues Thiebeauld. "Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -." In Smart Card Research and Advanced Applications, 18–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27257-8_2.
Full textSingh, Shreya, Rimjhim Kanaujia, and Shivaprakash M Rudramurthy. "Immunopathogenesis of Aspergillosis." In The Genus Aspergillus - Pathogenicity, Mycotoxin Production and Industrial Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.98782.
Full textSöyleyici, Gülin Tuğçe, and Adnan Kalkan. "A New Problem Emerging With the Internet and Digital Media." In Advances in Social Networking and Online Communities, 420–32. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5426-8.ch025.
Full textBamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 74–94. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch004.
Full textBamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies." In Cyber Security and Threats, 1044–59. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch051.
Full textConde, Maite. "Toward New Cinematic Foundations." In Foundational Films, 242–46. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520290983.003.0012.
Full textLegeżyńska, Joanna, Claude De Broyer, and Jan Marcin Węsławski. "Invasion of the Poles." In Evolution and Biogeography, 216–46. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190637842.003.0009.
Full textConference papers on the topic "Synchronized attack"
Wang, Hongxia, Mingquan Fan, and Qing Qian. "Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack." In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE, 2011. http://dx.doi.org/10.1109/cse.2011.66.
Full textShah, Abdullah L., Ali T. Al-Awami, and Wessam Mesbah. "Attack Detection and Measurement Correction in Distribution Systems with Non-Synchronized Measurements." In 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2022. http://dx.doi.org/10.1109/isgt-europe54678.2022.9960624.
Full textPrasad, Romesh, Matthew K. Swanson, and Young Moon. "Recovering From Cyber-Manufacturing Attacks by Reinforcement Learning." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-93982.
Full textLing, Yang, and Chu Weihua. "Research on movement relationship and synchronized motion control strategy for the attack angle device of the 2.4m transonic wind tunnel." In 2016 IEEE International Conference on Mechatronics and Automation. IEEE, 2016. http://dx.doi.org/10.1109/icma.2016.7558569.
Full textPrier, Michael W., and James A. Liburdy. "Discrete Vortex Modeling of a Flapping Foil With Activated Leading Edge Motion." In ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/ajkfluids2019-4964.
Full textRiedel, Colton, Guoyu Fu, Donald Beyette, and Jyh-Charn Liu. "Measurement System Timing Integrity in the Presence of Faults and Malicious Attacks." In 2019 International Conference on Smart Grid Synchronized Measurements and Analytics (SGSMA). IEEE, 2019. http://dx.doi.org/10.1109/sgsma.2019.8784502.
Full textJin, Chenglu, Lingyu Ren, Xubin Liu, Peng Zhang, and Marten van Dijk. "Mitigating Synchronized Hardware Trojan Attacks in Smart Grids." In CPS Week '17: Cyber Physical Systems Week 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3055386.3055394.
Full textAmmour, Rabah, Leonardo Brenner, Isabel Demongodin, Said Amari, and Dimitri Lefebvre. "Costs analysis of stealthy attacks with bounded output synchronized Petri nets." In 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). IEEE, 2021. http://dx.doi.org/10.1109/case49439.2021.9551583.
Full textMattei, Andrew K., W. Mack Grady, P. Jay Caspary, and Scott A. McBride. "Detection of time spoofing attacks on GPS synchronized phasor measurement units." In 2016 69th Annual Conference for Protective Relay Engineers (CPRE). IEEE, 2016. http://dx.doi.org/10.1109/cpre.2016.7914884.
Full textBlum, Ronny, Himanshu Sharma, and Thomas Pany. "Smartphone Behaviour under Sophisticated Time Synchronized and Record and Replay Spoofing Attacks." In 2022 International Technical Meeting of The Institute of Navigation. Institute of Navigation, 2022. http://dx.doi.org/10.33012/2022.18183.
Full text