Journal articles on the topic 'Synchronized attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Synchronized attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 22, 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Full textManaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Full textWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Full textO'Connell, Michael, and Aaron Bernard. "A Serious Cause of Panic Attack." Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.
Full textButcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide." Journal of Genocide Research 15, no. 3 (September 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.
Full textLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Full textManaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (September 29, 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Full textRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Full textUllah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard, and Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1." Cancers 12, no. 9 (September 18, 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.
Full textRadziukevich, M. L., and V. F. Golikov. "Combined formаtion of a cryptographic key using synchronized artificial neural networks." Doklady BGUIR 19, no. 1 (February 23, 2021): 79–87. http://dx.doi.org/10.35596/1729-7648-2021-19-1-79-87.
Full textZhang, Li, Xinru Mao, and Lin Ding. "Influence of attack angle on vortex-induced vibration and energy harvesting of two cylinders in side-by-side arrangement." Advances in Mechanical Engineering 11, no. 1 (January 2019): 168781401882259. http://dx.doi.org/10.1177/1687814018822598.
Full textThangarathinam, P., N. Suganya, T. Praddeep, and S. Vignesh. "Synchrophasor Technology for Cyber Security in Smart Grid." International Journal of Students' Research in Technology & Management 3, no. 7 (October 29, 2015): 436. http://dx.doi.org/10.18510/ijsrtm.2015.378.
Full textTruong, Victor, Alexandre Vervisch-Picois, Jose Rubio Hernan, and Nel Samama. "Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias." Sensors 23, no. 5 (March 2, 2023): 2735. http://dx.doi.org/10.3390/s23052735.
Full textHuang, Xiaojie, Yunxia Xia, and Da-Wei Ding. "Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks." Applied Sciences 13, no. 3 (January 29, 2023): 1716. http://dx.doi.org/10.3390/app13031716.
Full textChiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (April 5, 2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.
Full textAlbert Lusiola, Musoma. "Multi Agency Response to International Terrorism in Kenya: A Comparison of Dusit D2 and Westgate Terror Attacks." African Journal of Empirical Research 2, no. 2 (April 14, 2021): 68–84. http://dx.doi.org/10.51867/ajer.v2i2.23.
Full textDass, Prajnamaya, Pranay Kumar Saha, and Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks." International Journal of Business Data Communications and Networking 12, no. 2 (July 2016): 28–61. http://dx.doi.org/10.4018/ijbdcn.2016070103.
Full textMatsuzono, Kosuke, Takao Yoshiki, Yosuke Wakutani, Yasuhiro Manabe, Toru Yamashita, Kentaro Deguchi, Yoshio Ikeda, and Koji Abe. "Synchronized Babinski and Chaddock Signs Preceded the MRI Findings in a Case of Repetitive Transient Ischemic Attack." Internal Medicine 52, no. 18 (2013): 2127–29. http://dx.doi.org/10.2169/internalmedicine.52.0190.
Full textMukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.
Full textEslahi, Ali, Shahryar Zeighami, Faisal Ahmed, Seyed Hossein Hosseini, Bahareh Ebrahimi, and Mohammad Hossein Anbardar. "Synchronized Laparoscopic Bilateral Adrenalectomy for Pheochromocytoma in Multiple Endocrine Neoplasia Syndrome: A Case Report." Journal of Kidney Cancer and VHL 9, no. 3 (September 2, 2022): 24–28. http://dx.doi.org/10.15586/jkcvhl.v9i3.239.
Full textWinter, R. W., K. A. Cornell, L. L. Johnson, M. Ignatushchenko, D. J. Hinrichs, and M. K. Riscoe. "Potentiation of the antimalarial agent rufigallol." Antimicrobial Agents and Chemotherapy 40, no. 6 (June 1996): 1408–11. http://dx.doi.org/10.1128/aac.40.6.1408.
Full textKarthika, P., and Karmel Arockiasamy. "Simulation of SDN in mininet and detection of DDoS attack using machine learning." Bulletin of Electrical Engineering and Informatics 12, no. 3 (June 1, 2023): 1797–805. http://dx.doi.org/10.11591/eei.v12i3.5232.
Full textMarshall, David J. "Predatory and reproductive responses of the estuarine whelk Thais gradata (Caenogastropoda: Muricidae) to novel colonization by Musculista senhousia (Bivalvia: Mytilidae)." Journal of the Marine Biological Association of the United Kingdom 89, no. 7 (June 2, 2009): 1387–93. http://dx.doi.org/10.1017/s0025315409000642.
Full textHuang, Huihui, Xuyang Miao, Zehui Wu, and Qiang Wei. "An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network." Mathematical Problems in Engineering 2021 (February 2, 2021): 1–14. http://dx.doi.org/10.1155/2021/8811970.
Full textHori, Michio, Masanori Kohda, Satoshi Awata, and Satoshi Takahashi. "Dynamics of Laterality in Lake Tanganyika Scale-Eaters Driven by Cross-Predation." Symmetry 11, no. 1 (January 20, 2019): 119. http://dx.doi.org/10.3390/sym11010119.
Full textLeone, M., V. Lucini, D. D'Amico, F. Moschiano, C. Maltempo, F. Fraschini, and G. Bussone. "Twenty-Four-Hour Melatonin and Cortisol Plasma Levels in Relation to Timing of Cluster Headache." Cephalalgia 15, no. 3 (June 1995): 224–29. http://dx.doi.org/10.1046/j.1468-2982.1995.015003224.x.
Full textRégnière, Jacques, M. Lukas Seehausen, and Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 1: Tranosema rostrale (Hymenoptera: Ichneumonidae)." Forests 11, no. 8 (August 5, 2020): 846. http://dx.doi.org/10.3390/f11080846.
Full textLiu, Yufeng, Jianguo Kong, Xiuping Wang, and Gongbing Shan. "Biomechanical analysis of Yang’s spear turning-stab technique in Chinese martial arts." Physical Activity Review 8, no. 2 (2020): 16–22. http://dx.doi.org/10.16926/par.2020.08.17.
Full textQu, Zhengwei, Xinran Zhang, Yuchen Gao, Chao Peng, Yunjing Wang, and Popov Maxim Georgievitch. "Detection of False Data Injection Attack in AGC System Based on Random Forest." Machines 11, no. 1 (January 9, 2023): 83. http://dx.doi.org/10.3390/machines11010083.
Full textRégnière, Jacques, Rémi Saint-Amant, Jean-Claude Thireau, Pierre Therrien, Christian Hébert, and Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 2: Meteorus trachynotus (Hymenoptera: Braconidae)." Forests 12, no. 2 (January 28, 2021): 155. http://dx.doi.org/10.3390/f12020155.
Full textMironov, N. Yu, V. V. Vlodzyanovskiy, Yu A. Yuricheva, S. F. Sokolov, S. P. Golitsyn, L. V. Rosenstraukh, and E. I. Chazov. "Safety and Effectiveness of Electrical and Pharmacological Cardioversion in Persistent Atrial Fibrillation. Part 2: Assessment of Safety." Rational Pharmacotherapy in Cardiology 14, no. 6 (January 5, 2019): 826–30. http://dx.doi.org/10.20996/1819-6446-2018-14-6-826-830.
Full textBarenghi, Alessandro, Gioele Falcetti, and Gerardo Pelosi. "Locating Side Channel Leakage in Time through Matched Filters." Cryptography 6, no. 2 (May 30, 2022): 26. http://dx.doi.org/10.3390/cryptography6020026.
Full textAlfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.
Full textFujimura, T., Y. Takahagi, H. Nagashima, S. Miyagawa, T. Shigehisa, and H. Murakami. "33 PRODUCTION OF TRANSGENIC-CLONED PIGS CARRYING HDAF, GnT-III AND HETEROZYGOUSLY DISRUPTED ±-1,3-GALACTOSYLTRANSFERASE GENES." Reproduction, Fertility and Development 17, no. 2 (2005): 166. http://dx.doi.org/10.1071/rdv17n2ab33.
Full textQuadir, Md Abdul, J. Christy Jackson, J. Prassanna, K. Sathyarajasekaran, K. Kumar, H. Sabireen, Shivam Ubarhande, and V. Vijaya Kumar. "An efficient algorithm to detect DDoS amplification attacks." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.
Full textHe, Xing, and Michael S. Scordilis. "Efficiently Synchronized Spread-Spectrum Audio Watermarking with Improved Psychoacoustic Model." Research Letters in Signal Processing 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/251868.
Full textYeniçeri, Ramazan, Selçuk Kilinç, and Müştak E. Yalçin. "Attack on a Chaos-Based Random Number Generator Using Anticipating Synchronization." International Journal of Bifurcation and Chaos 25, no. 02 (February 2015): 1550021. http://dx.doi.org/10.1142/s0218127415500212.
Full textKlymiuk, N., A. Baehr, B. Kessler, M. Kurome, A. Wuensch, N. Herbach, R. Wanke, H. Nagashima, and E. Wolf. "425 HIGH-LEVEL EXPRESSION OF LEA29Y IN PANCREATIC ISLETS OF TRANSGENIC PIGS." Reproduction, Fertility and Development 22, no. 1 (2010): 370. http://dx.doi.org/10.1071/rdv22n1ab425.
Full textGupta, Tanvi, Sumit Kumar, Ankit Tomar, and KamalKant Verma. "DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks." International Journal of Security and Its Applications 10, no. 8 (August 31, 2016): 395–406. http://dx.doi.org/10.14257/ijsia.2016.10.8.35.
Full textPan, Shengyi, Thomas Morris, and Uttam Adhikari. "Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data." IEEE Transactions on Industrial Informatics 11, no. 3 (June 2015): 650–62. http://dx.doi.org/10.1109/tii.2015.2420951.
Full textKumar, Gulshan, Rahul Saha, Mandeep Singh, and Mritunjay Kumar Rai. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN." International Journal of Information Security and Privacy 12, no. 1 (January 2018): 53–62. http://dx.doi.org/10.4018/ijisp.2018010105.
Full textGupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, and Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids." Energies 14, no. 16 (August 12, 2021): 4941. http://dx.doi.org/10.3390/en14164941.
Full textSOLAK, ERCAN. "CRYPTANALYSIS OF OBSERVER BASED DISCRETE-TIME CHAOTIC ENCRYPTION SCHEMES." International Journal of Bifurcation and Chaos 15, no. 02 (February 2005): 653–58. http://dx.doi.org/10.1142/s0218127405012260.
Full textZhu, Baoshan, Jun Lei, and Shuliang Cao. "Numerical Simulation of Vortex Shedding and Lock-in Characteristics for a Thin Cambered Blade." Journal of Fluids Engineering 129, no. 10 (April 28, 2007): 1297–305. http://dx.doi.org/10.1115/1.2776964.
Full textLegett, Henry D., Ikkyu Aihara, and X. E. Bernal. "The dual benefits of synchronized mating signals in a Japanese treefrog: attracting mates and manipulating predators." Philosophical Transactions of the Royal Society B: Biological Sciences 376, no. 1835 (August 23, 2021): 20200340. http://dx.doi.org/10.1098/rstb.2020.0340.
Full textYoussef, El-Nasser S., Fabrice Labeau, and Marthe Kassouf. "Detection of Load-Altering Cyberattacks Targeting Peak Shaving Using Residential Electric Water Heaters." Energies 15, no. 20 (October 21, 2022): 7807. http://dx.doi.org/10.3390/en15207807.
Full textSang, D.-K., and M.-J. Tahk. "Guidance law switching logic considering the seeker's field-of-view limits." Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering 223, no. 8 (August 1, 2009): 1049–58. http://dx.doi.org/10.1243/09544100jaero614.
Full textRadziukevich, M. L. "A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks." «System analysis and applied information science», no. 3 (October 4, 2021): 51–58. http://dx.doi.org/10.21122/2309-4923-2021-3-51-58.
Full textGopinath, S., A. Pillai, A. G. Diwan, J. V. Pattisapu, and K. Radhakrishnan. "Reiterating the role of corpus callosum in generalization of interictal and ictal epileptiform discharges: a case report with post-callosotomy intracranial electroencephalography in Lennox–Gastaut syndrome." Epilepsy and paroxysmal conditions 13, no. 3 (October 29, 2021): 249–53. http://dx.doi.org/10.17749/2077-8333/epi.par.con.2021.086.
Full text