Artículos de revistas sobre el tema "Higher-order attack"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Higher-order attack".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
DONG, Le, Wen-Ling WU, Shuang WU y Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack". Chinese Journal of Computers 35, n.º 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
TSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA y Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n.º 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Sugio, Nobuyuki, Naoki Shibayama y Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM". Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Yao, Jian Bo y Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack". Advanced Engineering Forum 6-7 (septiembre de 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
SUGIO, N., H. AONO, S. HONGO y T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, n.º 1 (1 de enero de 2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Cayrol, Claudette y Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports". International Journal on Artificial Intelligence Tools 29, n.º 03n04 (junio de 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Zhao, Pu, Pin-yu Chen, Siyue Wang y Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 04 (3 de abril de 2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Chancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone". Arithmetic Teacher 38, n.º 6 (febrero de 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Kaedi, S., M. Doostari y M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA". Journal of Circuits, Systems and Computers 27, n.º 12 (22 de junio de 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Narote, Prof Amit, Vamika Zutshi, Aditi Potdar y Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de marzo de 2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Ramachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith y H. S. Mohan. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture". Journal of Electrical and Computer Engineering 2023 (28 de septiembre de 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Wei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein y Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 3 (28 de junio de 2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Thanh, Bui The y Ngo Kien Trung. "Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System". Journal Européen des Systèmes Automatisés 55, n.º 5 (30 de noviembre de 2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Sălăgean, Ana, R. Winter, Matei Mandache-Sălăgean y Raphael C. W. Phan. "Higher order differentiation over finite fields with applications to generalising the cube attack". Designs, Codes and Cryptography 84, n.º 3 (21 de septiembre de 2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Padmaja, K. y K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment". Webology 18, n.º 2 (23 de diciembre de 2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Yang, Zhifei, Wenmin Li, Fei Gao y Qiaoyan Wen. "FAPA: Transferable Adversarial Attacks Based on Foreground Attention". Security and Communication Networks 2022 (29 de octubre de 2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Le, Duc, Minh Dao y Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN". Information and Control Systems, n.º 3 (15 de junio de 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Fargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu y Ricardo Fuller. "Refractory Gout Attack". Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Liu, Fengchun, Sen Zhang, Weining Ma y Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine". Mathematics 10, n.º 15 (1 de agosto de 2022): 2713. http://dx.doi.org/10.3390/math10152713.
Yan, Ruoyu. "Combining Renyi Entropy and EWMA to Detect Common Attacks in Network". International Journal of Pattern Recognition and Artificial Intelligence 30, n.º 10 (23 de noviembre de 2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Baigang, Mi y Yu Jingyi. "An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack". International Journal of Aerospace Engineering 2021 (8 de septiembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
OMORI, ITSUKI. "A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential." Japanese Journal of Electrocardiology 10, n.º 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Sárkány, Zoltán, Kinga Sárkány y A. Horváth. "Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics". Acta Medica Marisiensis 62, n.º 1 (1 de marzo de 2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Singh, Anurag y Dr Subhadra Shaw. "Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Thaper, Rohit y Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing". Journal of Cases on Information Technology 17, n.º 3 (julio de 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Ueno, Rei, Naofumi Homma, Akiko Inoue y Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de diciembre de 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Dong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu y André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, n.º 6 (junio de 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Lu, Jiqiang, Yongzhuang Wei, Jongsung Kim y Enes Pasalic. "The higher-order meet-in-the-middle attack and its application to the Camellia block cipher". Theoretical Computer Science 527 (marzo de 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Al-Shabi, Mohammed. "Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV". International Journal of Communication Networks and Information Security (IJCNIS) 14, n.º 2 (31 de agosto de 2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Yildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker y A. Tufan. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER". Annals of the Rheumatic Diseases 81, Suppl 1 (23 de mayo de 2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
JIN, Xiaying, Yang LI y Quan PAN. "DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, n.º 6 (diciembre de 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Lombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley y K. N. E. Fitza. "Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain". Bulletin of Entomological Research 106, n.º 5 (24 de febrero de 2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Liu, Hongjuan, Zhiliang Zhu, Hai Yu y Qian Zhu. "Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Peng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han y Wei Wang. "Targeting attack hypergraph networks". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, n.º 7 (julio de 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Yildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk y A. Tufan. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN". Annals of the Rheumatic Diseases 81, Suppl 1 (23 de mayo de 2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Li, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang y Chengbin Jin. "The Notion of Transparency Order, Revisited". Computer Journal 63, n.º 12 (3 de julio de 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Li, Jiang, Xiaohui Liu y Chunjin Wei. "Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations". Applied Mathematics Letters 129 (julio de 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Branciard, C., N. Gisin, N. Lutkenhaus y V. Scarani. "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography". Quantum Information and Computation 7, n.º 7 (septiembre de 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Deng, Ya Juan y Shao Rong Hu. "Topology Characteristic of Hub-and-Spoke Transportation Network". Applied Mechanics and Materials 361-363 (agosto de 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Abreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi y Rafael Timóteo de Sousa Júnior. "Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique". Sensors 20, n.º 20 (16 de octubre de 2020): 5845. http://dx.doi.org/10.3390/s20205845.
Zhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng y Zhaohua Li. "VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model". Mathematics 12, n.º 9 (24 de abril de 2024): 1286. http://dx.doi.org/10.3390/math12091286.
Luo, Yuling, Dezheng Zhang y Junxiu Liu. "A Chaotic Block Cryptographic System Resistant to Power Analysis Attack". International Journal of Bifurcation and Chaos 29, n.º 08 (julio de 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Carvallo, P., E. Carvallo, R. Rivas, L. Carvallo y M. Del Sol. "Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack". International Journal of Medical and Surgical Sciences 3, n.º 1 (26 de octubre de 2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Yin, Ziwei, Kun Li y Hongjun Bi. "Trusted Multi-Domain DDoS Detection Based on Federated Learning". Sensors 22, n.º 20 (12 de octubre de 2022): 7753. http://dx.doi.org/10.3390/s22207753.
Sagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee y Ishaani Priyadarshini. "A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment". Future Internet 14, n.º 10 (19 de octubre de 2022): 301. http://dx.doi.org/10.3390/fi14100301.
Hadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad y Rohmah Pari. "Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test". Polymers 14, n.º 19 (24 de septiembre de 2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Khare, Surbhi y Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 3 (5 de abril de 2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Mialhe, PJ. "Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP". Brazilian Journal of Biology 74, n.º 3 (agosto de 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Domingo, Luis R., Mar Ríos-Gutiérrez y Patricia Pérez. "Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory". Chemistry 4, n.º 3 (26 de julio de 2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Salem, Ahmed, Xuening Liao, Yulong Shen y Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework". Wireless Communications and Mobile Computing 2018 (28 de agosto de 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.