Artículos de revistas sobre el tema "Perimeter defense"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Perimeter defense".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Wallace, Tom. "Optimize Perimeter Defense for Utility Security". Opflow 43, n.º 5 (mayo de 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.
Texto completoAndriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS". Health and Ecology Issues, n.º 1 (28 de marzo de 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.
Texto completoCrawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers y J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria". Proceedings of the National Academy of Sciences 109, n.º 27 (18 de junio de 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.
Texto completoDaly-Grafstein, Daniel y Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA". Journal of Sports Analytics 6, n.º 4 (7 de enero de 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.
Texto completoKim, Kwon-il, Yeon-seung Ryu y Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter". Korean Journal of Industry Security 11, n.º 1 (30 de abril de 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.
Texto completoChen, S. y Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks". IEEE Transactions on Parallel and Distributed Systems 16, n.º 6 (junio de 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.
Texto completoShishika, Daigo, James Paulos y Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games". IEEE Robotics and Automation Letters 5, n.º 2 (abril de 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.
Texto completoEdwards, Paul M. y Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter". Journal of Military History 62, n.º 4 (octubre de 1998): 960. http://dx.doi.org/10.2307/120234.
Texto completoAl-Qassim, Mohammed A. y Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software". Iraqi Journal of Information & Communications Technology 1, n.º 2 (27 de julio de 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.
Texto completoSteingartner, William, Darko Galinec y Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model". Symmetry 13, n.º 4 (3 de abril de 2021): 597. http://dx.doi.org/10.3390/sym13040597.
Texto completoNOPONEN, HELZI, ANN MARKUSEN, KARL DRIESSEN y YANG SHAO. "Is There a Trade and Defense Perimeter? The Regional Impacts of Trade and Defense Spending in the United States, 1978-1986". Growth and Change 27, n.º 4 (octubre de 1996): 405–33. http://dx.doi.org/10.1111/j.1468-2257.1996.tb00975.x.
Texto completoYungblud, Valerii T. y Denis A. Sadakov. "Inclusion of the Republic of Korea in the US Defense Perimeter after the Korean War". Vestnik of Saint Petersburg University. History 66, n.º 1 (2021): 226–44. http://dx.doi.org/10.21638/11701/spbu02.2021.114.
Texto completoTang, Zhi Jie, Ping Long Liu, Qian Luo y Zhi Feng Ye. "Main Control System Design for Balanced Tension-Type Electronic Fence". Applied Mechanics and Materials 687-691 (noviembre de 2014): 349–52. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.349.
Texto completoMohamed, Osama y Rania Khattab. "Assessment of Progressive Collapse Resistance of Steel Structures with Moment Resisting Frames". Buildings 9, n.º 1 (9 de enero de 2019): 19. http://dx.doi.org/10.3390/buildings9010019.
Texto completoLi, Xianfeng, Sen Xu y Xiaopeng Hua. "Pattern Recognition of Grating Perimeter Intrusion Behavior in Deep Learning Method". Symmetry 13, n.º 1 (6 de enero de 2021): 87. http://dx.doi.org/10.3390/sym13010087.
Texto completoMol, Arjan, Ton Van der Plas, Robert McCall y Merel Kroeders. "PREDICTING THE RESHAPING OF TEMPORARILY EXPOSED BUNDS WITH XBEACH-G". Coastal Engineering Proceedings, n.º 36 (30 de diciembre de 2018): 31. http://dx.doi.org/10.9753/icce.v36.sediment.31.
Texto completoGolovan, V., S. Tarasenko, O. Budur, K. Dekhtyarenko y R. Bubenshchikov. "SUBSTANTIATION OF PRINCIPLES OF STRUCTURE AND EVALUATION OF EFFICIENCY OF PERIMETER SYSTEMS OF PROTECTION OF ARSENALS, BASES AND WAREHOUSES". Collection of scientific works of Odesa Military Academy 1, n.º 14 (25 de enero de 2021): 112–22. http://dx.doi.org/10.37129/2313-7509.2020.14.1.112-122.
Texto completoDulanovic, Nenad, Dane Hinic y Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure". Yugoslav Journal of Operations Research 18, n.º 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.
Texto completoDyda, Iryna. "UKRAINIAN URBAN TRADITIONS: RELEVANCE IN THE CONDITIONS OF MODERN CHALLENGES". Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Arhìtektura 4, n.º 2 (22 de diciembre de 2022): 79–86. http://dx.doi.org/10.23939/sa2022.02.079.
Texto completoBhattacharya, Deepak. "Spiritualism Seeks Sword for Self Defense Konark, World Heritage Site: Hieroglyphics – Katha". Historical Journal 14, n.º 1 (7 de marzo de 2023): 21–37. http://dx.doi.org/10.3126/hj.v14i1.52956.
Texto completoHuang, Yun, Ya Jie Zhu y Heng Hui Lian. "Research and Realization of Apron Protection System Based on Internet of Things". Advanced Materials Research 912-914 (abril de 2014): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1339.
Texto completoLu, Hainan, Ningning Wang, Nian Fang y Lutang Wang. "Signal recognition method based on Mel frequency cepstral coefficients and fast dynamic time warping for optical fiber perimeter defense systems". Applied Optics 61, n.º 7 (1 de marzo de 2022): 1758. http://dx.doi.org/10.1364/ao.448754.
Texto completoShvaiba, D. N. "System for Ensuring Social and Economic Security of Industrial Sector". Science & Technique 18, n.º 1 (12 de febrero de 2019): 70–74. http://dx.doi.org/10.21122/2227-1031-2019-18-1-70-74.
Texto completoDeidda, M., C. Musa y G. Vacca. "A GIS OF SARDINIA'S COASTAL DEFENSE SYSTEM (XVI – XVIII CENTURY)". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-4/W7 (30 de junio de 2015): 17–22. http://dx.doi.org/10.5194/isprsarchives-xl-4-w7-17-2015.
Texto completoSoroushian, Siavash, Esmaeel Rahmanishamsi, Ki P. Ryu, Manos Maragakis y Andrei M. Reinhorn. "Experimental Fragility Analysis of Suspension Ceiling Systems". Earthquake Spectra 32, n.º 2 (mayo de 2016): 881–908. http://dx.doi.org/10.1193/071514eqs109m.
Texto completoRodriguez, Annette R., Jieh-Juen Yu, Christopher Navara, James P. Chambers, M. Neal Guentzel y Bernard P. Arulanandam. "Contribution of FcɛRI-associated vesicles to mast cell–macrophage communication following Francisella tularensis infection". Innate Immunity 22, n.º 7 (22 de agosto de 2016): 567–74. http://dx.doi.org/10.1177/1753425916663639.
Texto completoMadni, Azad y Carla Madni. "Architectural Framework for Exploring Adaptive Human-Machine Teaming Options in Simulated Dynamic Environments". Systems 6, n.º 4 (13 de diciembre de 2018): 44. http://dx.doi.org/10.3390/systems6040044.
Texto completoSharma, Vishal, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim y Sun-Young Lee. "A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT". Security and Communication Networks 2017 (2017): 1–24. http://dx.doi.org/10.1155/2017/4749085.
Texto completoAhn, Ezekiel, Jacob Botkin, Vishnutej Ellur, Yoonjung Lee, Kabita Poudel, Louis K. Prom y Clint Magill. "Genome-Wide Association Study of Seed Morphology Traits in Senegalese Sorghum Cultivars". Plants 12, n.º 12 (16 de junio de 2023): 2344. http://dx.doi.org/10.3390/plants12122344.
Texto completoCarpenter, John E., Amy C. Clayton, Kevin C. Halling, Daniel J. Bonthius, Erin M. Buckingham, Wallen Jackson, Steven M. Dotzler, J. Patrick Card, Lynn W. Enquist y Charles Grose. "Defensive Perimeter in the Central Nervous System: Predominance of Astrocytes and Astrogliosis during Recovery from Varicella-Zoster Virus Encephalitis". Journal of Virology 90, n.º 1 (21 de octubre de 2015): 379–91. http://dx.doi.org/10.1128/jvi.02389-15.
Texto completoTan, Choon Seng, Douglas L. Van Bossuyt y Britta Hale. "System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment". Systems 9, n.º 4 (3 de noviembre de 2021): 79. http://dx.doi.org/10.3390/systems9040079.
Texto completoAlconini, Sonia. "The Southeastern Inka Frontier against the Chiriguanos: Structure and Dynamics of the Inka Imperial Borderlands". Latin American Antiquity 15, n.º 4 (diciembre de 2004): 389–418. http://dx.doi.org/10.2307/4141585.
Texto completoOzhiganova, Marina y Emil Kurtametov. "Using Neural Networks to Protect Web Applications". NBI Technologies, n.º 2 (diciembre de 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.
Texto completoKriytchenko, A. A. "THE VARIANT OF SYSTEMATIZATION OF THE HILL-FORTS OF SCYTHIAN AGE OF DNIEPER-DON FOREST-STEPPE INTERFLUVE". Archaeology and Early History of Ukraine 31, n.º 2 (25 de marzo de 2019): 76–82. http://dx.doi.org/10.37445/adiu.2019.02.05.
Texto completoKarki, Sonali y Dr Kiran V. "Performance Comparison of SSH Libraries". Journal of University of Shanghai for Science and Technology 23, n.º 06 (18 de junio de 2021): 868–73. http://dx.doi.org/10.51201/jusst/21/05357.
Texto completoVlasov, N. V. "The Contemporary Chinese Policy in Southeast Asia". MGIMO Review of International Relations, n.º 3(42) (28 de junio de 2015): 60–67. http://dx.doi.org/10.24833/2071-8160-2015-3-42-60-67.
Texto completoSchwenk, J. Tyler, Steven D. Sloan, Julian Ivanov y Richard D. Miller. "Surface-wave methods for anomaly detection". GEOPHYSICS 81, n.º 4 (julio de 2016): EN29—EN42. http://dx.doi.org/10.1190/geo2015-0356.1.
Texto completoRybchynskyi, Nestor-Mykolai. "GRAPHIC RECONSTRUCTION OF DEFENSE BULWARK OF THE THIRD FORTIFIED SETTLEMENT OF IX - X CENTURIES. IN THE KOROSTEN CITY (ON BASIS OF ARCHAEOLOGICAL DATA)". Current Issues in Research, Conservation and Restoration of Historic Fortifications 14, n.º 2021 (2021): 132–42. http://dx.doi.org/10.23939/fortifications2020.14.132.
Texto completoRyabchenko, A. G. y E. V. Orel. "Military threat in Krasnodar. 1942-1943". Scientific bulletin of the Southern Institute of Management, n.º 4 (25 de diciembre de 2018): 112–17. http://dx.doi.org/10.31775/2305-3100-2018-4-112-117.
Texto completoSkorospelov, Petr P. "“A Special Form of Making Foreign Policy by the Threat of War to Imperialists”. A Case Study of Military-Political Activity of Central Committee Presidium under N.S. Khrushchev, 1954–1964. Part 1". Vostok. Afro-aziatskie obshchestva: istoriia i sovremennost, n.º 2 (2022): 9. http://dx.doi.org/10.31857/s086919080019661-4.
Texto completoKhokhon, Mykhailo. "BASILIAN ORDER MONASTERY IN SCHEPLOTY. HISTORY, ARCHITECTURE AND PROBLEMS OF PRESERVATION". Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Arhìtektura 4, n.º 2 (22 de diciembre de 2022): 198–204. http://dx.doi.org/10.23939/sa2022.02.198.
Texto completoLevine, Ari Daniel. "Walls and Gates, Windows and Mirrors: Urban Defences, Cultural Memory, and Security Theatre in Song Kaifeng". East Asian Science, Technology, and Medicine 39, n.º 1 (25 de junio de 2014): 55–118. http://dx.doi.org/10.1163/26669323-03901003.
Texto completoPryshchepa, B. A. "THE CASTLE OF CZARTORYSKI PRINCES IN KLEVAN: STAGES OF DEVELOPMENT, PLANNING AND BUILDINGS". Archaeology and Early History of Ukraine 43, n.º 2 (30 de junio de 2022): 111–20. http://dx.doi.org/10.37445/adiu.2022.02.08.
Texto completoAmineh, Mehdi Parvizi y Henk Houweling. "Global Energy Security and Its Geopolitical Impediments—The Case of the Caspian Region". Perspectives on Global Development and Technology 6, n.º 1-3 (2007): 365–88. http://dx.doi.org/10.1163/156914907x207793.
Texto completoAkunna, Gabryel G., LC Saalu, A. Irozuoke y E. Joshua. "Rats kidney morphological particularities and functions post-treatment with vernonia amygdalina extract and low-dose lead acetate". European Journal of Anatomy 27 (enero de 2023): 91–102. http://dx.doi.org/10.52083/ztzk6810.
Texto completoMohanty, Sudeshna, Subhrasmita Mahapatra, Sanat Ku Panda, Plavan Ku Rath, Manoj Ku Sarangi y Olga I. Bylya. "Development and Optimization of Perimeter Traversing Robot". Applied Mechanics and Materials 186 (junio de 2012): 280–88. http://dx.doi.org/10.4028/www.scientific.net/amm.186.280.
Texto completoRogobete, M. "An Unmanned Underwater Vehicle Defence System". Scientific Bulletin of Naval Academy XXV, n.º 1 (15 de agosto de 2022): 16–22. http://dx.doi.org/10.21279/1454-864x-22-i1-002.
Texto completoLin, Kung-Sung, Kung-Hua Yeh, Yan-Ju Chiang y Likarn Wang. "Fiber-Optic Perimeter Intrusion Detection by Employing a Fiber Laser Cavity in Each Defensed Zone". IEEE Sensors Journal 18, n.º 20 (15 de octubre de 2018): 8352–60. http://dx.doi.org/10.1109/jsen.2018.2866223.
Texto completoPortela i Valls, S., M. J. Viñals y G. Muñoz Cosme. "ACTIONS FOR THE ENHANCEMENT OF HERITAGE. THE CASE OF THE TOWN WALLS OF MORELLA (CASTELLÓN, SPAIN)". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-M-1-2020 (24 de julio de 2020): 877–84. http://dx.doi.org/10.5194/isprs-archives-xliv-m-1-2020-877-2020.
Texto completoSalzer, Thomas E. "A Low-Impedance Projection Welding Device for Large Package Hermetic Sealing". International Symposium on Microelectronics 2015, n.º 1 (1 de octubre de 2015): 000810–16. http://dx.doi.org/10.4071/isom-2015-thp32.
Texto completo