Literatura académica sobre el tema "SILENT ATTACK"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "SILENT ATTACK".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "SILENT ATTACK"
Sushma, Vasamsetti Ramya Sri, K. Nikhil, K. Ashish Reddy y L. Sunitha. "Diagnosis of Cardiovascular Disease using Deep Learning". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 371–78. http://dx.doi.org/10.22214/ijraset.2023.49209.
Texto completoSharma, Bhuvan y Spinder Kaur. "Analysis and Solutions of Silent Heart Attack Using Python". International Journal of Computer Sciences and Engineering 10, n.º 1 (31 de enero de 2022): 37–40. http://dx.doi.org/10.26438/ijcse/v10i1.3740.
Texto completoAnastasilakis, Dimitrios A., Polyzois Makras, Stergios A. Polyzos y Athanasios D. Anastasilakis. "Asymptomatic and normocalcemic hyperparathyroidism, the silent attack: a combo-endocrinology overview". Hormones 18, n.º 1 (25 de septiembre de 2018): 65–70. http://dx.doi.org/10.1007/s42000-018-0069-6.
Texto completoTeitelbaum, Michael, Rafail A. Kotronias, Luciano A. Sposato y Rodrigo Bagur. "Cerebral Embolic Protection in TAVI: Friend or Foe". Interventional Cardiology Review 14, n.º 1 (25 de febrero de 2019): 22–25. http://dx.doi.org/10.15420/icr.2018.32.2.
Texto completoMykland, Martin Syvertsen, Martin Uglem, Lars Jacob Stovner, Eiliv Brenner, Mari Storli Snoen, Gøril Bruvik Gravdahl, Trond Sand y Petter Moe Omland. "Insufficient sleep may alter cortical excitability near the migraine attack: A blinded TMS crossover study". Cephalalgia 43, n.º 3 (14 de febrero de 2023): 033310242211483. http://dx.doi.org/10.1177/03331024221148391.
Texto completoLi, Ying, Nan Liu, Yonghua Huang, Wei Wei, Fei Chen y Weiwei Zhang. "Risk Factors for Silent Lacunar Infarction in Patients with Transient Ischemic Attack". Medical Science Monitor 22 (11 de febrero de 2016): 447–53. http://dx.doi.org/10.12659/msm.895759.
Texto completoYang, Tiancheng, Ankit Mittal, Yunsi Fei y Aatmesh Shrivastava. "Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities". IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, n.º 1 (enero de 2021): 124–35. http://dx.doi.org/10.1109/tvlsi.2020.3034878.
Texto completoDemirel, Esra Aciman, Ufuk Emre, Aysun Ünal, Banu Özen, H. Tuğrul Atasoy y Fürüzan Öztürk. "Evaluation of silent cerebral lesions in patients with first ischemic stroke attack". Neurology, Psychiatry and Brain Research 18, n.º 1 (enero de 2012): 22–26. http://dx.doi.org/10.1016/j.npbr.2011.12.001.
Texto completoHoward, George, Gregory W. Evans y James F. Toole. "Silent cerebral infarctions in transient ischemic attack populations: Implications of advancing technology". Journal of Stroke and Cerebrovascular Diseases 4 (enero de 1994): S47—S50. http://dx.doi.org/10.1016/s1052-3057(10)80257-5.
Texto completoJati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries". Simulacra 4, n.º 2 (18 de noviembre de 2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.
Texto completoTesis sobre el tema "SILENT ATTACK"
Paris, Antoine. "Synthèses de dérivés silylés en séries pyridinique et diazinique. Application de la réaction d'ipso-désilylation à l'élaboration de polyhétérocycles". Rouen, 1997. http://www.theses.fr/1997ROUES053.
Texto completoCHEN, TING-WEI y 陳庭葦. "Silent attack-Discussion on the Behavior of Network Bullying". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c4yuw8.
Texto completo正修科技大學
資訊管理研究所
105
The Internet is far away, a plain little things, one on the Internet, through the masses of the masses of mutual transmission, and even public trial, often resulting in the event of the second person in the event of injury. However, most of the message will be sent out of the message, holding the curiosity and play the majority of the mentality, do not think this behavior is wrong? I do not know the network to help spread or fun based on fun and free to share Audio and video, most likely have violated the law but no knowledge. Therefore, this study is aimed at the well-known community, relying on the power of the Internet and was even the attention of the event, and with interviews with well-known secondary school tutors and the use of questionnaires to the three information derived from the integration The following points: 1. On the Internet to share and spread indecent or false audio and video, most people are holding a fun and curious, rather than absolute malicious. 2. In the questionnaire survey, that part of the people who share the forwarding does not know this behavior may have violated the law, and know their own behavior is wrong, but often holding a lucky mind. 3. According to the survey in this study, even if most people are aware of the Internet to send and distribute some indecent or false audio and video text is a violation of the law, but still can not help but "we are doing, I will not be so untrue. " 4. Finally, this study argues that, although not in the chaos with the heavy code, but for the behavior of the rules and deeds on the Internet, it is necessary and clear, can not be vague, because often distributed anonymous network of others, are holding a lucky mind And make an act.
MUKOKO, FUNGAYI DONEWELL. "USING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKS". Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380.
Texto completoLibros sobre el tema "SILENT ATTACK"
Verma, Virendra. Fall of Dera Baba Nanak Bridge: A silent night attack. Dehradun, U.P: Youth Education Publications, 1989.
Buscar texto completoCalvert, James F. Silent running: My years on a World War II attack submarine. New York: J. Wiley, 1995.
Buscar texto completoP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, N.J: John Wiley, 2005.
Buscar texto completoP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, NJ: John Wiley, 2004.
Buscar texto completoKristen, Strom Terry y Fox Barry, eds. Syndrome X: Overcoming the silent killer that can give you a heart attack. New York: Simon and Schuster, 2000.
Buscar texto completoMiller, Vickie Gail. Doris Miller: A silent medal of honor. Austin, Tex: Eakin Press, 1997.
Buscar texto completoReader's Digest (Australia) Pty. Ltd., ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1990.
Buscar texto completoPty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney [Australia]: Reader's Digest, 1987.
Buscar texto completoPty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1986.
Buscar texto completoSilent siege-II: Japanese attacks on North America in World War II. 2a ed. Medford, Or: Webb Research Group, 1988.
Buscar texto completoCapítulos de libros sobre el tema "SILENT ATTACK"
Mukoko, Fungayi Donewell, Aman Jatain y Yojna Arora. "Cloud Silent Attack Strategies Analysis Alongside Proposed Generic Modelling". En Advances in Intelligent Systems and Computing, 491–501. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3590-9_38.
Texto completoMajumder, Sharmistha, Mrinal Kanti Deb Barma, Ashim Saha y A. B. Roy. "Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning". En Studies in Computational Intelligence, 145–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97113-7_9.
Texto completo"The Revolution in Heart Attack Treatment". En Fighting the Silent Killer, 147–57. A K Peters/CRC Press, 1993. http://dx.doi.org/10.1201/9781439864753-16.
Texto completoBell, Derrick. "The School Desegregation Era". En Silent Covenants. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195172720.003.0014.
Texto completoJoseph, Theyamma y Jacquline C. Vadasseril. "Diabetes a Silent Killer: A Threat for Cardiorespiratory Fitness". En Cardiorespiratory Fitness - New Topics [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.108164.
Texto completoAdams, Andrea C. "Cerebrovascular Disease". En Mayo Clinic Essential Neurology, 352–92. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190206895.003.0011.
Texto completoDelgado, James P. "Controversy and Inquiry". En The Curse of the Somers, 115—C6.F2. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197575222.003.0007.
Texto completoInouye, Melissa Wei-Tsing. "The Handwritten Hymnbook (1958–1974)". En China and the True Jesus, 212–34. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190923464.003.0008.
Texto completovan Schaik, Carel P. y John Terborgh. "The Silent Crisis: The State of Rain Forest Nature Preserves". En Last Stand. Oxford University Press, 1997. http://dx.doi.org/10.1093/oso/9780195095548.003.0008.
Texto completoYanık, Lerna K. y Fulya Hisarlıoğlu. "‘They wrote history with their bodies’: Necrogeopolitics, Necropolitical Spaces and the Everyday Spatial Politics of Death in Turkey". En Turkey's Necropolitical Laboratory, 46–70. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474450263.003.0003.
Texto completoActas de conferencias sobre el tema "SILENT ATTACK"
Grande, C. E. Lopez y R. S. Guadron. "Social engineering: The silent attack". En 2015 IEEE Thirty-Fifth Central American and Panama Convention (CONCAPAN XXXV). IEEE, 2015. http://dx.doi.org/10.1109/concapan.2015.7428452.
Texto completoCroft, Neil. "On forensics: A silent SMS attack". En 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320454.
Texto completoKoch, Robert y Mario Golling. "Silent Battles: Towards Unmasking Hidden Cyber Attack". En 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8757146.
Texto completoChen, Ting, Haiyang Tang, Xiaodong Lin, Kuang Zhou y Xiaosong Zhang. "Silent Battery Draining Attack against Android Systems by Subverting Doze Mode". En GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842268.
Texto completoGreitzer, Edward M. "Some Aerodynamic Problems of Aircraft Engines: Fifty Years After". En ASME Turbo Expo 2007: Power for Land, Sea, and Air. ASMEDC, 2007. http://dx.doi.org/10.1115/gt2007-28364.
Texto completoCerkovnik, Mark y Wasy Akhtar. "Inclusion of Crack Face Pressure in Reference Stress for Thick Walled Risers and Flowlines". En ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-11021.
Texto completoMukoko, Fungayi Donewell y Vikas Thada. "A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks". En 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2018. http://dx.doi.org/10.1109/ic3i44769.2018.9007279.
Texto completoHajipour, Mohammad, Mohammad Ali Akhaee y Ramin Toosi. "Listening to Sounds of Silence for Audio replay attack detection". En 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS). IEEE, 2021. http://dx.doi.org/10.1109/icspis54653.2021.9729353.
Texto completoPayre, William, Jaume Perellomarch, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, Siraj Shaikh, Hoang Nguyen y Stewart Birrell. "Understanding drivers' trust after software malfunctions and cyber intrusions of digital displays in an automated car". En 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002463.
Texto completoKhalil Bhuiyan, Md Ebrahim, Dustin Smith, Eric J. Voss, Chin-Chuan Wei y Mohammad Shavezipur. "Surface Functionalization of Silicon MEMS Biochemical Sensors for the Detection of Foodborne Pathogens". En ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-69708.
Texto completoInformes sobre el tema "SILENT ATTACK"
Mizrach, Amos, Michal Mazor, Amots Hetzroni, Joseph Grinshpun, Richard Mankin, Dennis Shuman, Nancy Epsky y Robert Heath. Male Song as a Tool for Trapping Female Medflies. United States Department of Agriculture, diciembre de 2002. http://dx.doi.org/10.32747/2002.7586535.bard.
Texto completo