Literatura académica sobre el tema "Synchronized attack"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Synchronized attack".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Synchronized attack"
Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M y A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques". Journal of University of Shanghai for Science and Technology 23, n.º 06 (22 de junio de 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Texto completoManaseer, Saher, Ahmad K. Al Hwaitat y Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de septiembre de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Texto completoWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee y Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks". Computer Science and Information Systems 11, n.º 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Texto completoO'Connell, Michael y Aaron Bernard. "A Serious Cause of Panic Attack". Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.
Texto completoButcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide". Journal of Genocide Research 15, n.º 3 (septiembre de 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.
Texto completoLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin y Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring". Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Texto completoManaseer, Saher y Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System". Modern Applied Science 12, n.º 10 (29 de septiembre de 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Texto completoRamkumar, B. N. y T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method". ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Texto completoSingh, Rupinder, Jatinder Singh y Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks". Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Texto completoUllah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard y Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1". Cancers 12, n.º 9 (18 de septiembre de 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.
Texto completoTesis sobre el tema "Synchronized attack"
Gomes, Lara Elena. "Comparação entre forças propulsivas efetivas calculadas e medida durante um palmateio de sustentação". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2010. http://hdl.handle.net/10183/27677.
Texto completoPropulsive force generated during sculling motion results from drag and lift propulsive forces, and the component acting in the direction of motion is the effective propulsive force. These forces may be calculated using hydrodynamic equations, but these equations do not consider all mechanisms that contribute to the propulsion. Thus, the main purpose of this study was to compare the calculated effective propulsive force using the hydrodynamic equations and the measured effective propulsive force during a support sculling motion (vertical position with the head above the water‟s surface) in each phase of sculling. For this, a practitioner of synchronized swimming performed sculling motion in a vertical position with the head above the water‟s surface during 15 seconds, while kinematic and kinetic data were obtained by 3D videogrammetry and dynamometry respectively. Graphical techniques from Bland and Altman were used to compare the measured effective propulsive force and calculated effective propulsive force during sculling motion. The calculated effective propulsive force and the measured effective propulsive force were different, the measured being greater than the calculated. Moreover, the results indicated sculling motion performed was not symmetric, that is, the orientation and propulsive forces between the right and left hands were different. Therefore, the result of this study highlights the importance of the unsteady mechanisms for the propulsion during sculling motion, because the calculated forces using the hydrodynamic equations presented low values throughout the sculling motion.
KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks". Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Texto completoLibros sobre el tema "Synchronized attack"
Government, U. S. Planning Considerations: Complex Coordinated Terrorist Attacks - Homeland Security Threat Background and Characteristics, Synchronized and Independent Teams at Multiple Locations. Independently Published, 2019.
Buscar texto completoCapítulos de libros sobre el tema "Synchronized attack"
Barbu, Guillaume y Hugues Thiebeauld. "Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -". En Smart Card Research and Advanced Applications, 18–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27257-8_2.
Texto completoSingh, Shreya, Rimjhim Kanaujia y Shivaprakash M Rudramurthy. "Immunopathogenesis of Aspergillosis". En The Genus Aspergillus - Pathogenicity, Mycotoxin Production and Industrial Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.98782.
Texto completoSöyleyici, Gülin Tuğçe y Adnan Kalkan. "A New Problem Emerging With the Internet and Digital Media". En Advances in Social Networking and Online Communities, 420–32. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5426-8.ch025.
Texto completoBamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies". En Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 74–94. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch004.
Texto completoBamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies". En Cyber Security and Threats, 1044–59. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch051.
Texto completoConde, Maite. "Toward New Cinematic Foundations". En Foundational Films, 242–46. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520290983.003.0012.
Texto completoLegeżyńska, Joanna, Claude De Broyer y Jan Marcin Węsławski. "Invasion of the Poles". En Evolution and Biogeography, 216–46. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190637842.003.0009.
Texto completoActas de conferencias sobre el tema "Synchronized attack"
Wang, Hongxia, Mingquan Fan y Qing Qian. "Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack". En 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE, 2011. http://dx.doi.org/10.1109/cse.2011.66.
Texto completoShah, Abdullah L., Ali T. Al-Awami y Wessam Mesbah. "Attack Detection and Measurement Correction in Distribution Systems with Non-Synchronized Measurements". En 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2022. http://dx.doi.org/10.1109/isgt-europe54678.2022.9960624.
Texto completoPrasad, Romesh, Matthew K. Swanson y Young Moon. "Recovering From Cyber-Manufacturing Attacks by Reinforcement Learning". En ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-93982.
Texto completoLing, Yang y Chu Weihua. "Research on movement relationship and synchronized motion control strategy for the attack angle device of the 2.4m transonic wind tunnel". En 2016 IEEE International Conference on Mechatronics and Automation. IEEE, 2016. http://dx.doi.org/10.1109/icma.2016.7558569.
Texto completoPrier, Michael W. y James A. Liburdy. "Discrete Vortex Modeling of a Flapping Foil With Activated Leading Edge Motion". En ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/ajkfluids2019-4964.
Texto completoRiedel, Colton, Guoyu Fu, Donald Beyette y Jyh-Charn Liu. "Measurement System Timing Integrity in the Presence of Faults and Malicious Attacks". En 2019 International Conference on Smart Grid Synchronized Measurements and Analytics (SGSMA). IEEE, 2019. http://dx.doi.org/10.1109/sgsma.2019.8784502.
Texto completoJin, Chenglu, Lingyu Ren, Xubin Liu, Peng Zhang y Marten van Dijk. "Mitigating Synchronized Hardware Trojan Attacks in Smart Grids". En CPS Week '17: Cyber Physical Systems Week 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3055386.3055394.
Texto completoAmmour, Rabah, Leonardo Brenner, Isabel Demongodin, Said Amari y Dimitri Lefebvre. "Costs analysis of stealthy attacks with bounded output synchronized Petri nets". En 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). IEEE, 2021. http://dx.doi.org/10.1109/case49439.2021.9551583.
Texto completoMattei, Andrew K., W. Mack Grady, P. Jay Caspary y Scott A. McBride. "Detection of time spoofing attacks on GPS synchronized phasor measurement units". En 2016 69th Annual Conference for Protective Relay Engineers (CPRE). IEEE, 2016. http://dx.doi.org/10.1109/cpre.2016.7914884.
Texto completoBlum, Ronny, Himanshu Sharma y Thomas Pany. "Smartphone Behaviour under Sophisticated Time Synchronized and Record and Replay Spoofing Attacks". En 2022 International Technical Meeting of The Institute of Navigation. Institute of Navigation, 2022. http://dx.doi.org/10.33012/2022.18183.
Texto completo