Artículos de revistas sobre el tema "Synchronized attack"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Synchronized attack".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M y A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques". Journal of University of Shanghai for Science and Technology 23, n.º 06 (22 de junio de 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Texto completoManaseer, Saher, Ahmad K. Al Hwaitat y Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de septiembre de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Texto completoWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee y Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks". Computer Science and Information Systems 11, n.º 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Texto completoO'Connell, Michael y Aaron Bernard. "A Serious Cause of Panic Attack". Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.
Texto completoButcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide". Journal of Genocide Research 15, n.º 3 (septiembre de 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.
Texto completoLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin y Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring". Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Texto completoManaseer, Saher y Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System". Modern Applied Science 12, n.º 10 (29 de septiembre de 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Texto completoRamkumar, B. N. y T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method". ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Texto completoSingh, Rupinder, Jatinder Singh y Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks". Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Texto completoUllah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard y Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1". Cancers 12, n.º 9 (18 de septiembre de 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.
Texto completoRadziukevich, M. L. y V. F. Golikov. "Combined formаtion of a cryptographic key using synchronized artificial neural networks". Doklady BGUIR 19, n.º 1 (23 de febrero de 2021): 79–87. http://dx.doi.org/10.35596/1729-7648-2021-19-1-79-87.
Texto completoZhang, Li, Xinru Mao y Lin Ding. "Influence of attack angle on vortex-induced vibration and energy harvesting of two cylinders in side-by-side arrangement". Advances in Mechanical Engineering 11, n.º 1 (enero de 2019): 168781401882259. http://dx.doi.org/10.1177/1687814018822598.
Texto completoThangarathinam, P., N. Suganya, T. Praddeep y S. Vignesh. "Synchrophasor Technology for Cyber Security in Smart Grid". International Journal of Students' Research in Technology & Management 3, n.º 7 (29 de octubre de 2015): 436. http://dx.doi.org/10.18510/ijsrtm.2015.378.
Texto completoTruong, Victor, Alexandre Vervisch-Picois, Jose Rubio Hernan y Nel Samama. "Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias". Sensors 23, n.º 5 (2 de marzo de 2023): 2735. http://dx.doi.org/10.3390/s23052735.
Texto completoHuang, Xiaojie, Yunxia Xia y Da-Wei Ding. "Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks". Applied Sciences 13, n.º 3 (29 de enero de 2023): 1716. http://dx.doi.org/10.3390/app13031716.
Texto completoChiu, Hon Sun, King-Shan Lui y Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks". Journal of Communications Software and Systems 2, n.º 2 (5 de abril de 2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.
Texto completoAlbert Lusiola, Musoma. "Multi Agency Response to International Terrorism in Kenya: A Comparison of Dusit D2 and Westgate Terror Attacks". African Journal of Empirical Research 2, n.º 2 (14 de abril de 2021): 68–84. http://dx.doi.org/10.51867/ajer.v2i2.23.
Texto completoDass, Prajnamaya, Pranay Kumar Saha y Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks". International Journal of Business Data Communications and Networking 12, n.º 2 (julio de 2016): 28–61. http://dx.doi.org/10.4018/ijbdcn.2016070103.
Texto completoMatsuzono, Kosuke, Takao Yoshiki, Yosuke Wakutani, Yasuhiro Manabe, Toru Yamashita, Kentaro Deguchi, Yoshio Ikeda y Koji Abe. "Synchronized Babinski and Chaddock Signs Preceded the MRI Findings in a Case of Repetitive Transient Ischemic Attack". Internal Medicine 52, n.º 18 (2013): 2127–29. http://dx.doi.org/10.2169/internalmedicine.52.0190.
Texto completoMukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay y Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network". Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.
Texto completoEslahi, Ali, Shahryar Zeighami, Faisal Ahmed, Seyed Hossein Hosseini, Bahareh Ebrahimi y Mohammad Hossein Anbardar. "Synchronized Laparoscopic Bilateral Adrenalectomy for Pheochromocytoma in Multiple Endocrine Neoplasia Syndrome: A Case Report". Journal of Kidney Cancer and VHL 9, n.º 3 (2 de septiembre de 2022): 24–28. http://dx.doi.org/10.15586/jkcvhl.v9i3.239.
Texto completoWinter, R. W., K. A. Cornell, L. L. Johnson, M. Ignatushchenko, D. J. Hinrichs y M. K. Riscoe. "Potentiation of the antimalarial agent rufigallol." Antimicrobial Agents and Chemotherapy 40, n.º 6 (junio de 1996): 1408–11. http://dx.doi.org/10.1128/aac.40.6.1408.
Texto completoKarthika, P. y Karmel Arockiasamy. "Simulation of SDN in mininet and detection of DDoS attack using machine learning". Bulletin of Electrical Engineering and Informatics 12, n.º 3 (1 de junio de 2023): 1797–805. http://dx.doi.org/10.11591/eei.v12i3.5232.
Texto completoMarshall, David J. "Predatory and reproductive responses of the estuarine whelk Thais gradata (Caenogastropoda: Muricidae) to novel colonization by Musculista senhousia (Bivalvia: Mytilidae)". Journal of the Marine Biological Association of the United Kingdom 89, n.º 7 (2 de junio de 2009): 1387–93. http://dx.doi.org/10.1017/s0025315409000642.
Texto completoHuang, Huihui, Xuyang Miao, Zehui Wu y Qiang Wei. "An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network". Mathematical Problems in Engineering 2021 (2 de febrero de 2021): 1–14. http://dx.doi.org/10.1155/2021/8811970.
Texto completoHori, Michio, Masanori Kohda, Satoshi Awata y Satoshi Takahashi. "Dynamics of Laterality in Lake Tanganyika Scale-Eaters Driven by Cross-Predation". Symmetry 11, n.º 1 (20 de enero de 2019): 119. http://dx.doi.org/10.3390/sym11010119.
Texto completoLeone, M., V. Lucini, D. D'Amico, F. Moschiano, C. Maltempo, F. Fraschini y G. Bussone. "Twenty-Four-Hour Melatonin and Cortisol Plasma Levels in Relation to Timing of Cluster Headache". Cephalalgia 15, n.º 3 (junio de 1995): 224–29. http://dx.doi.org/10.1046/j.1468-2982.1995.015003224.x.
Texto completoRégnière, Jacques, M. Lukas Seehausen y Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 1: Tranosema rostrale (Hymenoptera: Ichneumonidae)". Forests 11, n.º 8 (5 de agosto de 2020): 846. http://dx.doi.org/10.3390/f11080846.
Texto completoLiu, Yufeng, Jianguo Kong, Xiuping Wang y Gongbing Shan. "Biomechanical analysis of Yang’s spear turning-stab technique in Chinese martial arts". Physical Activity Review 8, n.º 2 (2020): 16–22. http://dx.doi.org/10.16926/par.2020.08.17.
Texto completoQu, Zhengwei, Xinran Zhang, Yuchen Gao, Chao Peng, Yunjing Wang y Popov Maxim Georgievitch. "Detection of False Data Injection Attack in AGC System Based on Random Forest". Machines 11, n.º 1 (9 de enero de 2023): 83. http://dx.doi.org/10.3390/machines11010083.
Texto completoRégnière, Jacques, Rémi Saint-Amant, Jean-Claude Thireau, Pierre Therrien, Christian Hébert y Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 2: Meteorus trachynotus (Hymenoptera: Braconidae)". Forests 12, n.º 2 (28 de enero de 2021): 155. http://dx.doi.org/10.3390/f12020155.
Texto completoMironov, N. Yu, V. V. Vlodzyanovskiy, Yu A. Yuricheva, S. F. Sokolov, S. P. Golitsyn, L. V. Rosenstraukh y E. I. Chazov. "Safety and Effectiveness of Electrical and Pharmacological Cardioversion in Persistent Atrial Fibrillation. Part 2: Assessment of Safety". Rational Pharmacotherapy in Cardiology 14, n.º 6 (5 de enero de 2019): 826–30. http://dx.doi.org/10.20996/1819-6446-2018-14-6-826-830.
Texto completoBarenghi, Alessandro, Gioele Falcetti y Gerardo Pelosi. "Locating Side Channel Leakage in Time through Matched Filters". Cryptography 6, n.º 2 (30 de mayo de 2022): 26. http://dx.doi.org/10.3390/cryptography6020026.
Texto completoAlfraih Abdulaziz Nasser, A. y Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation". Applied Mechanics and Materials 644-650 (septiembre de 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.
Texto completoFujimura, T., Y. Takahagi, H. Nagashima, S. Miyagawa, T. Shigehisa y H. Murakami. "33 PRODUCTION OF TRANSGENIC-CLONED PIGS CARRYING HDAF, GnT-III AND HETEROZYGOUSLY DISRUPTED ±-1,3-GALACTOSYLTRANSFERASE GENES". Reproduction, Fertility and Development 17, n.º 2 (2005): 166. http://dx.doi.org/10.1071/rdv17n2ab33.
Texto completoQuadir, Md Abdul, J. Christy Jackson, J. Prassanna, K. Sathyarajasekaran, K. Kumar, H. Sabireen, Shivam Ubarhande y V. Vijaya Kumar. "An efficient algorithm to detect DDoS amplification attacks". Journal of Intelligent & Fuzzy Systems 39, n.º 6 (4 de diciembre de 2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.
Texto completoHe, Xing y Michael S. Scordilis. "Efficiently Synchronized Spread-Spectrum Audio Watermarking with Improved Psychoacoustic Model". Research Letters in Signal Processing 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/251868.
Texto completoYeniçeri, Ramazan, Selçuk Kilinç y Müştak E. Yalçin. "Attack on a Chaos-Based Random Number Generator Using Anticipating Synchronization". International Journal of Bifurcation and Chaos 25, n.º 02 (febrero de 2015): 1550021. http://dx.doi.org/10.1142/s0218127415500212.
Texto completoKlymiuk, N., A. Baehr, B. Kessler, M. Kurome, A. Wuensch, N. Herbach, R. Wanke, H. Nagashima y E. Wolf. "425 HIGH-LEVEL EXPRESSION OF LEA29Y IN PANCREATIC ISLETS OF TRANSGENIC PIGS". Reproduction, Fertility and Development 22, n.º 1 (2010): 370. http://dx.doi.org/10.1071/rdv22n1ab425.
Texto completoGupta, Tanvi, Sumit Kumar, Ankit Tomar y KamalKant Verma. "DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks". International Journal of Security and Its Applications 10, n.º 8 (31 de agosto de 2016): 395–406. http://dx.doi.org/10.14257/ijsia.2016.10.8.35.
Texto completoPan, Shengyi, Thomas Morris y Uttam Adhikari. "Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data". IEEE Transactions on Industrial Informatics 11, n.º 3 (junio de 2015): 650–62. http://dx.doi.org/10.1109/tii.2015.2420951.
Texto completoKumar, Gulshan, Rahul Saha, Mandeep Singh y Mritunjay Kumar Rai. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN". International Journal of Information Security and Privacy 12, n.º 1 (enero de 2018): 53–62. http://dx.doi.org/10.4018/ijisp.2018010105.
Texto completoGupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg y Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids". Energies 14, n.º 16 (12 de agosto de 2021): 4941. http://dx.doi.org/10.3390/en14164941.
Texto completoSOLAK, ERCAN. "CRYPTANALYSIS OF OBSERVER BASED DISCRETE-TIME CHAOTIC ENCRYPTION SCHEMES". International Journal of Bifurcation and Chaos 15, n.º 02 (febrero de 2005): 653–58. http://dx.doi.org/10.1142/s0218127405012260.
Texto completoZhu, Baoshan, Jun Lei y Shuliang Cao. "Numerical Simulation of Vortex Shedding and Lock-in Characteristics for a Thin Cambered Blade". Journal of Fluids Engineering 129, n.º 10 (28 de abril de 2007): 1297–305. http://dx.doi.org/10.1115/1.2776964.
Texto completoLegett, Henry D., Ikkyu Aihara y X. E. Bernal. "The dual benefits of synchronized mating signals in a Japanese treefrog: attracting mates and manipulating predators". Philosophical Transactions of the Royal Society B: Biological Sciences 376, n.º 1835 (23 de agosto de 2021): 20200340. http://dx.doi.org/10.1098/rstb.2020.0340.
Texto completoYoussef, El-Nasser S., Fabrice Labeau y Marthe Kassouf. "Detection of Load-Altering Cyberattacks Targeting Peak Shaving Using Residential Electric Water Heaters". Energies 15, n.º 20 (21 de octubre de 2022): 7807. http://dx.doi.org/10.3390/en15207807.
Texto completoSang, D.-K. y M.-J. Tahk. "Guidance law switching logic considering the seeker's field-of-view limits". Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering 223, n.º 8 (1 de agosto de 2009): 1049–58. http://dx.doi.org/10.1243/09544100jaero614.
Texto completoRadziukevich, M. L. "A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks". «System analysis and applied information science», n.º 3 (4 de octubre de 2021): 51–58. http://dx.doi.org/10.21122/2309-4923-2021-3-51-58.
Texto completoGopinath, S., A. Pillai, A. G. Diwan, J. V. Pattisapu y K. Radhakrishnan. "Reiterating the role of corpus callosum in generalization of interictal and ictal epileptiform discharges: a case report with post-callosotomy intracranial electroencephalography in Lennox–Gastaut syndrome". Epilepsy and paroxysmal conditions 13, n.º 3 (29 de octubre de 2021): 249–53. http://dx.doi.org/10.17749/2077-8333/epi.par.con.2021.086.
Texto completo