Articoli di riviste sul tema "Higher-order attack"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Higher-order attack".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
DONG, Le, Wen-Ling WU, Shuang WU e Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack". Chinese Journal of Computers 35, n. 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
TSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA e Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n. 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Sugio, Nobuyuki, Naoki Shibayama e Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM". Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Yao, Jian Bo, e Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack". Advanced Engineering Forum 6-7 (settembre 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
SUGIO, N., H. AONO, S. HONGO e T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, n. 1 (1 gennaio 2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Cayrol, Claudette, e Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports". International Journal on Artificial Intelligence Tools 29, n. 03n04 (giugno 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Zhao, Pu, Pin-yu Chen, Siyue Wang e Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent". Proceedings of the AAAI Conference on Artificial Intelligence 34, n. 04 (3 aprile 2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Chancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone". Arithmetic Teacher 38, n. 6 (febbraio 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Kaedi, S., M. Doostari e M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA". Journal of Circuits, Systems and Computers 27, n. 12 (22 giugno 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Narote, Prof Amit, Vamika Zutshi, Aditi Potdar e Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms". International Journal for Research in Applied Science and Engineering Technology 10, n. 3 (31 marzo 2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Ramachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith e H. S. Mohan. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture". Journal of Electrical and Computer Engineering 2023 (28 settembre 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Wei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein e Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers". Proceedings of the AAAI Conference on Artificial Intelligence 36, n. 3 (28 giugno 2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Thanh, Bui The, e Ngo Kien Trung. "Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System". Journal Européen des Systèmes Automatisés 55, n. 5 (30 novembre 2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Sălăgean, Ana, R. Winter, Matei Mandache-Sălăgean e Raphael C. W. Phan. "Higher order differentiation over finite fields with applications to generalising the cube attack". Designs, Codes and Cryptography 84, n. 3 (21 settembre 2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Padmaja, K., e K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment". Webology 18, n. 2 (23 dicembre 2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Yang, Zhifei, Wenmin Li, Fei Gao e Qiaoyan Wen. "FAPA: Transferable Adversarial Attacks Based on Foreground Attention". Security and Communication Networks 2022 (29 ottobre 2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Le, Duc, Minh Dao e Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN". Information and Control Systems, n. 3 (15 giugno 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Fargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu e Ricardo Fuller. "Refractory Gout Attack". Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Liu, Fengchun, Sen Zhang, Weining Ma e Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine". Mathematics 10, n. 15 (1 agosto 2022): 2713. http://dx.doi.org/10.3390/math10152713.
Yan, Ruoyu. "Combining Renyi Entropy and EWMA to Detect Common Attacks in Network". International Journal of Pattern Recognition and Artificial Intelligence 30, n. 10 (23 novembre 2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Baigang, Mi, e Yu Jingyi. "An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack". International Journal of Aerospace Engineering 2021 (8 settembre 2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
OMORI, ITSUKI. "A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential." Japanese Journal of Electrocardiology 10, n. 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Sárkány, Zoltán, Kinga Sárkány e A. Horváth. "Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics". Acta Medica Marisiensis 62, n. 1 (1 marzo 2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Singh, Anurag, e Dr Subhadra Shaw. "Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System". International Journal for Research in Applied Science and Engineering Technology 11, n. 5 (31 maggio 2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Thaper, Rohit, e Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing". Journal of Cases on Information Technology 17, n. 3 (luglio 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Ueno, Rei, Naofumi Homma, Akiko Inoue e Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n. 1 (4 dicembre 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Dong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu e André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, n. 6 (giugno 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Lu, Jiqiang, Yongzhuang Wei, Jongsung Kim e Enes Pasalic. "The higher-order meet-in-the-middle attack and its application to the Camellia block cipher". Theoretical Computer Science 527 (marzo 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Al-Shabi, Mohammed. "Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV". International Journal of Communication Networks and Information Security (IJCNIS) 14, n. 2 (31 agosto 2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Yildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker e A. Tufan. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER". Annals of the Rheumatic Diseases 81, Suppl 1 (23 maggio 2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
JIN, Xiaying, Yang LI e Quan PAN. "DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, n. 6 (dicembre 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Lombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley e K. N. E. Fitza. "Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain". Bulletin of Entomological Research 106, n. 5 (24 febbraio 2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Liu, Hongjuan, Zhiliang Zhu, Hai Yu e Qian Zhu. "Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Peng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han e Wei Wang. "Targeting attack hypergraph networks". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, n. 7 (luglio 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Yildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk e A. Tufan. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN". Annals of the Rheumatic Diseases 81, Suppl 1 (23 maggio 2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Li, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang e Chengbin Jin. "The Notion of Transparency Order, Revisited". Computer Journal 63, n. 12 (3 luglio 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Li, Jiang, Xiaohui Liu e Chunjin Wei. "Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations". Applied Mathematics Letters 129 (luglio 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Branciard, C., N. Gisin, N. Lutkenhaus e V. Scarani. "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography". Quantum Information and Computation 7, n. 7 (settembre 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Deng, Ya Juan, e Shao Rong Hu. "Topology Characteristic of Hub-and-Spoke Transportation Network". Applied Mechanics and Materials 361-363 (agosto 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Abreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi e Rafael Timóteo de Sousa Júnior. "Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique". Sensors 20, n. 20 (16 ottobre 2020): 5845. http://dx.doi.org/10.3390/s20205845.
Zhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng e Zhaohua Li. "VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model". Mathematics 12, n. 9 (24 aprile 2024): 1286. http://dx.doi.org/10.3390/math12091286.
Luo, Yuling, Dezheng Zhang e Junxiu Liu. "A Chaotic Block Cryptographic System Resistant to Power Analysis Attack". International Journal of Bifurcation and Chaos 29, n. 08 (luglio 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Carvallo, P., E. Carvallo, R. Rivas, L. Carvallo e M. Del Sol. "Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack". International Journal of Medical and Surgical Sciences 3, n. 1 (26 ottobre 2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Yin, Ziwei, Kun Li e Hongjun Bi. "Trusted Multi-Domain DDoS Detection Based on Federated Learning". Sensors 22, n. 20 (12 ottobre 2022): 7753. http://dx.doi.org/10.3390/s22207753.
Sagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee e Ishaani Priyadarshini. "A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment". Future Internet 14, n. 10 (19 ottobre 2022): 301. http://dx.doi.org/10.3390/fi14100301.
Hadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad e Rohmah Pari. "Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test". Polymers 14, n. 19 (24 settembre 2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Khare, Surbhi, e Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 3 (5 aprile 2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Mialhe, PJ. "Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP". Brazilian Journal of Biology 74, n. 3 (agosto 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Domingo, Luis R., Mar Ríos-Gutiérrez e Patricia Pérez. "Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory". Chemistry 4, n. 3 (26 luglio 2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Salem, Ahmed, Xuening Liao, Yulong Shen e Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework". Wireless Communications and Mobile Computing 2018 (28 agosto 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.