Gotowa bibliografia na temat „Defensive”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Defensive”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Defensive"
Pinto, Fábio de Assis, Paula Netto, Kleber de Sousa Pereira i Terezinha Maria Castro Della Lucia. "Repertoire of Defensive Behavior in Africanized Honey Bees (Hymenoptera – Apidae): Variations in Defensive Standard and Influence of Visual Stimuli". EntomoBrasilis 9, nr 1 (29.04.2016): 06–09. http://dx.doi.org/10.12741/ebrasilis.v9i1.456.
Pełny tekst źródłaShea-Atallah, Ruthmarie. "A Defense of Defensive Medicine". Ethics & Medics 39, nr 6 (2014): 1–2. http://dx.doi.org/10.5840/em201439611.
Pełny tekst źródłaThomas, Sandra P. "In Defense of Defensive Pessimism". Issues in Mental Health Nursing 32, nr 1 (styczeń 2011): 1. http://dx.doi.org/10.3109/01612840.2011.535350.
Pełny tekst źródłaSarig, Oded H., i Eli Talmor. "In defense of defensive measures". Journal of Corporate Finance 3, nr 3 (czerwiec 1997): 277–97. http://dx.doi.org/10.1016/s0929-1199(96)00016-8.
Pełny tekst źródłaGallo, Richard L. "Defensive Defensins: A Response to the Commentary “In Defense of Skin”". Journal of Investigative Dermatology 125, nr 1 (lipiec 2005): x—xi. http://dx.doi.org/10.1111/j.0022-202x.2005.23770.x.
Pełny tekst źródłaBajgorić, Sanja, i Muris Đug. "DIFFERENCES OF SITUATIONAL AND MOTOR ABILITIES IN DEFENSE AT THE WORLD JUNIOR HANDBALL CHAMPIONSHIP". Sport Scientific And Practical Aspects: International Scientific Journal of Kinesiology 18, nr 2 (2021): 71–74. http://dx.doi.org/10.51558/1840-4561.2021.18.2.71.
Pełny tekst źródłaNasiri, Mansour, Reza Donyavi i Yarali Dousti. "The Mediating Role of Defensive Mechanisms in the Relationship between Social Phobia and Alexithymia in University Students". Journal of Holistic Nursing And Midwifery 30, nr 4 (1.07.2020): 247–54. http://dx.doi.org/10.32598/jhnm.30.4.2041.
Pełny tekst źródłaAzmi, Farha, Munawwar Husain, Suman Vashist i Jawed A. Usmani. "In Defense of Defensive Nursing Practice". International Journal of Nursing Care 2, nr 2 (2014): 11. http://dx.doi.org/10.5958/2320-8651.2014.01262.9.
Pełny tekst źródłaHusain, Munawwar, Arshad Anjum, Amir Usmani, Jawed A. Usmani i Mubarak Alshariam. "In defense of defensive forensic medicine". Journal of Forensic and Legal Medicine 20, nr 6 (sierpień 2013): 621. http://dx.doi.org/10.1016/j.jflm.2013.03.032.
Pełny tekst źródłaSantos, Fernando Jorge Lourenço dos, Bernardo Brito, Bruna Rodrigues, Bruno Ferreira, C´átia Pereira, Cátia Ferreira, Teresa Figueiredo i Mário Espada. "Análise observacional das ações dos guarda-redes de futebol jovem". Cuadernos de Psicología del Deporte 21, nr 3 (23.09.2021): 32–47. http://dx.doi.org/10.6018/cpd.468651.
Pełny tekst źródłaRozprawy doktorskie na temat "Defensive"
Hellström, Per, i Victor Jaccopucci. "Defensive Yahtzee". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168668.
Pełny tekst źródłaGame, Carlos Vallejo. "Defensive minefield planning". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26960.
Pełny tekst źródłaEsparza, Jana Scoville. "Validating the Rorschach Defense Scale by Examining Defensive Functioning in College Students". Thesis, North Texas State University, 1988. https://digital.library.unt.edu/ark:/67531/metadc501158/.
Pełny tekst źródłaBerggren, Jennie, i Carina Engström. "Defensive Tactics : In hostile takeovers". Thesis, Jönköping University, JIBS, Business Administration, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-469.
Pełny tekst źródłaDale, Andrew James Roger. "Defensive behaviours toward knowledge sharing". Thesis, University of Warwick, 1999. http://wrap.warwick.ac.uk/4491/.
Pełny tekst źródłaAtkinson, Cathie. "Defensive Coping, Stress, and Immunity /". The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487861396027367.
Pełny tekst źródłaSmith, Anna Magdalena. "Food choices of tactile defensive children". Thesis, University of Port Elizabeth, 2003. http://hdl.handle.net/10948/d1020371.
Pełny tekst źródłaChen, Hao. "Toward hardware-oriented defensive network infrastructure". Thesis, State University of New York at Binghamton, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3713553.
Pełny tekst źródłaThe prosperity of the Internet has made it attractive to hackers and malicious attackers. Distributed attacks, such as: DDoS attacks and Internet worms have become major threats towards the network infrastructure. Collaborating existent single-point-deployed security applications over multi-domains for distributed defense is promising. Taking advantage of the small-world network model, a three-layered network modeling platform was developed for exploring behaviors of collaborative defense under the scope of a complex system. Using this platform, a comparison study between two major collaborative defense schemes was conducted. Their performance and eectiveness against signature-embedded worm attacks were evaluated accordingly.
Given the rapid evolution of attack methods and toolkits, software-based solutions to secure the network infrastructure have become overburdened. The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution to close this performance gap is through hardware implementation of security functions. After a comprehensive survey on major recongurable hardware-based approaches application on network infrastructure security area, an optimized design of FPGA-based Power Spectral Density (PSD) data converter for online Shrew DDoS attack detection was proposed and prototyped. Combining an innovative component-reusable Auto-Correlation (AC) algorithm and the adapted 2N-point real-valued Discrete Fourier Transform (DFT) algorithm, a maximum reduction of 61.8% processing time from 27471.4 us to 10504.8 us was achieved. These ecient hardware realization enabled the implementation of this design to a Xilinx Virtex2 Pro FGPA.
The scalability issue against continuously expanding signature databases is another major impediment aecting hardware application for network intrusion detection. With the observation that signature patterns are constructed from combinations of a limited number of primary patterns, a two-stage decomposition approach was developed to solve this issue. The evaluation results show that a reduction in size of over 77% can be achieved on top of signature patterns extracted from the Snort rule database after decomposition.
Hendershott, Robert J. "Defensive leveraged recapitalizations : theory and evidence". The Ohio State University, 1993. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267618346.
Pełny tekst źródłaHendershott, Robert J. "Defensive leveraged recapitatilizations : theory and evidence /". Connect to resource, 1993. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1267618346.
Pełny tekst źródłaKsiążki na temat "Defensive"
Defensive baseball. Indianapolis, IN: Masters Press, 1996.
Znajdź pełny tekst źródłaBlack, Lisa. Defensive wounds. New York, NY: William Morrow, 2011.
Znajdź pełny tekst źródłaHistory, Center of Military, red. China defensive. Washington, D.C: U.S. Army Center of Military History, 1996.
Znajdź pełny tekst źródłaSherry, Mark D. China defensive. [Washington, D.C.?: U.S. Army Center of Military History, 1996.
Znajdź pełny tekst źródłaLanders, Andy. Defensive drills. Ames, Iowa: Championship Books, 1988.
Znajdź pełny tekst źródłaSwerrie, D. A. Defensive elevatoring. Mobile, Ala: Elevator World, Inc., 1993.
Znajdź pełny tekst źródłaRequejo, Ferran, i Marc Sanjaume-Calvet. Defensive Federalism. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003296065.
Pełny tekst źródłaPangerl, Stefanie. Defensive Publishing. Wiesbaden: Gabler, 2009. http://dx.doi.org/10.1007/978-3-8349-8360-2.
Pełny tekst źródłaVoinea, Liviu. Defensive Expectations. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55045-5.
Pełny tekst źródłaGuest, Barbara. Defensive rapture. Los Angeles: Sun & Moon Press, 1993.
Znajdź pełny tekst źródłaCzęści książek na temat "Defensive"
Requejo, Ferran, i Marc Sanjaume-Calvet. "Defensive Federalism". W Defensive Federalism, 1–21. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003296065-1.
Pełny tekst źródłaRowe, Neil C., i Julian Rrushi. "Defensive Camouflage". W Introduction to Cyberdeception, 97–104. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41187-3_8.
Pełny tekst źródłaWang, Wallace. "Defensive Programming". W Swift OS X Programming for Absolute Beginners, 471–86. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1233-2_21.
Pełny tekst źródłaThomas, Sandra P. "Defensive Pessimism". W Encyclopedia of Personality and Individual Differences, 1036–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-24612-3_1061.
Pełny tekst źródłaSimola, Nicola, Micaela Morelli, Tooru Mizuno, Suzanne H. Mitchell, Harriet de Wit, H. Valerie Curran, Celia J. A. Morgan i in. "Defensive Responses". W Encyclopedia of Psychopharmacology, 371. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-68706-1_4180.
Pełny tekst źródłaUpchurch Sweeney, C. Renn, J. Rick Turner, J. Rick Turner, Chad Barrett, Ana Victoria Soto, William Whang, Carolyn Korbel i in. "Defensive Coping". W Encyclopedia of Behavioral Medicine, 544. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4419-1005-9_100440.
Pełny tekst źródłaUpchurch Sweeney, C. Renn, J. Rick Turner, J. Rick Turner, Chad Barrett, Ana Victoria Soto, William Whang, Carolyn Korbel i in. "Defensive Denial". W Encyclopedia of Behavioral Medicine, 544. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4419-1005-9_100441.
Pełny tekst źródłaStueben, Michael. "Defensive Programming". W Good Habits for Great Coding, 123–26. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3459-4_11.
Pełny tekst źródłaVan Dieren, Wouter. "Defensive Expenditures". W Taking Nature Into Account, 175–86. New York, NY: Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4612-4246-8_12.
Pełny tekst źródłaBhargavan, Karthikeyan, Antoine Delignat-Lavaud i Sergio Maffeis. "Defensive JavaScript". W Foundations of Security Analysis and Design VII, 88–123. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10082-1_4.
Pełny tekst źródłaStreszczenia konferencji na temat "Defensive"
Oulmas, Mohand, Amina Abdessemed-Fouda i Ángel Benigno González Avilés. "Évaluation de degré de défense de l’architecture défensive pré-coloniale en Algérie : cas des villages fortifiés". W FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11376.
Pełny tekst źródłaTripathi, Achyut Mani, Swarup Ranjan Behera i Konark Paul. "Defensive Bit Planes: Defense Against Adversarial Attacks". W 2022 International Joint Conference on Neural Networks (IJCNN). IEEE, 2022. http://dx.doi.org/10.1109/ijcnn55064.2022.9891957.
Pełny tekst źródłaKeeter, Edward. "Defensive Contracting". W Construction Congress VI. Reston, VA: American Society of Civil Engineers, 2000. http://dx.doi.org/10.1061/40475(278)119.
Pełny tekst źródłaMatovu, Richard, Abdul Serwadda, Argenis V. Bilbao i Isaac Griswold-Steiner. "Defensive Charging". W CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3374664.3375732.
Pełny tekst źródłaQie, Xiaohu, Ruoming Pang i Larry Peterson. "Defensive programming". W the 5th symposium. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/1060289.1060295.
Pełny tekst źródłaMCDANIEL, MICHAEL. "Airship defensive weapons". W 9th Lighter-Than-Air Systems Technology Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1991. http://dx.doi.org/10.2514/6.1991-1266.
Pełny tekst źródłaSchiavoni, Valerio, i Vivien Quéma. "A posteriori defensive programming". W the 2006 ACM symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141688.
Pełny tekst źródłaNocco, Sebastiana. "Il sistema difensivo costiero della Sardegna meridionale nella cartografia dei secoli XVI-XVII". W FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11379.
Pełny tekst źródłaVillada Paredes, Fernando. "De cerca medieval islámica a frente abaluartado: génesis y evolución del Frente de Tierra de Ceuta". W FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11403.
Pełny tekst źródłaBaizan, R. M., Ghassan Raei i Azzam Abcorabbo. "A Field Defensive Driving School". W SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1994. http://dx.doi.org/10.2118/27230-ms.
Pełny tekst źródłaRaporty organizacyjne na temat "Defensive"
Vinje, Pistein. Defensive Defense in Finland - Will It Work? Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1994. http://dx.doi.org/10.21236/ada280620.
Pełny tekst źródłaNovy-Marx, Robert. Understanding Defensive Equity. Cambridge, MA: National Bureau of Economic Research, październik 2014. http://dx.doi.org/10.3386/w20591.
Pełny tekst źródłaFrench, Geoffrey S. Rethinking Defensive Information Warfare. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2004. http://dx.doi.org/10.21236/ada465836.
Pełny tekst źródłaPorter, Scott. Integrated Defensive Electronic Countermeasures (IDECM). Fort Belvoir, VA: Defense Technical Information Center, grudzień 2013. http://dx.doi.org/10.21236/ada613376.
Pełny tekst źródłaCave, William C., i Robert E. Wassmer. Defensive Information Operations Planning Tool. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2000. http://dx.doi.org/10.21236/ada372867.
Pełny tekst źródłaKessler, Daniel, i Mark McClellan. Do Doctors Practice Defensive Medicine? Cambridge, MA: National Bureau of Economic Research, luty 1996. http://dx.doi.org/10.3386/w5466.
Pełny tekst źródłaSchutze, James T. Defensive Information Operations - An Interagency Process. Fort Belvoir, VA: Defense Technical Information Center, marzec 2001. http://dx.doi.org/10.21236/ada393992.
Pełny tekst źródłaFrakes, Michael, i Jonathan Gruber. Defensive Medicine: Evidence from Military Immunity. Cambridge, MA: National Bureau of Economic Research, lipiec 2018. http://dx.doi.org/10.3386/w24846.
Pełny tekst źródłaFlater, David. Defensive Code's Impact on Software Performance. National Institute of Standards and Technology, styczeń 2015. http://dx.doi.org/10.6028/nist.tn.1860.
Pełny tekst źródłaWilson, Terry B. Soviet Defense against Operation BARBAROSSA: A Possible Model for Future Soviet Defensive Doctrine,. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1991. http://dx.doi.org/10.21236/ada240341.
Pełny tekst źródła