Artykuły w czasopismach na temat „Higher-order attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Higher-order attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
DONG, Le, Wen-Ling WU, Shuang WU i Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack". Chinese Journal of Computers 35, nr 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
Pełny tekst źródłaTSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA i Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, nr 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Pełny tekst źródłaSugio, Nobuyuki, Naoki Shibayama i Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM". Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Pełny tekst źródłaYao, Jian Bo, i Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack". Advanced Engineering Forum 6-7 (wrzesień 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
Pełny tekst źródłaSUGIO, N., H. AONO, S. HONGO i T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, nr 1 (1.01.2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Pełny tekst źródłaCayrol, Claudette, i Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports". International Journal on Artificial Intelligence Tools 29, nr 03n04 (czerwiec 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Pełny tekst źródłaZhao, Pu, Pin-yu Chen, Siyue Wang i Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent". Proceedings of the AAAI Conference on Artificial Intelligence 34, nr 04 (3.04.2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Pełny tekst źródłaChancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone". Arithmetic Teacher 38, nr 6 (luty 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Pełny tekst źródłaKaedi, S., M. Doostari i M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA". Journal of Circuits, Systems and Computers 27, nr 12 (22.06.2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Pełny tekst źródłaNarote, Prof Amit, Vamika Zutshi, Aditi Potdar i Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms". International Journal for Research in Applied Science and Engineering Technology 10, nr 3 (31.03.2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Pełny tekst źródłaRamachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith i H. S. Mohan. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture". Journal of Electrical and Computer Engineering 2023 (28.09.2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Pełny tekst źródłaWei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein i Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers". Proceedings of the AAAI Conference on Artificial Intelligence 36, nr 3 (28.06.2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Pełny tekst źródłaThanh, Bui The, i Ngo Kien Trung. "Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System". Journal Européen des Systèmes Automatisés 55, nr 5 (30.11.2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Pełny tekst źródłaSălăgean, Ana, R. Winter, Matei Mandache-Sălăgean i Raphael C. W. Phan. "Higher order differentiation over finite fields with applications to generalising the cube attack". Designs, Codes and Cryptography 84, nr 3 (21.09.2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Pełny tekst źródłaPadmaja, K., i K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment". Webology 18, nr 2 (23.12.2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Pełny tekst źródłaYang, Zhifei, Wenmin Li, Fei Gao i Qiaoyan Wen. "FAPA: Transferable Adversarial Attacks Based on Foreground Attention". Security and Communication Networks 2022 (29.10.2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Pełny tekst źródłaLe, Duc, Minh Dao i Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN". Information and Control Systems, nr 3 (15.06.2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Pełny tekst źródłaFargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu i Ricardo Fuller. "Refractory Gout Attack". Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Pełny tekst źródłaLiu, Fengchun, Sen Zhang, Weining Ma i Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine". Mathematics 10, nr 15 (1.08.2022): 2713. http://dx.doi.org/10.3390/math10152713.
Pełny tekst źródłaYan, Ruoyu. "Combining Renyi Entropy and EWMA to Detect Common Attacks in Network". International Journal of Pattern Recognition and Artificial Intelligence 30, nr 10 (23.11.2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Pełny tekst źródłaBaigang, Mi, i Yu Jingyi. "An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack". International Journal of Aerospace Engineering 2021 (8.09.2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
Pełny tekst źródłaOMORI, ITSUKI. "A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential." Japanese Journal of Electrocardiology 10, nr 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Pełny tekst źródłaSárkány, Zoltán, Kinga Sárkány i A. Horváth. "Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics". Acta Medica Marisiensis 62, nr 1 (1.03.2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Pełny tekst źródłaSingh, Anurag, i Dr Subhadra Shaw. "Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Pełny tekst źródłaThaper, Rohit, i Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing". Journal of Cases on Information Technology 17, nr 3 (lipiec 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Pełny tekst źródłaUeno, Rei, Naofumi Homma, Akiko Inoue i Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Pełny tekst źródłaDong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu i André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, nr 6 (czerwiec 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Pełny tekst źródłaLu, Jiqiang, Yongzhuang Wei, Jongsung Kim i Enes Pasalic. "The higher-order meet-in-the-middle attack and its application to the Camellia block cipher". Theoretical Computer Science 527 (marzec 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Pełny tekst źródłaAl-Shabi, Mohammed. "Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV". International Journal of Communication Networks and Information Security (IJCNIS) 14, nr 2 (31.08.2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Pełny tekst źródłaYildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker i A. Tufan. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER". Annals of the Rheumatic Diseases 81, Suppl 1 (23.05.2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
Pełny tekst źródłaJIN, Xiaying, Yang LI i Quan PAN. "DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, nr 6 (grudzień 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Pełny tekst źródłaLombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley i K. N. E. Fitza. "Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain". Bulletin of Entomological Research 106, nr 5 (24.02.2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Pełny tekst źródłaLiu, Hongjuan, Zhiliang Zhu, Hai Yu i Qian Zhu. "Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Pełny tekst źródłaPeng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han i Wei Wang. "Targeting attack hypergraph networks". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, nr 7 (lipiec 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Pełny tekst źródłaYildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk i A. Tufan. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN". Annals of the Rheumatic Diseases 81, Suppl 1 (23.05.2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Pełny tekst źródłaLi, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang i Chengbin Jin. "The Notion of Transparency Order, Revisited". Computer Journal 63, nr 12 (3.07.2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Pełny tekst źródłaLi, Jiang, Xiaohui Liu i Chunjin Wei. "Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations". Applied Mathematics Letters 129 (lipiec 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Pełny tekst źródłaBranciard, C., N. Gisin, N. Lutkenhaus i V. Scarani. "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography". Quantum Information and Computation 7, nr 7 (wrzesień 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Pełny tekst źródłaDeng, Ya Juan, i Shao Rong Hu. "Topology Characteristic of Hub-and-Spoke Transportation Network". Applied Mechanics and Materials 361-363 (sierpień 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Pełny tekst źródłaAbreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi i Rafael Timóteo de Sousa Júnior. "Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique". Sensors 20, nr 20 (16.10.2020): 5845. http://dx.doi.org/10.3390/s20205845.
Pełny tekst źródłaZhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng i Zhaohua Li. "VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model". Mathematics 12, nr 9 (24.04.2024): 1286. http://dx.doi.org/10.3390/math12091286.
Pełny tekst źródłaLuo, Yuling, Dezheng Zhang i Junxiu Liu. "A Chaotic Block Cryptographic System Resistant to Power Analysis Attack". International Journal of Bifurcation and Chaos 29, nr 08 (lipiec 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Pełny tekst źródłaCarvallo, P., E. Carvallo, R. Rivas, L. Carvallo i M. Del Sol. "Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack". International Journal of Medical and Surgical Sciences 3, nr 1 (26.10.2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Pełny tekst źródłaYin, Ziwei, Kun Li i Hongjun Bi. "Trusted Multi-Domain DDoS Detection Based on Federated Learning". Sensors 22, nr 20 (12.10.2022): 7753. http://dx.doi.org/10.3390/s22207753.
Pełny tekst źródłaSagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee i Ishaani Priyadarshini. "A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment". Future Internet 14, nr 10 (19.10.2022): 301. http://dx.doi.org/10.3390/fi14100301.
Pełny tekst źródłaHadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad i Rohmah Pari. "Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test". Polymers 14, nr 19 (24.09.2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Pełny tekst źródłaKhare, Surbhi, i Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 3 (5.04.2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Pełny tekst źródłaMialhe, PJ. "Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP". Brazilian Journal of Biology 74, nr 3 (sierpień 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Pełny tekst źródłaDomingo, Luis R., Mar Ríos-Gutiérrez i Patricia Pérez. "Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory". Chemistry 4, nr 3 (26.07.2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Pełny tekst źródłaSalem, Ahmed, Xuening Liao, Yulong Shen i Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework". Wireless Communications and Mobile Computing 2018 (28.08.2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.
Pełny tekst źródła