Gotowa bibliografia na temat „SILENT ATTACK”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SILENT ATTACK”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "SILENT ATTACK"
Sushma, Vasamsetti Ramya Sri, K. Nikhil, K. Ashish Reddy i L. Sunitha. "Diagnosis of Cardiovascular Disease using Deep Learning". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 371–78. http://dx.doi.org/10.22214/ijraset.2023.49209.
Pełny tekst źródłaSharma, Bhuvan, i Spinder Kaur. "Analysis and Solutions of Silent Heart Attack Using Python". International Journal of Computer Sciences and Engineering 10, nr 1 (31.01.2022): 37–40. http://dx.doi.org/10.26438/ijcse/v10i1.3740.
Pełny tekst źródłaAnastasilakis, Dimitrios A., Polyzois Makras, Stergios A. Polyzos i Athanasios D. Anastasilakis. "Asymptomatic and normocalcemic hyperparathyroidism, the silent attack: a combo-endocrinology overview". Hormones 18, nr 1 (25.09.2018): 65–70. http://dx.doi.org/10.1007/s42000-018-0069-6.
Pełny tekst źródłaTeitelbaum, Michael, Rafail A. Kotronias, Luciano A. Sposato i Rodrigo Bagur. "Cerebral Embolic Protection in TAVI: Friend or Foe". Interventional Cardiology Review 14, nr 1 (25.02.2019): 22–25. http://dx.doi.org/10.15420/icr.2018.32.2.
Pełny tekst źródłaMykland, Martin Syvertsen, Martin Uglem, Lars Jacob Stovner, Eiliv Brenner, Mari Storli Snoen, Gøril Bruvik Gravdahl, Trond Sand i Petter Moe Omland. "Insufficient sleep may alter cortical excitability near the migraine attack: A blinded TMS crossover study". Cephalalgia 43, nr 3 (14.02.2023): 033310242211483. http://dx.doi.org/10.1177/03331024221148391.
Pełny tekst źródłaLi, Ying, Nan Liu, Yonghua Huang, Wei Wei, Fei Chen i Weiwei Zhang. "Risk Factors for Silent Lacunar Infarction in Patients with Transient Ischemic Attack". Medical Science Monitor 22 (11.02.2016): 447–53. http://dx.doi.org/10.12659/msm.895759.
Pełny tekst źródłaYang, Tiancheng, Ankit Mittal, Yunsi Fei i Aatmesh Shrivastava. "Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities". IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, nr 1 (styczeń 2021): 124–35. http://dx.doi.org/10.1109/tvlsi.2020.3034878.
Pełny tekst źródłaDemirel, Esra Aciman, Ufuk Emre, Aysun Ünal, Banu Özen, H. Tuğrul Atasoy i Fürüzan Öztürk. "Evaluation of silent cerebral lesions in patients with first ischemic stroke attack". Neurology, Psychiatry and Brain Research 18, nr 1 (styczeń 2012): 22–26. http://dx.doi.org/10.1016/j.npbr.2011.12.001.
Pełny tekst źródłaHoward, George, Gregory W. Evans i James F. Toole. "Silent cerebral infarctions in transient ischemic attack populations: Implications of advancing technology". Journal of Stroke and Cerebrovascular Diseases 4 (styczeń 1994): S47—S50. http://dx.doi.org/10.1016/s1052-3057(10)80257-5.
Pełny tekst źródłaJati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries". Simulacra 4, nr 2 (18.11.2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.
Pełny tekst źródłaRozprawy doktorskie na temat "SILENT ATTACK"
Paris, Antoine. "Synthèses de dérivés silylés en séries pyridinique et diazinique. Application de la réaction d'ipso-désilylation à l'élaboration de polyhétérocycles". Rouen, 1997. http://www.theses.fr/1997ROUES053.
Pełny tekst źródłaCHEN, TING-WEI, i 陳庭葦. "Silent attack-Discussion on the Behavior of Network Bullying". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c4yuw8.
Pełny tekst źródła正修科技大學
資訊管理研究所
105
The Internet is far away, a plain little things, one on the Internet, through the masses of the masses of mutual transmission, and even public trial, often resulting in the event of the second person in the event of injury. However, most of the message will be sent out of the message, holding the curiosity and play the majority of the mentality, do not think this behavior is wrong? I do not know the network to help spread or fun based on fun and free to share Audio and video, most likely have violated the law but no knowledge. Therefore, this study is aimed at the well-known community, relying on the power of the Internet and was even the attention of the event, and with interviews with well-known secondary school tutors and the use of questionnaires to the three information derived from the integration The following points: 1. On the Internet to share and spread indecent or false audio and video, most people are holding a fun and curious, rather than absolute malicious. 2. In the questionnaire survey, that part of the people who share the forwarding does not know this behavior may have violated the law, and know their own behavior is wrong, but often holding a lucky mind. 3. According to the survey in this study, even if most people are aware of the Internet to send and distribute some indecent or false audio and video text is a violation of the law, but still can not help but "we are doing, I will not be so untrue. " 4. Finally, this study argues that, although not in the chaos with the heavy code, but for the behavior of the rules and deeds on the Internet, it is necessary and clear, can not be vague, because often distributed anonymous network of others, are holding a lucky mind And make an act.
MUKOKO, FUNGAYI DONEWELL. "USING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKS". Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380.
Pełny tekst źródłaKsiążki na temat "SILENT ATTACK"
Verma, Virendra. Fall of Dera Baba Nanak Bridge: A silent night attack. Dehradun, U.P: Youth Education Publications, 1989.
Znajdź pełny tekst źródłaCalvert, James F. Silent running: My years on a World War II attack submarine. New York: J. Wiley, 1995.
Znajdź pełny tekst źródłaP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, N.J: John Wiley, 2005.
Znajdź pełny tekst źródłaP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, NJ: John Wiley, 2004.
Znajdź pełny tekst źródłaKristen, Strom Terry, i Fox Barry, red. Syndrome X: Overcoming the silent killer that can give you a heart attack. New York: Simon and Schuster, 2000.
Znajdź pełny tekst źródłaMiller, Vickie Gail. Doris Miller: A silent medal of honor. Austin, Tex: Eakin Press, 1997.
Znajdź pełny tekst źródłaReader's Digest (Australia) Pty. Ltd., red. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1990.
Znajdź pełny tekst źródłaPty, Reader's Digest Services, red. Sharks: Silent hunters of the deep. Sydney [Australia]: Reader's Digest, 1987.
Znajdź pełny tekst źródłaPty, Reader's Digest Services, red. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1986.
Znajdź pełny tekst źródłaSilent siege-II: Japanese attacks on North America in World War II. Wyd. 2. Medford, Or: Webb Research Group, 1988.
Znajdź pełny tekst źródłaCzęści książek na temat "SILENT ATTACK"
Mukoko, Fungayi Donewell, Aman Jatain i Yojna Arora. "Cloud Silent Attack Strategies Analysis Alongside Proposed Generic Modelling". W Advances in Intelligent Systems and Computing, 491–501. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3590-9_38.
Pełny tekst źródłaMajumder, Sharmistha, Mrinal Kanti Deb Barma, Ashim Saha i A. B. Roy. "Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning". W Studies in Computational Intelligence, 145–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97113-7_9.
Pełny tekst źródła"The Revolution in Heart Attack Treatment". W Fighting the Silent Killer, 147–57. A K Peters/CRC Press, 1993. http://dx.doi.org/10.1201/9781439864753-16.
Pełny tekst źródłaBell, Derrick. "The School Desegregation Era". W Silent Covenants. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195172720.003.0014.
Pełny tekst źródłaJoseph, Theyamma, i Jacquline C. Vadasseril. "Diabetes a Silent Killer: A Threat for Cardiorespiratory Fitness". W Cardiorespiratory Fitness - New Topics [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.108164.
Pełny tekst źródłaAdams, Andrea C. "Cerebrovascular Disease". W Mayo Clinic Essential Neurology, 352–92. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190206895.003.0011.
Pełny tekst źródłaDelgado, James P. "Controversy and Inquiry". W The Curse of the Somers, 115—C6.F2. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197575222.003.0007.
Pełny tekst źródłaInouye, Melissa Wei-Tsing. "The Handwritten Hymnbook (1958–1974)". W China and the True Jesus, 212–34. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190923464.003.0008.
Pełny tekst źródłavan Schaik, Carel P., i John Terborgh. "The Silent Crisis: The State of Rain Forest Nature Preserves". W Last Stand. Oxford University Press, 1997. http://dx.doi.org/10.1093/oso/9780195095548.003.0008.
Pełny tekst źródłaYanık, Lerna K., i Fulya Hisarlıoğlu. "‘They wrote history with their bodies’: Necrogeopolitics, Necropolitical Spaces and the Everyday Spatial Politics of Death in Turkey". W Turkey's Necropolitical Laboratory, 46–70. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474450263.003.0003.
Pełny tekst źródłaStreszczenia konferencji na temat "SILENT ATTACK"
Grande, C. E. Lopez, i R. S. Guadron. "Social engineering: The silent attack". W 2015 IEEE Thirty-Fifth Central American and Panama Convention (CONCAPAN XXXV). IEEE, 2015. http://dx.doi.org/10.1109/concapan.2015.7428452.
Pełny tekst źródłaCroft, Neil. "On forensics: A silent SMS attack". W 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320454.
Pełny tekst źródłaKoch, Robert, i Mario Golling. "Silent Battles: Towards Unmasking Hidden Cyber Attack". W 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8757146.
Pełny tekst źródłaChen, Ting, Haiyang Tang, Xiaodong Lin, Kuang Zhou i Xiaosong Zhang. "Silent Battery Draining Attack against Android Systems by Subverting Doze Mode". W GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842268.
Pełny tekst źródłaGreitzer, Edward M. "Some Aerodynamic Problems of Aircraft Engines: Fifty Years After". W ASME Turbo Expo 2007: Power for Land, Sea, and Air. ASMEDC, 2007. http://dx.doi.org/10.1115/gt2007-28364.
Pełny tekst źródłaCerkovnik, Mark, i Wasy Akhtar. "Inclusion of Crack Face Pressure in Reference Stress for Thick Walled Risers and Flowlines". W ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-11021.
Pełny tekst źródłaMukoko, Fungayi Donewell, i Vikas Thada. "A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks". W 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2018. http://dx.doi.org/10.1109/ic3i44769.2018.9007279.
Pełny tekst źródłaHajipour, Mohammad, Mohammad Ali Akhaee i Ramin Toosi. "Listening to Sounds of Silence for Audio replay attack detection". W 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS). IEEE, 2021. http://dx.doi.org/10.1109/icspis54653.2021.9729353.
Pełny tekst źródłaPayre, William, Jaume Perellomarch, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, Siraj Shaikh, Hoang Nguyen i Stewart Birrell. "Understanding drivers' trust after software malfunctions and cyber intrusions of digital displays in an automated car". W 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002463.
Pełny tekst źródłaKhalil Bhuiyan, Md Ebrahim, Dustin Smith, Eric J. Voss, Chin-Chuan Wei i Mohammad Shavezipur. "Surface Functionalization of Silicon MEMS Biochemical Sensors for the Detection of Foodborne Pathogens". W ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-69708.
Pełny tekst źródłaRaporty organizacyjne na temat "SILENT ATTACK"
Mizrach, Amos, Michal Mazor, Amots Hetzroni, Joseph Grinshpun, Richard Mankin, Dennis Shuman, Nancy Epsky i Robert Heath. Male Song as a Tool for Trapping Female Medflies. United States Department of Agriculture, grudzień 2002. http://dx.doi.org/10.32747/2002.7586535.bard.
Pełny tekst źródła