Artigos de revistas sobre o tema "Higher-order attack"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Higher-order attack".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
DONG, Le, Wen-Ling WU, Shuang WU e Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack". Chinese Journal of Computers 35, n.º 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
Texto completo da fonteTSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA e Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n.º 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Texto completo da fonteSugio, Nobuyuki, Naoki Shibayama e Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM". Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Texto completo da fonteYao, Jian Bo, e Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack". Advanced Engineering Forum 6-7 (setembro de 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
Texto completo da fonteSUGIO, N., H. AONO, S. HONGO e T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, n.º 1 (1 de janeiro de 2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Texto completo da fonteCayrol, Claudette, e Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports". International Journal on Artificial Intelligence Tools 29, n.º 03n04 (junho de 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Texto completo da fonteZhao, Pu, Pin-yu Chen, Siyue Wang e Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 04 (3 de abril de 2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Texto completo da fonteChancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone". Arithmetic Teacher 38, n.º 6 (fevereiro de 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Texto completo da fonteKaedi, S., M. Doostari e M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA". Journal of Circuits, Systems and Computers 27, n.º 12 (22 de junho de 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Texto completo da fonteNarote, Prof Amit, Vamika Zutshi, Aditi Potdar e Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de março de 2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Texto completo da fonteRamachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith e H. S. Mohan. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture". Journal of Electrical and Computer Engineering 2023 (28 de setembro de 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Texto completo da fonteWei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein e Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 3 (28 de junho de 2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Texto completo da fonteThanh, Bui The, e Ngo Kien Trung. "Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System". Journal Européen des Systèmes Automatisés 55, n.º 5 (30 de novembro de 2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Texto completo da fonteSălăgean, Ana, R. Winter, Matei Mandache-Sălăgean e Raphael C. W. Phan. "Higher order differentiation over finite fields with applications to generalising the cube attack". Designs, Codes and Cryptography 84, n.º 3 (21 de setembro de 2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Texto completo da fontePadmaja, K., e K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment". Webology 18, n.º 2 (23 de dezembro de 2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Texto completo da fonteYang, Zhifei, Wenmin Li, Fei Gao e Qiaoyan Wen. "FAPA: Transferable Adversarial Attacks Based on Foreground Attention". Security and Communication Networks 2022 (29 de outubro de 2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Texto completo da fonteLe, Duc, Minh Dao e Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN". Information and Control Systems, n.º 3 (15 de junho de 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Texto completo da fonteFargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu e Ricardo Fuller. "Refractory Gout Attack". Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Texto completo da fonteLiu, Fengchun, Sen Zhang, Weining Ma e Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine". Mathematics 10, n.º 15 (1 de agosto de 2022): 2713. http://dx.doi.org/10.3390/math10152713.
Texto completo da fonteYan, Ruoyu. "Combining Renyi Entropy and EWMA to Detect Common Attacks in Network". International Journal of Pattern Recognition and Artificial Intelligence 30, n.º 10 (23 de novembro de 2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Texto completo da fonteBaigang, Mi, e Yu Jingyi. "An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack". International Journal of Aerospace Engineering 2021 (8 de setembro de 2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
Texto completo da fonteOMORI, ITSUKI. "A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential." Japanese Journal of Electrocardiology 10, n.º 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Texto completo da fonteSárkány, Zoltán, Kinga Sárkány e A. Horváth. "Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics". Acta Medica Marisiensis 62, n.º 1 (1 de março de 2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Texto completo da fonteSingh, Anurag, e Dr Subhadra Shaw. "Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Texto completo da fonteThaper, Rohit, e Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing". Journal of Cases on Information Technology 17, n.º 3 (julho de 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Texto completo da fonteUeno, Rei, Naofumi Homma, Akiko Inoue e Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de dezembro de 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Texto completo da fonteDong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu e André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, n.º 6 (junho de 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Texto completo da fonteLu, Jiqiang, Yongzhuang Wei, Jongsung Kim e Enes Pasalic. "The higher-order meet-in-the-middle attack and its application to the Camellia block cipher". Theoretical Computer Science 527 (março de 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Texto completo da fonteAl-Shabi, Mohammed. "Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV". International Journal of Communication Networks and Information Security (IJCNIS) 14, n.º 2 (31 de agosto de 2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Texto completo da fonteYildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker e A. Tufan. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER". Annals of the Rheumatic Diseases 81, Suppl 1 (23 de maio de 2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
Texto completo da fonteJIN, Xiaying, Yang LI e Quan PAN. "DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models". Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, n.º 6 (dezembro de 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Texto completo da fonteLombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley e K. N. E. Fitza. "Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain". Bulletin of Entomological Research 106, n.º 5 (24 de fevereiro de 2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Texto completo da fonteLiu, Hongjuan, Zhiliang Zhu, Hai Yu e Qian Zhu. "Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Texto completo da fontePeng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han e Wei Wang. "Targeting attack hypergraph networks". Chaos: An Interdisciplinary Journal of Nonlinear Science 32, n.º 7 (julho de 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Texto completo da fonteYildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk e A. Tufan. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN". Annals of the Rheumatic Diseases 81, Suppl 1 (23 de maio de 2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Texto completo da fonteLi, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang e Chengbin Jin. "The Notion of Transparency Order, Revisited". Computer Journal 63, n.º 12 (3 de julho de 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Texto completo da fonteLi, Jiang, Xiaohui Liu e Chunjin Wei. "Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations". Applied Mathematics Letters 129 (julho de 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Texto completo da fonteBranciard, C., N. Gisin, N. Lutkenhaus e V. Scarani. "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography". Quantum Information and Computation 7, n.º 7 (setembro de 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Texto completo da fonteDeng, Ya Juan, e Shao Rong Hu. "Topology Characteristic of Hub-and-Spoke Transportation Network". Applied Mechanics and Materials 361-363 (agosto de 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Texto completo da fonteAbreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi e Rafael Timóteo de Sousa Júnior. "Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique". Sensors 20, n.º 20 (16 de outubro de 2020): 5845. http://dx.doi.org/10.3390/s20205845.
Texto completo da fonteZhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng e Zhaohua Li. "VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model". Mathematics 12, n.º 9 (24 de abril de 2024): 1286. http://dx.doi.org/10.3390/math12091286.
Texto completo da fonteLuo, Yuling, Dezheng Zhang e Junxiu Liu. "A Chaotic Block Cryptographic System Resistant to Power Analysis Attack". International Journal of Bifurcation and Chaos 29, n.º 08 (julho de 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Texto completo da fonteCarvallo, P., E. Carvallo, R. Rivas, L. Carvallo e M. Del Sol. "Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack". International Journal of Medical and Surgical Sciences 3, n.º 1 (26 de outubro de 2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Texto completo da fonteYin, Ziwei, Kun Li e Hongjun Bi. "Trusted Multi-Domain DDoS Detection Based on Federated Learning". Sensors 22, n.º 20 (12 de outubro de 2022): 7753. http://dx.doi.org/10.3390/s22207753.
Texto completo da fonteSagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee e Ishaani Priyadarshini. "A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment". Future Internet 14, n.º 10 (19 de outubro de 2022): 301. http://dx.doi.org/10.3390/fi14100301.
Texto completo da fonteHadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad e Rohmah Pari. "Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test". Polymers 14, n.º 19 (24 de setembro de 2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Texto completo da fonteKhare, Surbhi, e Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 3 (5 de abril de 2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Texto completo da fonteMialhe, PJ. "Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP". Brazilian Journal of Biology 74, n.º 3 (agosto de 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Texto completo da fonteDomingo, Luis R., Mar Ríos-Gutiérrez e Patricia Pérez. "Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory". Chemistry 4, n.º 3 (26 de julho de 2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Texto completo da fonteSalem, Ahmed, Xuening Liao, Yulong Shen e Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework". Wireless Communications and Mobile Computing 2018 (28 de agosto de 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.
Texto completo da fonte