Статті в журналах з теми "Attack Investigation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Attack Investigation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Повний текст джерелаWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Повний текст джерелаZhu, Ying. "Attack Pattern Discovery in Forensic Investigation of Network Attacks." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1349–57. http://dx.doi.org/10.1109/jsac.2011.110802.
Повний текст джерелаStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Повний текст джерелаD, Yuvaraj, Sivaram M, A. Mohamed Uvaze Ahamed, and Nageswari S. "Some Investigation on DDOS Attack Models in Mobile Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 10 (September 25, 2019): 71. http://dx.doi.org/10.3991/ijim.v13i10.11304.
Повний текст джерелаKumar, Sunil, and Maninder Singh. "Design and Efficient Network Investigation of Passive Periodic Drop Attack." Oriental journal of computer science and technology 13, no. 0203 (January 30, 2021): 110–16. http://dx.doi.org/10.13005/ojcst13.0203.08.
Повний текст джерелаYeng, Prosper Kandabongee, Muhammad Ali Fauzi, Bian Yang, and Peter Nimbe. "Investigation into Phishing Risk Behaviour among Healthcare Staff." Information 13, no. 8 (August 18, 2022): 392. http://dx.doi.org/10.3390/info13080392.
Повний текст джерелаZharova, O. Yu. "APPLICATION OF NETWORK LOAD ANALYSIS SYSTEM FOR DETECTING START OF DDOS ATTACK." Issues of radio electronics, no. 11 (November 20, 2018): 48–52. http://dx.doi.org/10.21778/2218-5453-2018-11-48-52.
Повний текст джерелаWu, Siwei, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, and Kui Ren. "Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum." ACM Transactions on Software Engineering and Methodology 31, no. 3 (July 31, 2022): 1–33. http://dx.doi.org/10.1145/3505263.
Повний текст джерелаMHolkar, Amit, Neha Shinde Holkar, and Dhiiraj Nitnawwre. "Investigation of Application Attack on MANET." International Journal of Computer Applications 71, no. 14 (June 26, 2013): 42–45. http://dx.doi.org/10.5120/12430-9190.
Повний текст джерелаBoateng, Terry Kwaku. "Attack Intention Recognition Techniques." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 301–8. http://dx.doi.org/10.22624/aims/crp-bk3-p48.
Повний текст джерелаQuroturohman, Denis. "PENETRATION TESTING DALAM FORENSIK DIGITAL PADA JARINGAN FAKULTAS TEKNIK UNIVERSITAS IBN KHALDUN BOGOR DENGAN PING OF DEATH." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 4, no. 2 (November 3, 2021): 81. http://dx.doi.org/10.32832/inova-tif.v4i2.5812.
Повний текст джерелаEnriquez, Raul G., Juan M. Fernandez-G, Ismael Leon, William F. Reynolds, Ji Ping Yang, and Margaret Yu. "Investigation of the effect of ring size on the product distribution for the Schiff base reaction of 2-acetylcycloalkanones with diamino alkanes." Canadian Journal of Chemistry 73, no. 1 (January 1, 1995): 16–21. http://dx.doi.org/10.1139/v95-004.
Повний текст джерелаRevyakina, Yelena, Larissa Cherckesova, Olga Safaryan, Denis Korochentsev, Nikolay Boldyrikhin, and Yuri Ivanov. "Possibilities of conducting XSS-attacks and the development of countermeasures." E3S Web of Conferences 224 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202022401040.
Повний текст джерелаPicado, C., JA Castillo, JM Montserrat, and A. Agusti-Vidal. "Aspirin-intolerance as a precipitating factor of life-threatening attacks of asthma requiring mechanical ventilation." European Respiratory Journal 2, no. 2 (February 1, 1989): 127–29. http://dx.doi.org/10.1183/09031936.93.02020127.
Повний текст джерелаEchaves, Victor D., Dan M. Harman, and Amy L. Harman. "Site Quality in Relation to Damage by Locust Borer, Megacyllene robiniae Forster in Black Locust." Journal of Entomological Science 33, no. 1 (January 1, 1998): 106–12. http://dx.doi.org/10.18474/0749-8004-33.1.106.
Повний текст джерелаZhou, Xingchen, Ming Xu, Yiming Wu, and Ning Zheng. "Deep Model Poisoning Attack on Federated Learning." Future Internet 13, no. 3 (March 14, 2021): 73. http://dx.doi.org/10.3390/fi13030073.
Повний текст джерелаAgghey, Abel Z., Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, and Jema D. Ndibwile. "Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach." Symmetry 13, no. 11 (November 17, 2021): 2192. http://dx.doi.org/10.3390/sym13112192.
Повний текст джерелаRokhmah, Siti, and Ihsan Cahyo Utomo. "Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks." International Journal of Computer and Information System (IJCIS) 1, no. 1 (May 18, 2020): 11–15. http://dx.doi.org/10.29040/ijcis.v1i1.7.
Повний текст джерелаGupta, Ramesh K. "The Investigation of the Corrosive Effects of Sulphates and Salts on the Concrete and the Study of Environmental Changes on it." Journal of Cement Based Composites 1, no. 2 (June 3, 2020): 1–5. http://dx.doi.org/10.36937/cebacom.2020.002.001.
Повний текст джерелаTanasheva, N. K. "INVESTIGATION OF THE AERODYNAMIC FORCES OF A TRIANGULAR WIND TURBINE BLADE FOR THE LOW WIND SPEEDS." Eurasian Physical Technical Journal 18, no. 4 (38) (December 21, 2021): 59–64. http://dx.doi.org/10.31489/2021no4/59-64.
Повний текст джерелаEbrahimian, Mahsa, and Rasha Kashef. "Detecting Shilling Attacks Using Hybrid Deep Learning Models." Symmetry 12, no. 11 (October 31, 2020): 1805. http://dx.doi.org/10.3390/sym12111805.
Повний текст джерелаCavanna, Andrea E., and Stefano Seri. "Neurophysiological investigations for the diagnosis of non-epileptic attack disorder in neuropsychiatry services: from safety standards to improved effectiveness." Acta Neuropsychiatrica 28, no. 4 (March 23, 2016): 185–94. http://dx.doi.org/10.1017/neu.2016.10.
Повний текст джерелаCao, Yu Ji, Shi Ying Zhang, and Peng Gao. "Investigation of Attack Angle Character for Hypersonic Inlet." Advanced Materials Research 468-471 (February 2012): 1978–81. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1978.
Повний текст джерелаTan, Cheng, Lei Zhao, Weijie Liu, Lai Xu, and Lina Wang. "CAPT: Context-aware provenance tracing for attack investigation." China Communications 15, no. 2 (February 2018): 153–69. http://dx.doi.org/10.1109/cc.2018.8300279.
Повний текст джерелаNehdi, M. L., A. R. Suleiman, and A. M. Soliman. "Investigation of concrete exposed to dual sulfate attack." Cement and Concrete Research 64 (October 2014): 42–53. http://dx.doi.org/10.1016/j.cemconres.2014.06.002.
Повний текст джерелаNovita, Novita, Hasbi Amiruddin, Husaini Ibrahim, Teuku Muhammad Jamil, Syaukani Syaukani, Emiko Oguri, and Katsuyuki Eguchi. "Investigation of Termite Attack on Cultural Heritage Buildings: A Case Study in Aceh Province, Indonesia." Insects 11, no. 6 (June 22, 2020): 385. http://dx.doi.org/10.3390/insects11060385.
Повний текст джерелаAhmad Fitriadhy, Intan Nur Nabila, Christina Bangi Grosnin, Faisal Mahmuddin, and Suandar Baso. "Computational Investigation into Prediction of Lift Force and Resistance of a Hydrofoil Ship." CFD Letters 14, no. 4 (May 6, 2022): 51–66. http://dx.doi.org/10.37934/cfdl.14.4.5166.
Повний текст джерелаDas, More Swami, A. Govardhan, and Vijaya Lakshmi Doddapaneni. "A Model of Cloud Forensic Application With Assurance of Cloud Log." International Journal of Digital Crime and Forensics 13, no. 5 (September 2021): 114–29. http://dx.doi.org/10.4018/ijdcf.20210901.oa7.
Повний текст джерелаTang, Hui, Yulong Lei, Xingzhong Li, and Yao Fu. "Numerical investigation of the aerodynamic characteristics and attitude stability of a bio-inspired corrugated airfoil for MAV or UAV applications." Energies 12, no. 20 (October 22, 2019): 4021. http://dx.doi.org/10.3390/en12204021.
Повний текст джерелаJayaraj, Irrai Anbu, Bharanidharan Shanmugam, Sami Azam, and Ganthan Narayana Samy. "A Systematic Review of Radio Frequency Threats in IoMT." Journal of Sensor and Actuator Networks 11, no. 4 (September 28, 2022): 62. http://dx.doi.org/10.3390/jsan11040062.
Повний текст джерелаHajtmanek, Roman, Martin Kontšek, Juraj Smieško, and Jana Uramová. "One-Parameter Statistical Methods to Recognize DDoS Attacks." Symmetry 14, no. 11 (November 11, 2022): 2388. http://dx.doi.org/10.3390/sym14112388.
Повний текст джерелаStepanov, Robert, Vladimir Pakhov, Andrey Bozhenko, Alexander Kusyumov, Sergey Mikhailov, and Nikolay Tarasov. "Experimental investigation of wing tip vortices in the near-field." EPJ Web of Conferences 196 (2019): 00025. http://dx.doi.org/10.1051/epjconf/201919600025.
Повний текст джерелаSelzer, R. "Environmental Influences on the Bending Properties of Sisal Fiber Reinforced Polymer Composites." Advanced Composites Letters 4, no. 3 (May 1995): 096369359500400. http://dx.doi.org/10.1177/096369359500400304.
Повний текст джерелаHagedorn, Andreas, Agneta Snoer, Rigmor Jensen, Bryan Haddock, and Mads Barloese. "The spectrum of cluster headache: A case report of 4600 attacks." Cephalalgia 39, no. 9 (March 26, 2019): 1134–42. http://dx.doi.org/10.1177/0333102419833081.
Повний текст джерелаDesai, Venkappayya R., and Nadim M. Aziz. "An Experimental Investigation of Cross-Flow Turbine Efficiency." Journal of Fluids Engineering 116, no. 3 (September 1, 1994): 545–50. http://dx.doi.org/10.1115/1.2910311.
Повний текст джерелаKalimuthu, R., R. C. Mehta, and E. Rathakrishnan. "Experimental investigation on spiked body in hypersonic flow." Aeronautical Journal 112, no. 1136 (October 2008): 593–98. http://dx.doi.org/10.1017/s0001924000002554.
Повний текст джерелаSchneegass, Stefan, Alia Saad, Roman Heger, Sarah Delgado Rodriguez, Romina Poguntke, and Florian Alt. "An Investigation of Shoulder Surfing Attacks on Touch-Based Unlock Events." Proceedings of the ACM on Human-Computer Interaction 6, MHCI (September 19, 2022): 1–14. http://dx.doi.org/10.1145/3546742.
Повний текст джерелаFeng, Xiao Xin, Xiu Juan Li, and Qing Min Wei. "Investigation of Sulphate Attack on C-S-H Gel." Advanced Materials Research 287-290 (July 2011): 1116–20. http://dx.doi.org/10.4028/www.scientific.net/amr.287-290.1116.
Повний текст джерелаAli Ahmed, Abdulghani. "INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME." International Journal of Computer Systems & Software Engineering 1, no. 1 (February 15, 2015): 93–105. http://dx.doi.org/10.15282/ijsecs.1.2015.8.0008.
Повний текст джерелаRishi Sahu, Divya, and Deepak Singh Tomar. "DNS Pharming through PHP Injection: Attack Scenario and Investigation." International Journal of Computer Network and Information Security 7, no. 4 (March 8, 2015): 21–28. http://dx.doi.org/10.5815/ijcnis.2015.04.03.
Повний текст джерелаVijayalakshmi, Akshaya, Darrel D. Muehling, and Russell N. Laczniak. "An Investigation of Consumers' Responses to Comparative “Attack” Ads." Journal of Promotion Management 21, no. 6 (November 2, 2015): 760–75. http://dx.doi.org/10.1080/10496491.2015.1088921.
Повний текст джерелаJellinger, K. A. "Transient Ischemic Attack and Stroke - Diagnosis, Investigation and Management." European Journal of Neurology 16, no. 7 (May 12, 2009): e140-e140. http://dx.doi.org/10.1111/j.1468-1331.2009.02682.x.
Повний текст джерелаBamford, J. "ASSESSMENT AND INVESTIGATION OF STROKE AND TRANSIENT ISCHAEMIC ATTACK." Journal of Neurology, Neurosurgery & Psychiatry 70, no. 90001 (April 1, 2001): 3i—6. http://dx.doi.org/10.1136/jnnp.70.suppl_1.i3.
Повний текст джерелаChen, Chunyu, Mingjian Cui, Xinan Wang, Kaifeng Zhang, and Shengfei Yin. "An Investigation of Coordinated Attack on Load Frequency Control." IEEE Access 6 (2018): 30414–23. http://dx.doi.org/10.1109/access.2018.2845300.
Повний текст джерелаRazavi, Seyed Esmail, and Ali Atashbar Orang. "A comparative investigation of hydrofoil at angles of attack." International Journal for Numerical Methods in Fluids 68, no. 9 (May 5, 2011): 1087–101. http://dx.doi.org/10.1002/fld.2593.
Повний текст джерелаYounis, Samaira, Casper E. Christensen, Nikolaj M. Toft, Thomas Søborg, Faisal M. Amin, Anders Hougaard, and Messoud Ashina. "Investigation of distinct molecular pathways in migraine induction using calcitonin gene-related peptide and sildenafil." Cephalalgia 39, no. 14 (November 4, 2019): 1776–88. http://dx.doi.org/10.1177/0333102419882474.
Повний текст джерелаLam, K., Y. F. Lin, Y. Liu, and L. Zou. "Numerical Investigation of Flow past a Wavy Airfoil." Applied Mechanics and Materials 110-116 (October 2011): 4269–75. http://dx.doi.org/10.4028/www.scientific.net/amm.110-116.4269.
Повний текст джерелаKorkmaz, Tanzer, Yusuf Ozgur Bicer, Erdinc Serin, Sinan Seyhan та Serap Koybasi Sanal. "Salivary α-Amylase Levels in Vertigo: Can it be an Autonomic Dysfunction?" Ear, Nose & Throat Journal 97, № 9 (вересень 2018): 278–82. http://dx.doi.org/10.1177/014556131809700917.
Повний текст джерелаPugliese, Aldo, Zhi Gang Yang, and Qi Liang Li. "CFD Research and Investigation of 2011 P4/5 Competition Rear Wing." Applied Mechanics and Materials 275-277 (January 2013): 665–71. http://dx.doi.org/10.4028/www.scientific.net/amm.275-277.665.
Повний текст джерела