Статті в журналах з теми "Higher-order attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Higher-order attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
DONG, Le, Wen-Ling WU, Shuang WU, and Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack." Chinese Journal of Computers 35, no. 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
TSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA, and Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Sugio, Nobuyuki, Naoki Shibayama, and Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM." Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Yao, Jian Bo, and Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack." Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
SUGIO, N., H. AONO, S. HONGO, and T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Cayrol, Claudette, and Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports." International Journal on Artificial Intelligence Tools 29, no. 03n04 (June 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Zhao, Pu, Pin-yu Chen, Siyue Wang, and Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Chancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone." Arithmetic Teacher 38, no. 6 (February 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Kaedi, S., M. Doostari, and M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA." Journal of Circuits, Systems and Computers 27, no. 12 (June 22, 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Narote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Ramachandra, H. V., Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith, and H. S. Mohan. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture." Journal of Electrical and Computer Engineering 2023 (September 28, 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Wei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein, and Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 3 (June 28, 2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Thanh, Bui The, and Ngo Kien Trung. "Using the Model Reduction Techniques to Find the Low-Order Controller of the Aircraft's Angle of Attack Control System." Journal Européen des Systèmes Automatisés 55, no. 5 (November 30, 2022): 649–55. http://dx.doi.org/10.18280/jesa.550510.
Sălăgean, Ana, R. Winter, Matei Mandache-Sălăgean, and Raphael C. W. Phan. "Higher order differentiation over finite fields with applications to generalising the cube attack." Designs, Codes and Cryptography 84, no. 3 (September 21, 2016): 425–49. http://dx.doi.org/10.1007/s10623-016-0277-5.
Padmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (December 23, 2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Yang, Zhifei, Wenmin Li, Fei Gao, and Qiaoyan Wen. "FAPA: Transferable Adversarial Attacks Based on Foreground Attention." Security and Communication Networks 2022 (October 29, 2022): 1–8. http://dx.doi.org/10.1155/2022/4447307.
Le, Duc, Minh Dao, and Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN." Information and Control Systems, no. 3 (June 15, 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Fargetti, Simone, Claudia Goldenstein-Schainberg, Andressa Silva Abreu, and Ricardo Fuller. "Refractory Gout Attack." Case Reports in Medicine 2012 (2012): 1–4. http://dx.doi.org/10.1155/2012/657694.
Liu, Fengchun, Sen Zhang, Weining Ma, and Jingguo Qu. "Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine." Mathematics 10, no. 15 (August 1, 2022): 2713. http://dx.doi.org/10.3390/math10152713.
Yan, Ruoyu. "Combining Renyi Entropy and EWMA to Detect Common Attacks in Network." International Journal of Pattern Recognition and Artificial Intelligence 30, no. 10 (November 23, 2016): 1650021. http://dx.doi.org/10.1142/s021800141650021x.
Baigang, Mi, and Yu Jingyi. "An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack." International Journal of Aerospace Engineering 2021 (September 8, 2021): 1–12. http://dx.doi.org/10.1155/2021/5815167.
OMORI, ITSUKI. "A problem of atrial attack-receiving ability evaluation by higher order right atrium electric potential." Japanese Journal of Electrocardiology 10, no. 6 (1990): 833–42. http://dx.doi.org/10.5105/jse.10.833.
Sárkány, Zoltán, Kinga Sárkány, and A. Horváth. "Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics." Acta Medica Marisiensis 62, no. 1 (March 1, 2016): 73–77. http://dx.doi.org/10.1515/amma-2015-0120.
Singh, Anurag, and Dr Subhadra Shaw. "Using Machine Learning Algorithms to Alleviate the Shilling Attack in a Recommendation System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 1879–83. http://dx.doi.org/10.22214/ijraset.2023.51951.
Thaper, Rohit, and Amandeep Verma. "Enhanced-Adaptive Pattern Attack Recognition Technique (E-APART) Against EDoS Attacks in Cloud Computing." Journal of Cases on Information Technology 17, no. 3 (July 2015): 41–55. http://dx.doi.org/10.4018/jcit.2015070105.
Ueno, Rei, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (December 4, 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Dong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu, and André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 6 (June 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Lu, Jiqiang, Yongzhuang Wei, Jongsung Kim, and Enes Pasalic. "The higher-order meet-in-the-middle attack and its application to the Camellia block cipher." Theoretical Computer Science 527 (March 2014): 102–22. http://dx.doi.org/10.1016/j.tcs.2014.01.031.
Al-Shabi, Mohammed. "Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 2 (August 31, 2022): 99–110. http://dx.doi.org/10.17762/ijcnis.v14i2.5483.
Yildirim, D., R. C. Kardaş, B. Ozkiziltas, I. Vasi, M. A. Ozturk, S. Haznedaroglu, B. Goker, and A. Tufan. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
JIN, Xiaying, Yang LI, and Quan PAN. "DE-JSMA: a sparse adversarial attack algorithm for SAR-ATR models." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 41, no. 6 (December 2023): 1170–78. http://dx.doi.org/10.1051/jnwpu/20234161170.
Lombardero, M. J., M. P. Ayres, F. E. Krivak-Tetley, and K. N. E. Fitza. "Population biology of the European woodwasp,Sirex noctilio, in Galicia, Spain." Bulletin of Entomological Research 106, no. 5 (February 24, 2016): 569–80. http://dx.doi.org/10.1017/s0007485316000043.
Liu, Hongjuan, Zhiliang Zhu, Hai Yu, and Qian Zhu. "Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/567898.
Peng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han, and Wei Wang. "Targeting attack hypergraph networks." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 7 (July 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Yildirim, D., E. Tahta, R. C. Kardaş, B. Özkiziltaş, I. Vasi, H. Küçük, M. A. Ozturk, and A. Tufan. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Li, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang, and Chengbin Jin. "The Notion of Transparency Order, Revisited." Computer Journal 63, no. 12 (July 3, 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Li, Jiang, Xiaohui Liu, and Chunjin Wei. "Stationary distribution of a stage-structure predator–prey model with prey’s counter-attack and higher-order perturbations." Applied Mathematics Letters 129 (July 2022): 107921. http://dx.doi.org/10.1016/j.aml.2022.107921.
Branciard, C., N. Gisin, N. Lutkenhaus, and V. Scarani. "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography." Quantum Information and Computation 7, no. 7 (September 2007): 639–64. http://dx.doi.org/10.26421/qic7.7-6.
Deng, Ya Juan, and Shao Rong Hu. "Topology Characteristic of Hub-and-Spoke Transportation Network." Applied Mechanics and Materials 361-363 (August 2013): 2030–35. http://dx.doi.org/10.4028/www.scientific.net/amm.361-363.2030.
Abreu Maranhão, João Paulo, João Paulo Carvalho Lustosa da Costa, Edison Pignaton de Freitas, Elnaz Javidi, and Rafael Timóteo de Sousa Júnior. "Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique." Sensors 20, no. 20 (October 16, 2020): 5845. http://dx.doi.org/10.3390/s20205845.
Zhang, Chenhui, Le Wang, Dunqiu Fan, Junyi Zhu, Tang Zhou, Liyi Zeng, and Zhaohua Li. "VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model." Mathematics 12, no. 9 (April 24, 2024): 1286. http://dx.doi.org/10.3390/math12091286.
Luo, Yuling, Dezheng Zhang, and Junxiu Liu. "A Chaotic Block Cryptographic System Resistant to Power Analysis Attack." International Journal of Bifurcation and Chaos 29, no. 08 (July 2019): 1950106. http://dx.doi.org/10.1142/s0218127419501062.
Carvallo, P., E. Carvallo, R. Rivas, L. Carvallo, and M. Del Sol. "Middle Cerebral Artery Occlusion in Acute Ischaemic Cerebrovascular Attack." International Journal of Medical and Surgical Sciences 3, no. 1 (October 26, 2018): 747–51. http://dx.doi.org/10.32457/ijmss.2016.003.
Yin, Ziwei, Kun Li, and Hongjun Bi. "Trusted Multi-Domain DDoS Detection Based on Federated Learning." Sensors 22, no. 20 (October 12, 2022): 7753. http://dx.doi.org/10.3390/s22207753.
Sagu, Amit, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee, and Ishaani Priyadarshini. "A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment." Future Internet 14, no. 10 (October 19, 2022): 301. http://dx.doi.org/10.3390/fi14100301.
Hadi, Yusuf Sudo, Dede Hermawan, Imam Busyra Abdillah, Mahdi Mubarok, Wa Ode Muliastuty Arsyad, and Rohmah Pari. "Polystyrene-Impregnated Glulam Resistance to Subterranean Termite Attacks in a Laboratory Test." Polymers 14, no. 19 (September 24, 2022): 4003. http://dx.doi.org/10.3390/polym14194003.
Khare, Surbhi, and Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (April 5, 2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Mialhe, PJ. "Preferential prey selection by Desmodus rotundus (E. Geoffroy, 1810, Chiroptera, Phyllostomidae) feeding on domestic herbivores in the municipality of São Pedro - SP." Brazilian Journal of Biology 74, no. 3 (August 2014): 579–84. http://dx.doi.org/10.1590/bjb.2014.0086.
Domingo, Luis R., Mar Ríos-Gutiérrez, and Patricia Pérez. "Unveiling the Chemistry of Higher-Order Cycloaddition Reactions within the Molecular Electron Density Theory." Chemistry 4, no. 3 (July 26, 2022): 735–52. http://dx.doi.org/10.3390/chemistry4030052.
Salem, Ahmed, Xuening Liao, Yulong Shen, and Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.