Статті в журналах з теми "Intrusive windows"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Intrusive windows".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
He, Xi, Heng Dong, Wanli Yang, and Jun Hong. "A Novel Denoising Auto-Encoder-Based Approach for Non-Intrusive Residential Load Monitoring." Energies 15, no. 6 (March 21, 2022): 2290. http://dx.doi.org/10.3390/en15062290.
Повний текст джерелаMassoz, Quentin, Jacques Verly, and Marc Van Droogenbroeck. "Multi-Timescale Drowsiness Characterization Based on a Video of a Driver’s Face." Sensors 18, no. 9 (August 25, 2018): 2801. http://dx.doi.org/10.3390/s18092801.
Повний текст джерелаSiqueira Cassiano, Marcella. "China’s Hukou Platform: Windows into the Family." Surveillance & Society 17, no. 1/2 (March 31, 2019): 232–39. http://dx.doi.org/10.24908/ss.v17i1/2.13125.
Повний текст джерелаLiu, Lin, Yuehua Jiang, Xun Zhou, Yun Li, Quanping Zhou, Jingwen Su, Junyuan Jia, Guoqiang Yang, and Yang Jin. "Long-Lasting Boiling-Wells: Geochemical Windows into the Tectonic Activity of the Maodong Fault (China)." Water 14, no. 3 (January 29, 2022): 427. http://dx.doi.org/10.3390/w14030427.
Повний текст джерелаAshton, K. E., J. F. Lewry, L. M. Heaman, R. P. Hartlaub, M. R. Stauffer, and H. T. Tran. "The Pelican Thrust Zone: basal detachment between the Archean Sask Craton and Paleoproterozoic Flin Flon Glennie Complex, western Trans-Hudson Orogen." Canadian Journal of Earth Sciences 42, no. 4 (April 1, 2005): 685–706. http://dx.doi.org/10.1139/e04-035.
Повний текст джерелаZhang, Guoming, Xiaoyu Ji, Yanjie Li, and Wenyuan Xu. "Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid." Sensors 20, no. 13 (June 28, 2020): 3635. http://dx.doi.org/10.3390/s20133635.
Повний текст джерелаShi, Yongtao, Xiaodong Zhao, Fan Zhang, and Yaguang Kong. "Non-Intrusive Load Monitoring Based on Swin-Transformer with Adaptive Scaling Recurrence Plot." Energies 15, no. 20 (October 21, 2022): 7800. http://dx.doi.org/10.3390/en15207800.
Повний текст джерелаMa, Yongfeng, Zhuopeng Xie, Shuyan Chen, Ying Wu, and Fengxiang Qiao. "Real-Time Driving Behavior Identification Based on Multi-Source Data Fusion." International Journal of Environmental Research and Public Health 19, no. 1 (December 29, 2021): 348. http://dx.doi.org/10.3390/ijerph19010348.
Повний текст джерелаSaralegui, Unai, Miguel Antón, Olatz Arbelaitz, and Javier Muguerza. "Smart Meeting Room Usage Information and Prediction by Modelling Occupancy Profiles." Sensors 19, no. 2 (January 16, 2019): 353. http://dx.doi.org/10.3390/s19020353.
Повний текст джерелаCorriveau, Louise, and Otto van Breemen. "Docking of the Central Metasedimentary Belt to Laurentia in geon 12: evidence from the 1.17-1.16 Ga Chevreuil intrusive suite and host gneisses, Quebec." Canadian Journal of Earth Sciences 37, no. 2-3 (April 2, 2000): 253–69. http://dx.doi.org/10.1139/e00-004.
Повний текст джерелаColuzzi, Davide, Giuseppe Baselli, Anna Maria Bianchi, Guillermina Guerrero-Mora, Juha M. Kortelainen, Mirja L. Tenhunen, and Martin O. Mendez. "Multi-Scale Evaluation of Sleep Quality Based on Motion Signal from Unobtrusive Device." Sensors 22, no. 14 (July 15, 2022): 5295. http://dx.doi.org/10.3390/s22145295.
Повний текст джерелаDoughty, P. T., R. A. Price, and R. R. Parrish. "Geology and U-Pb geochronology of Archean basement and Proterozoic cover in the Priest River complex, northwestern United States, and their implications for Cordilleran structure and Precambrian continent reconstructions." Canadian Journal of Earth Sciences 35, no. 1 (January 1, 1998): 39–54. http://dx.doi.org/10.1139/e97-083.
Повний текст джерелаHamed, Eman Esmaeel, and Muna Majeed Lafta. "INTRUSION WINDOWS XP BY BACKDOOR TOOL." Journal of Al-Nahrain University Science 11, no. 3 (December 1, 2008): 175–78. http://dx.doi.org/10.22401/jnus.11.3.21.
Повний текст джерелаLi, Yanyan, Haiguo Yin, Xin Deng, Linfeng Liang, and Yongchao Zhai. "Simulation Research on Ventilation Control of Gaseous Pollutants in Urban Sentry Boxes." E3S Web of Conferences 356 (2022): 04040. http://dx.doi.org/10.1051/e3sconf/202235604040.
Повний текст джерелаXie, Haoyang. "Forensic Analysis of Windows Registry Against Intrusion." International Journal of Network Security & Its Applications 4, no. 2 (March 31, 2012): 121–34. http://dx.doi.org/10.5121/ijnsa.2012.4209.
Повний текст джерелаArmstrong, Richard Lee, Randall R. Parrish, Peter van der Heyden, Krista Scott, Dita Runkle, and Richard L. Brown. "Early Proterozoic basement exposures in the southern Canadian Cordillera: core gneiss of Frenchman Cap, Unit I of the Grand Forks Gneiss, and the Vaseaux Formation." Canadian Journal of Earth Sciences 28, no. 8 (August 1, 1991): 1169–201. http://dx.doi.org/10.1139/e91-107.
Повний текст джерелаZheng, Hengjie, Fei Li, Hao Cai, and Kai Zhang. "Non-intrusive measurement method for the window opening behavior." Energy and Buildings 197 (August 2019): 171–76. http://dx.doi.org/10.1016/j.enbuild.2019.05.052.
Повний текст джерелаJantunen, Juha, and Kimmo Saarinen. "Intrusion of airborne pollen through open windows and doors." Aerobiologia 25, no. 3 (June 13, 2009): 193–201. http://dx.doi.org/10.1007/s10453-009-9124-8.
Повний текст джерелаChabab, Elena, Michael Kühn, and Thomas Kempka. "Upwelling mechanisms of deep saline waters via Quaternary erosion windows considering varying hydrogeological boundary conditions." Advances in Geosciences 58 (November 14, 2022): 47–54. http://dx.doi.org/10.5194/adgeo-58-47-2022.
Повний текст джерелаKamboj, Sunjeev K., An Tong Gong, ZhiHui Sim, Adrihani A. Rashid, Ami Baba, Georges Iskandar, Ravi K. Das, and H. Valerie Curran. "Reduction in the occurrence of distressing involuntary memories following propranolol or hydrocortisone in healthy women." Psychological Medicine 50, no. 7 (May 14, 2019): 1148–55. http://dx.doi.org/10.1017/s0033291719001028.
Повний текст джерелаZevenhoven, Ron, and Martin Fält. "Radiative cooling through the atmospheric window: A third, less intrusive geoengineering approach." Energy 152 (June 2018): 27–33. http://dx.doi.org/10.1016/j.energy.2018.03.084.
Повний текст джерелаYang, Wonyoung, and Hyeun Jun Moon. "Effects of indoor water sounds on intrusive noise perception and speech recognition in rooms." Building Services Engineering Research and Technology 39, no. 6 (April 17, 2018): 637–51. http://dx.doi.org/10.1177/0143624418769187.
Повний текст джерелаLiang, Xiang San, and Allan R. Robinson. "A Study of the Iceland–Faeroe Frontal Variability Using the Multiscale Energy and Vorticity Analysis." Journal of Physical Oceanography 34, no. 12 (December 1, 2004): 2571–91. http://dx.doi.org/10.1175/jpo2661.1.
Повний текст джерелаZimba, Aaron, and Mumbi Chishimba. "Exploitation of DNS Tunneling for Optimization of Data Exfiltration in Malware-free APT Intrusions." Zambia ICT Journal 1, no. 1 (December 11, 2017): 51–56. http://dx.doi.org/10.33260/zictjournal.v1i1.26.
Повний текст джерелаTobin, Donald L., and Michael S. Ware. "Using a windows attack intRusion emulator (AWARE) to teach computer security awareness." ACM SIGCSE Bulletin 37, no. 3 (September 2005): 213–17. http://dx.doi.org/10.1145/1151954.1067504.
Повний текст джерелаRonal Hadi, Yarmis Yuliana, and Hanriyawan Adnan Mooduto. "Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC." JITSI : Jurnal Ilmiah Teknologi Sistem Informasi 3, no. 1 (March 31, 2022): 8–15. http://dx.doi.org/10.30630/jitsi.3.1.58.
Повний текст джерелаLi, Xianfeng, Sen Xu, and Xiaopeng Hua. "Pattern Recognition of Grating Perimeter Intrusion Behavior in Deep Learning Method." Symmetry 13, no. 1 (January 6, 2021): 87. http://dx.doi.org/10.3390/sym13010087.
Повний текст джерелаTsuge, Yusuke, and Hidema Tanaka. "Intrusion Detection System Using Discrete Fourier Transform with Window Function." International Journal of Network Security & Its Applications 8, no. 2 (March 30, 2016): 23–34. http://dx.doi.org/10.5121/ijnsa.2016.8202.
Повний текст джерелаRamos, Raúl Gómez, Jaime Duque Domingo, Eduardo Zalama, and Jaime Gómez-García-Bermejo. "Daily Human Activity Recognition Using Non-Intrusive Sensors." Sensors 21, no. 16 (August 4, 2021): 5270. http://dx.doi.org/10.3390/s21165270.
Повний текст джерелаGu, Ming. "Anomaly Detection Based on Chi-Square Statistic Technology in Computer Information System." Applied Mechanics and Materials 462-463 (November 2013): 1046–49. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1046.
Повний текст джерелаHasan, Md Mehedi, Dhiman Chowdhury, and Md Ziaur Rahman Khan. "Non-Intrusive Load Monitoring Using Current Shapelets." Applied Sciences 9, no. 24 (December 8, 2019): 5363. http://dx.doi.org/10.3390/app9245363.
Повний текст джерелаBadawi, Amalia, David Berle, Kris Rogers, and Zachary Steel. "Do Cognitive Tasks Reduce Intrusive-Memory Frequency After Exposure to Analogue Trauma? An Experimental Replication." Clinical Psychological Science 8, no. 3 (March 17, 2020): 569–83. http://dx.doi.org/10.1177/2167702620906148.
Повний текст джерелаBowins, R. J., and L. M. Heaman. "Age and timing of igneous activity in the Temagami greenstone belt, Ontario: a preliminary report." Canadian Journal of Earth Sciences 28, no. 11 (November 1, 1991): 1873–76. http://dx.doi.org/10.1139/e91-167.
Повний текст джерелаChen, Wei-Cheng, and Keh-Chin Chang. "PIV measurements in near-wake turbulent regions." Modern Physics Letters B 32, no. 12n13 (May 10, 2018): 1840026. http://dx.doi.org/10.1142/s0217984918400262.
Повний текст джерелаSubarkah, Darwinaji, Angus L. Nixon, Monica Jimenez, Alan S. Collins, Morgan L. Blades, Juraj Farkaš, Sarah E. Gilbert, Simon Holford, and Amber Jarrett. "Constraining the geothermal parameters of in situ Rb–Sr dating on Proterozoic shales and their subsequent applications." Geochronology 4, no. 2 (September 6, 2022): 577–600. http://dx.doi.org/10.5194/gchron-4-577-2022.
Повний текст джерелаVeeranna, Thotakura, and Kiran Kumar Reddy. "Sliding window assisted mutual redundancy-based feature selection for intrusion detection system." International Journal of Ad Hoc and Ubiquitous Computing 40, no. 1/2/3 (2022): 176. http://dx.doi.org/10.1504/ijahuc.2022.123538.
Повний текст джерелаVeeranna, Thotakura, and Kiran Kumar Reddy. "Sliding window assisted mutual redundancy-based feature selection for intrusion detection system." International Journal of Ad Hoc and Ubiquitous Computing 40, no. 1/2/3 (2022): 176. http://dx.doi.org/10.1504/ijahuc.2022.10048197.
Повний текст джерелаVutukuru, Krishna Sai, Mohammadtaghi Moravej, Amal Elawady, and Arindam Gan Chowdhury. "Holistic testing to determine quantitative wind-driven rain intrusion for shuttered and impact resistant windows." Journal of Wind Engineering and Industrial Aerodynamics 206 (November 2020): 104359. http://dx.doi.org/10.1016/j.jweia.2020.104359.
Повний текст джерелаAbuadlla, Yousef, Goran Kvascev, Slavko Gajin, and Zoran Jovanovic. "Flow-based anomaly intrusion detection system using two neural network stages." Computer Science and Information Systems 11, no. 2 (2014): 601–22. http://dx.doi.org/10.2298/csis130415035a.
Повний текст джерелаMach’, Václav, Jan Valouch, and Milan Adámek. "Glass-break detector using accelerometer." MATEC Web of Conferences 210 (2018): 01003. http://dx.doi.org/10.1051/matecconf/201821001003.
Повний текст джерелаDean, Mark T., and Nicholas Turner. "Conodont Colour Alteration Index (CAI) values for the Carboniferous of Scotland." Transactions of the Royal Society of Edinburgh: Earth Sciences 85, no. 3 (1994): 211–20. http://dx.doi.org/10.1017/s0263593300003606.
Повний текст джерелаRasha Thamer Shawe, Kawther Thabt Saleh, and Farah Neamah Abbas. "Building attack detection system base on machine learning." Global Journal of Engineering and Technology Advances 6, no. 2 (February 28, 2021): 018–32. http://dx.doi.org/10.30574/gjeta.2021.6.2.0010.
Повний текст джерелаQu, Hongchun, Libiao Lei, Xiaoming Tang, and Ping Wang. "A Lightweight Intrusion Detection Method Based on Fuzzy Clustering Algorithm for Wireless Sensor Networks." Advances in Fuzzy Systems 2018 (June 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/4071851.
Повний текст джерелаČeponis, Dainius, and Nikolaj Goranin. "Investigation of Dual-Flow Deep Learning Models LSTM-FCN and GRU-FCN Efficiency against Single-Flow CNN Models for the Host-Based Intrusion and Malware Detection Task on Univariate Times Series Data." Applied Sciences 10, no. 7 (March 30, 2020): 2373. http://dx.doi.org/10.3390/app10072373.
Повний текст джерелаBaldini, Gianmarco. "On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks." Entropy 22, no. 9 (September 18, 2020): 1044. http://dx.doi.org/10.3390/e22091044.
Повний текст джерелаBaldini, Gianmarco, Jose Luis Hernandez Ramos, and Irene Amerini. "Intrusion Detection Based on Gray-Level Co-Occurrence Matrix and 2D Dispersion Entropy." Applied Sciences 11, no. 12 (June 16, 2021): 5567. http://dx.doi.org/10.3390/app11125567.
Повний текст джерелаWu, Wufei, Yizhi Huang, Ryo Kurachi, Gang Zeng, Guoqi Xie, Renfa Li, and Keqin Li. "Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks." IEEE Access 6 (2018): 45233–45. http://dx.doi.org/10.1109/access.2018.2865169.
Повний текст джерелаFeng, Zuhong, Jing Li, and Jie Hu Meichsner. "A Bayesian network intrusion detection algorithm based on principal component analysis and sliding window." International Journal of Security and Networks 9, no. 4 (2014): 216. http://dx.doi.org/10.1504/ijsn.2014.066177.
Повний текст джерелаKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Повний текст джерелаLiu, Zhenpeng, Nan Su, Yiwen Qin, Jiahuan Lu, and Xiaofei Li. "A Deep Random Forest Model on Spark for Network Intrusion Detection." Mobile Information Systems 2020 (December 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/6633252.
Повний текст джерела