Добірка наукової літератури з теми "SILENT ATTACK"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SILENT ATTACK".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "SILENT ATTACK"
Sushma, Vasamsetti Ramya Sri, K. Nikhil, K. Ashish Reddy, and L. Sunitha. "Diagnosis of Cardiovascular Disease using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 371–78. http://dx.doi.org/10.22214/ijraset.2023.49209.
Повний текст джерелаSharma, Bhuvan, and Spinder Kaur. "Analysis and Solutions of Silent Heart Attack Using Python." International Journal of Computer Sciences and Engineering 10, no. 1 (January 31, 2022): 37–40. http://dx.doi.org/10.26438/ijcse/v10i1.3740.
Повний текст джерелаAnastasilakis, Dimitrios A., Polyzois Makras, Stergios A. Polyzos, and Athanasios D. Anastasilakis. "Asymptomatic and normocalcemic hyperparathyroidism, the silent attack: a combo-endocrinology overview." Hormones 18, no. 1 (September 25, 2018): 65–70. http://dx.doi.org/10.1007/s42000-018-0069-6.
Повний текст джерелаTeitelbaum, Michael, Rafail A. Kotronias, Luciano A. Sposato, and Rodrigo Bagur. "Cerebral Embolic Protection in TAVI: Friend or Foe." Interventional Cardiology Review 14, no. 1 (February 25, 2019): 22–25. http://dx.doi.org/10.15420/icr.2018.32.2.
Повний текст джерелаMykland, Martin Syvertsen, Martin Uglem, Lars Jacob Stovner, Eiliv Brenner, Mari Storli Snoen, Gøril Bruvik Gravdahl, Trond Sand, and Petter Moe Omland. "Insufficient sleep may alter cortical excitability near the migraine attack: A blinded TMS crossover study." Cephalalgia 43, no. 3 (February 14, 2023): 033310242211483. http://dx.doi.org/10.1177/03331024221148391.
Повний текст джерелаLi, Ying, Nan Liu, Yonghua Huang, Wei Wei, Fei Chen, and Weiwei Zhang. "Risk Factors for Silent Lacunar Infarction in Patients with Transient Ischemic Attack." Medical Science Monitor 22 (February 11, 2016): 447–53. http://dx.doi.org/10.12659/msm.895759.
Повний текст джерелаYang, Tiancheng, Ankit Mittal, Yunsi Fei, and Aatmesh Shrivastava. "Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, no. 1 (January 2021): 124–35. http://dx.doi.org/10.1109/tvlsi.2020.3034878.
Повний текст джерелаDemirel, Esra Aciman, Ufuk Emre, Aysun Ünal, Banu Özen, H. Tuğrul Atasoy, and Fürüzan Öztürk. "Evaluation of silent cerebral lesions in patients with first ischemic stroke attack." Neurology, Psychiatry and Brain Research 18, no. 1 (January 2012): 22–26. http://dx.doi.org/10.1016/j.npbr.2011.12.001.
Повний текст джерелаHoward, George, Gregory W. Evans, and James F. Toole. "Silent cerebral infarctions in transient ischemic attack populations: Implications of advancing technology." Journal of Stroke and Cerebrovascular Diseases 4 (January 1994): S47—S50. http://dx.doi.org/10.1016/s1052-3057(10)80257-5.
Повний текст джерелаJati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (November 18, 2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.
Повний текст джерелаДисертації з теми "SILENT ATTACK"
Paris, Antoine. "Synthèses de dérivés silylés en séries pyridinique et diazinique. Application de la réaction d'ipso-désilylation à l'élaboration de polyhétérocycles." Rouen, 1997. http://www.theses.fr/1997ROUES053.
Повний текст джерелаCHEN, TING-WEI, and 陳庭葦. "Silent attack-Discussion on the Behavior of Network Bullying." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c4yuw8.
Повний текст джерела正修科技大學
資訊管理研究所
105
The Internet is far away, a plain little things, one on the Internet, through the masses of the masses of mutual transmission, and even public trial, often resulting in the event of the second person in the event of injury. However, most of the message will be sent out of the message, holding the curiosity and play the majority of the mentality, do not think this behavior is wrong? I do not know the network to help spread or fun based on fun and free to share Audio and video, most likely have violated the law but no knowledge. Therefore, this study is aimed at the well-known community, relying on the power of the Internet and was even the attention of the event, and with interviews with well-known secondary school tutors and the use of questionnaires to the three information derived from the integration The following points: 1. On the Internet to share and spread indecent or false audio and video, most people are holding a fun and curious, rather than absolute malicious. 2. In the questionnaire survey, that part of the people who share the forwarding does not know this behavior may have violated the law, and know their own behavior is wrong, but often holding a lucky mind. 3. According to the survey in this study, even if most people are aware of the Internet to send and distribute some indecent or false audio and video text is a violation of the law, but still can not help but "we are doing, I will not be so untrue. " 4. Finally, this study argues that, although not in the chaos with the heavy code, but for the behavior of the rules and deeds on the Internet, it is necessary and clear, can not be vague, because often distributed anonymous network of others, are holding a lucky mind And make an act.
MUKOKO, FUNGAYI DONEWELL. "USING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKS." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380.
Повний текст джерелаКниги з теми "SILENT ATTACK"
Verma, Virendra. Fall of Dera Baba Nanak Bridge: A silent night attack. Dehradun, U.P: Youth Education Publications, 1989.
Знайти повний текст джерелаCalvert, James F. Silent running: My years on a World War II attack submarine. New York: J. Wiley, 1995.
Знайти повний текст джерелаP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, N.J: John Wiley, 2005.
Знайти повний текст джерелаP, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, NJ: John Wiley, 2004.
Знайти повний текст джерелаKristen, Strom Terry, and Fox Barry, eds. Syndrome X: Overcoming the silent killer that can give you a heart attack. New York: Simon and Schuster, 2000.
Знайти повний текст джерелаMiller, Vickie Gail. Doris Miller: A silent medal of honor. Austin, Tex: Eakin Press, 1997.
Знайти повний текст джерелаReader's Digest (Australia) Pty. Ltd., ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1990.
Знайти повний текст джерелаPty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney [Australia]: Reader's Digest, 1987.
Знайти повний текст джерелаPty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1986.
Знайти повний текст джерелаSilent siege-II: Japanese attacks on North America in World War II. 2nd ed. Medford, Or: Webb Research Group, 1988.
Знайти повний текст джерелаЧастини книг з теми "SILENT ATTACK"
Mukoko, Fungayi Donewell, Aman Jatain, and Yojna Arora. "Cloud Silent Attack Strategies Analysis Alongside Proposed Generic Modelling." In Advances in Intelligent Systems and Computing, 491–501. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3590-9_38.
Повний текст джерелаMajumder, Sharmistha, Mrinal Kanti Deb Barma, Ashim Saha, and A. B. Roy. "Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning." In Studies in Computational Intelligence, 145–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97113-7_9.
Повний текст джерела"The Revolution in Heart Attack Treatment." In Fighting the Silent Killer, 147–57. A K Peters/CRC Press, 1993. http://dx.doi.org/10.1201/9781439864753-16.
Повний текст джерелаBell, Derrick. "The School Desegregation Era." In Silent Covenants. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195172720.003.0014.
Повний текст джерелаJoseph, Theyamma, and Jacquline C. Vadasseril. "Diabetes a Silent Killer: A Threat for Cardiorespiratory Fitness." In Cardiorespiratory Fitness - New Topics [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.108164.
Повний текст джерелаAdams, Andrea C. "Cerebrovascular Disease." In Mayo Clinic Essential Neurology, 352–92. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190206895.003.0011.
Повний текст джерелаDelgado, James P. "Controversy and Inquiry." In The Curse of the Somers, 115—C6.F2. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197575222.003.0007.
Повний текст джерелаInouye, Melissa Wei-Tsing. "The Handwritten Hymnbook (1958–1974)." In China and the True Jesus, 212–34. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190923464.003.0008.
Повний текст джерелаvan Schaik, Carel P., and John Terborgh. "The Silent Crisis: The State of Rain Forest Nature Preserves." In Last Stand. Oxford University Press, 1997. http://dx.doi.org/10.1093/oso/9780195095548.003.0008.
Повний текст джерелаYanık, Lerna K., and Fulya Hisarlıoğlu. "‘They wrote history with their bodies’: Necrogeopolitics, Necropolitical Spaces and the Everyday Spatial Politics of Death in Turkey." In Turkey's Necropolitical Laboratory, 46–70. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474450263.003.0003.
Повний текст джерелаТези доповідей конференцій з теми "SILENT ATTACK"
Grande, C. E. Lopez, and R. S. Guadron. "Social engineering: The silent attack." In 2015 IEEE Thirty-Fifth Central American and Panama Convention (CONCAPAN XXXV). IEEE, 2015. http://dx.doi.org/10.1109/concapan.2015.7428452.
Повний текст джерелаCroft, Neil. "On forensics: A silent SMS attack." In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320454.
Повний текст джерелаKoch, Robert, and Mario Golling. "Silent Battles: Towards Unmasking Hidden Cyber Attack." In 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8757146.
Повний текст джерелаChen, Ting, Haiyang Tang, Xiaodong Lin, Kuang Zhou, and Xiaosong Zhang. "Silent Battery Draining Attack against Android Systems by Subverting Doze Mode." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842268.
Повний текст джерелаGreitzer, Edward M. "Some Aerodynamic Problems of Aircraft Engines: Fifty Years After." In ASME Turbo Expo 2007: Power for Land, Sea, and Air. ASMEDC, 2007. http://dx.doi.org/10.1115/gt2007-28364.
Повний текст джерелаCerkovnik, Mark, and Wasy Akhtar. "Inclusion of Crack Face Pressure in Reference Stress for Thick Walled Risers and Flowlines." In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-11021.
Повний текст джерелаMukoko, Fungayi Donewell, and Vikas Thada. "A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks." In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2018. http://dx.doi.org/10.1109/ic3i44769.2018.9007279.
Повний текст джерелаHajipour, Mohammad, Mohammad Ali Akhaee, and Ramin Toosi. "Listening to Sounds of Silence for Audio replay attack detection." In 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS). IEEE, 2021. http://dx.doi.org/10.1109/icspis54653.2021.9729353.
Повний текст джерелаPayre, William, Jaume Perellomarch, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, Siraj Shaikh, Hoang Nguyen, and Stewart Birrell. "Understanding drivers' trust after software malfunctions and cyber intrusions of digital displays in an automated car." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002463.
Повний текст джерелаKhalil Bhuiyan, Md Ebrahim, Dustin Smith, Eric J. Voss, Chin-Chuan Wei, and Mohammad Shavezipur. "Surface Functionalization of Silicon MEMS Biochemical Sensors for the Detection of Foodborne Pathogens." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-69708.
Повний текст джерелаЗвіти організацій з теми "SILENT ATTACK"
Mizrach, Amos, Michal Mazor, Amots Hetzroni, Joseph Grinshpun, Richard Mankin, Dennis Shuman, Nancy Epsky, and Robert Heath. Male Song as a Tool for Trapping Female Medflies. United States Department of Agriculture, December 2002. http://dx.doi.org/10.32747/2002.7586535.bard.
Повний текст джерела