Статті в журналах з теми "Synchronized attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Synchronized attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 22, 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.
Повний текст джерелаManaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Повний текст джерелаWu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.
Повний текст джерелаO'Connell, Michael, and Aaron Bernard. "A Serious Cause of Panic Attack." Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.
Повний текст джерелаButcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide." Journal of Genocide Research 15, no. 3 (September 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.
Повний текст джерелаLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Повний текст джерелаManaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (September 29, 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.
Повний текст джерелаRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Повний текст джерелаSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Повний текст джерелаUllah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard, and Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1." Cancers 12, no. 9 (September 18, 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.
Повний текст джерелаRadziukevich, M. L., та V. F. Golikov. "Combined formаtion of a cryptographic key using synchronized artificial neural networks". Doklady BGUIR 19, № 1 (23 лютого 2021): 79–87. http://dx.doi.org/10.35596/1729-7648-2021-19-1-79-87.
Повний текст джерелаZhang, Li, Xinru Mao, and Lin Ding. "Influence of attack angle on vortex-induced vibration and energy harvesting of two cylinders in side-by-side arrangement." Advances in Mechanical Engineering 11, no. 1 (January 2019): 168781401882259. http://dx.doi.org/10.1177/1687814018822598.
Повний текст джерелаThangarathinam, P., N. Suganya, T. Praddeep, and S. Vignesh. "Synchrophasor Technology for Cyber Security in Smart Grid." International Journal of Students' Research in Technology & Management 3, no. 7 (October 29, 2015): 436. http://dx.doi.org/10.18510/ijsrtm.2015.378.
Повний текст джерелаTruong, Victor, Alexandre Vervisch-Picois, Jose Rubio Hernan, and Nel Samama. "Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias." Sensors 23, no. 5 (March 2, 2023): 2735. http://dx.doi.org/10.3390/s23052735.
Повний текст джерелаHuang, Xiaojie, Yunxia Xia, and Da-Wei Ding. "Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks." Applied Sciences 13, no. 3 (January 29, 2023): 1716. http://dx.doi.org/10.3390/app13031716.
Повний текст джерелаChiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (April 5, 2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.
Повний текст джерелаAlbert Lusiola, Musoma. "Multi Agency Response to International Terrorism in Kenya: A Comparison of Dusit D2 and Westgate Terror Attacks." African Journal of Empirical Research 2, no. 2 (April 14, 2021): 68–84. http://dx.doi.org/10.51867/ajer.v2i2.23.
Повний текст джерелаDass, Prajnamaya, Pranay Kumar Saha, and Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks." International Journal of Business Data Communications and Networking 12, no. 2 (July 2016): 28–61. http://dx.doi.org/10.4018/ijbdcn.2016070103.
Повний текст джерелаMatsuzono, Kosuke, Takao Yoshiki, Yosuke Wakutani, Yasuhiro Manabe, Toru Yamashita, Kentaro Deguchi, Yoshio Ikeda, and Koji Abe. "Synchronized Babinski and Chaddock Signs Preceded the MRI Findings in a Case of Repetitive Transient Ischemic Attack." Internal Medicine 52, no. 18 (2013): 2127–29. http://dx.doi.org/10.2169/internalmedicine.52.0190.
Повний текст джерелаMukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.
Повний текст джерелаEslahi, Ali, Shahryar Zeighami, Faisal Ahmed, Seyed Hossein Hosseini, Bahareh Ebrahimi, and Mohammad Hossein Anbardar. "Synchronized Laparoscopic Bilateral Adrenalectomy for Pheochromocytoma in Multiple Endocrine Neoplasia Syndrome: A Case Report." Journal of Kidney Cancer and VHL 9, no. 3 (September 2, 2022): 24–28. http://dx.doi.org/10.15586/jkcvhl.v9i3.239.
Повний текст джерелаWinter, R. W., K. A. Cornell, L. L. Johnson, M. Ignatushchenko, D. J. Hinrichs, and M. K. Riscoe. "Potentiation of the antimalarial agent rufigallol." Antimicrobial Agents and Chemotherapy 40, no. 6 (June 1996): 1408–11. http://dx.doi.org/10.1128/aac.40.6.1408.
Повний текст джерелаKarthika, P., and Karmel Arockiasamy. "Simulation of SDN in mininet and detection of DDoS attack using machine learning." Bulletin of Electrical Engineering and Informatics 12, no. 3 (June 1, 2023): 1797–805. http://dx.doi.org/10.11591/eei.v12i3.5232.
Повний текст джерелаMarshall, David J. "Predatory and reproductive responses of the estuarine whelk Thais gradata (Caenogastropoda: Muricidae) to novel colonization by Musculista senhousia (Bivalvia: Mytilidae)." Journal of the Marine Biological Association of the United Kingdom 89, no. 7 (June 2, 2009): 1387–93. http://dx.doi.org/10.1017/s0025315409000642.
Повний текст джерелаHuang, Huihui, Xuyang Miao, Zehui Wu, and Qiang Wei. "An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network." Mathematical Problems in Engineering 2021 (February 2, 2021): 1–14. http://dx.doi.org/10.1155/2021/8811970.
Повний текст джерелаHori, Michio, Masanori Kohda, Satoshi Awata, and Satoshi Takahashi. "Dynamics of Laterality in Lake Tanganyika Scale-Eaters Driven by Cross-Predation." Symmetry 11, no. 1 (January 20, 2019): 119. http://dx.doi.org/10.3390/sym11010119.
Повний текст джерелаLeone, M., V. Lucini, D. D'Amico, F. Moschiano, C. Maltempo, F. Fraschini, and G. Bussone. "Twenty-Four-Hour Melatonin and Cortisol Plasma Levels in Relation to Timing of Cluster Headache." Cephalalgia 15, no. 3 (June 1995): 224–29. http://dx.doi.org/10.1046/j.1468-2982.1995.015003224.x.
Повний текст джерелаRégnière, Jacques, M. Lukas Seehausen, and Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 1: Tranosema rostrale (Hymenoptera: Ichneumonidae)." Forests 11, no. 8 (August 5, 2020): 846. http://dx.doi.org/10.3390/f11080846.
Повний текст джерелаLiu, Yufeng, Jianguo Kong, Xiuping Wang, and Gongbing Shan. "Biomechanical analysis of Yang’s spear turning-stab technique in Chinese martial arts." Physical Activity Review 8, no. 2 (2020): 16–22. http://dx.doi.org/10.16926/par.2020.08.17.
Повний текст джерелаQu, Zhengwei, Xinran Zhang, Yuchen Gao, Chao Peng, Yunjing Wang, and Popov Maxim Georgievitch. "Detection of False Data Injection Attack in AGC System Based on Random Forest." Machines 11, no. 1 (January 9, 2023): 83. http://dx.doi.org/10.3390/machines11010083.
Повний текст джерелаRégnière, Jacques, Rémi Saint-Amant, Jean-Claude Thireau, Pierre Therrien, Christian Hébert, and Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 2: Meteorus trachynotus (Hymenoptera: Braconidae)." Forests 12, no. 2 (January 28, 2021): 155. http://dx.doi.org/10.3390/f12020155.
Повний текст джерелаMironov, N. Yu, V. V. Vlodzyanovskiy, Yu A. Yuricheva, S. F. Sokolov, S. P. Golitsyn, L. V. Rosenstraukh, and E. I. Chazov. "Safety and Effectiveness of Electrical and Pharmacological Cardioversion in Persistent Atrial Fibrillation. Part 2: Assessment of Safety." Rational Pharmacotherapy in Cardiology 14, no. 6 (January 5, 2019): 826–30. http://dx.doi.org/10.20996/1819-6446-2018-14-6-826-830.
Повний текст джерелаBarenghi, Alessandro, Gioele Falcetti, and Gerardo Pelosi. "Locating Side Channel Leakage in Time through Matched Filters." Cryptography 6, no. 2 (May 30, 2022): 26. http://dx.doi.org/10.3390/cryptography6020026.
Повний текст джерелаAlfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.
Повний текст джерелаFujimura, T., Y. Takahagi, H. Nagashima, S. Miyagawa, T. Shigehisa, and H. Murakami. "33 PRODUCTION OF TRANSGENIC-CLONED PIGS CARRYING HDAF, GnT-III AND HETEROZYGOUSLY DISRUPTED ±-1,3-GALACTOSYLTRANSFERASE GENES." Reproduction, Fertility and Development 17, no. 2 (2005): 166. http://dx.doi.org/10.1071/rdv17n2ab33.
Повний текст джерелаQuadir, Md Abdul, J. Christy Jackson, J. Prassanna, K. Sathyarajasekaran, K. Kumar, H. Sabireen, Shivam Ubarhande, and V. Vijaya Kumar. "An efficient algorithm to detect DDoS amplification attacks." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.
Повний текст джерелаHe, Xing, and Michael S. Scordilis. "Efficiently Synchronized Spread-Spectrum Audio Watermarking with Improved Psychoacoustic Model." Research Letters in Signal Processing 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/251868.
Повний текст джерелаYeniçeri, Ramazan, Selçuk Kilinç, and Müştak E. Yalçin. "Attack on a Chaos-Based Random Number Generator Using Anticipating Synchronization." International Journal of Bifurcation and Chaos 25, no. 02 (February 2015): 1550021. http://dx.doi.org/10.1142/s0218127415500212.
Повний текст джерелаKlymiuk, N., A. Baehr, B. Kessler, M. Kurome, A. Wuensch, N. Herbach, R. Wanke, H. Nagashima, and E. Wolf. "425 HIGH-LEVEL EXPRESSION OF LEA29Y IN PANCREATIC ISLETS OF TRANSGENIC PIGS." Reproduction, Fertility and Development 22, no. 1 (2010): 370. http://dx.doi.org/10.1071/rdv22n1ab425.
Повний текст джерелаGupta, Tanvi, Sumit Kumar, Ankit Tomar, and KamalKant Verma. "DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks." International Journal of Security and Its Applications 10, no. 8 (August 31, 2016): 395–406. http://dx.doi.org/10.14257/ijsia.2016.10.8.35.
Повний текст джерелаPan, Shengyi, Thomas Morris, and Uttam Adhikari. "Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data." IEEE Transactions on Industrial Informatics 11, no. 3 (June 2015): 650–62. http://dx.doi.org/10.1109/tii.2015.2420951.
Повний текст джерелаKumar, Gulshan, Rahul Saha, Mandeep Singh, and Mritunjay Kumar Rai. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN." International Journal of Information Security and Privacy 12, no. 1 (January 2018): 53–62. http://dx.doi.org/10.4018/ijisp.2018010105.
Повний текст джерелаGupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, and Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids." Energies 14, no. 16 (August 12, 2021): 4941. http://dx.doi.org/10.3390/en14164941.
Повний текст джерелаSOLAK, ERCAN. "CRYPTANALYSIS OF OBSERVER BASED DISCRETE-TIME CHAOTIC ENCRYPTION SCHEMES." International Journal of Bifurcation and Chaos 15, no. 02 (February 2005): 653–58. http://dx.doi.org/10.1142/s0218127405012260.
Повний текст джерелаZhu, Baoshan, Jun Lei, and Shuliang Cao. "Numerical Simulation of Vortex Shedding and Lock-in Characteristics for a Thin Cambered Blade." Journal of Fluids Engineering 129, no. 10 (April 28, 2007): 1297–305. http://dx.doi.org/10.1115/1.2776964.
Повний текст джерелаLegett, Henry D., Ikkyu Aihara, and X. E. Bernal. "The dual benefits of synchronized mating signals in a Japanese treefrog: attracting mates and manipulating predators." Philosophical Transactions of the Royal Society B: Biological Sciences 376, no. 1835 (August 23, 2021): 20200340. http://dx.doi.org/10.1098/rstb.2020.0340.
Повний текст джерелаYoussef, El-Nasser S., Fabrice Labeau, and Marthe Kassouf. "Detection of Load-Altering Cyberattacks Targeting Peak Shaving Using Residential Electric Water Heaters." Energies 15, no. 20 (October 21, 2022): 7807. http://dx.doi.org/10.3390/en15207807.
Повний текст джерелаSang, D.-K., and M.-J. Tahk. "Guidance law switching logic considering the seeker's field-of-view limits." Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering 223, no. 8 (August 1, 2009): 1049–58. http://dx.doi.org/10.1243/09544100jaero614.
Повний текст джерелаRadziukevich, M. L. "A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks." «System analysis and applied information science», no. 3 (October 4, 2021): 51–58. http://dx.doi.org/10.21122/2309-4923-2021-3-51-58.
Повний текст джерелаGopinath, S., A. Pillai, A. G. Diwan, J. V. Pattisapu, and K. Radhakrishnan. "Reiterating the role of corpus callosum in generalization of interictal and ictal epileptiform discharges: a case report with post-callosotomy intracranial electroencephalography in Lennox–Gastaut syndrome." Epilepsy and paroxysmal conditions 13, no. 3 (October 29, 2021): 249–53. http://dx.doi.org/10.17749/2077-8333/epi.par.con.2021.086.
Повний текст джерела