Academic literature on the topic 'Activity of attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Activity of attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Activity of attack"
Adhana, Finandito, and I. Ketut Gede Suhartana. "Deteksi Serangan Denial of Service di Situs Web dengan Wireshark Menggunakan Metode IDS Berbasis Anomali." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 375. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p02.
Full textOuchani, Samir, and Gabriele Lenzini. "Generating attacks in SysML activity diagrams by detecting attack surfaces." Journal of Ambient Intelligence and Humanized Computing 6, no. 3 (March 18, 2015): 361–73. http://dx.doi.org/10.1007/s12652-015-0269-8.
Full textD'Andrea, Giovanni, Antonio R. Cananzi, Moreno Toldo, and Francesco Ferro-Milone. "Platelet Activity in Cluster Headache." Cephalalgia 6, no. 3 (September 1986): 163–67. http://dx.doi.org/10.1046/j.1468-2982.1986.0603163.x.
Full textTsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.
Full textSheleme, Mihret, and R. Rajesh Sharma. "Cyber-attack and Measuring its Risk." IRO Journal on Sustainable Wireless Systems 3, no. 4 (December 29, 2021): 219–25. http://dx.doi.org/10.36548/jsws.2021.4.002.
Full textHambach, Anke, Stefan Evers, Oliver Summ, Ingo W. Husstedt, and Achim Frese. "The impact of sexual activity on idiopathic headaches: An observational study." Cephalalgia 33, no. 6 (February 19, 2013): 384–89. http://dx.doi.org/10.1177/0333102413476374.
Full textBruni, O., PM Russo, C. Violani, and V. Guidetti. "Sleep and Migraine: An Actigraphic Study." Cephalalgia 24, no. 2 (February 2004): 134–39. http://dx.doi.org/10.1111/j.1468-2982.2004.00657.x.
Full textImaizumi, Mitsuhiro, and Mitsutaka Kimura. "Reliability Evaluation of a Server System Considering Signature Update." International Journal of Reliability, Quality and Safety Engineering 28, no. 01 (June 30, 2020): 2150003. http://dx.doi.org/10.1142/s0218539321500030.
Full textJitprapaikulsan, Jiraporn, James P. Fryer, Masoud Majed, Carin Y. Smith, Sarah M. Jenkins, Philippe Cabre, Shannon R. Hinson, et al. "Clinical utility of AQP4-IgG titers and measures of complement-mediated cell killing in NMOSD." Neurology - Neuroimmunology Neuroinflammation 7, no. 4 (May 28, 2020): e727. http://dx.doi.org/10.1212/nxi.0000000000000727.
Full textBabar, Sachin D., Neeli R. Neeli R, and Ramjee Prasad. "Activity Modelling and Countermeasures on Jamming Attack." Journal of Cyber Security and Mobility 2, no. 1 (2013): 1–23. http://dx.doi.org/10.13052/jcsm2245-1439.211.
Full textDissertations / Theses on the topic "Activity of attack"
Meela, Moraba Macdonald. "Evaluation of alien invasive weedy plants for activity against plant pathogenic fungi." Diss., University of Pretoria, 2009. http://hdl.handle.net/2263/23195.
Full textDissertation (MSc (Veterinary Science))--University of Pretoria, 2008.
Paraclinical Sciences
unrestricted
Smith, Kelly Lynne. "Individual Differences in Activity and Responses to a Predator Attack in Juvenile Smallmouth Bass (Micropterus Dolomieui)." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1182192767.
Full textSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Full textXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Quilliam, Richard S. "The role of cell wall invertase activity in source-sink relations in vegetative tissues of Arabidopsis thaliana and in response to wounding and pathogen attack." Thesis, University of Sheffield, 2007. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.752717.
Full textPalm, Emelie, and Sara Josefsson. "Fysisk aktivitet, rörelserädsla och livskvalitet hos individer som genomgått hjärtinfarkt och/eller hjärtoperation." Thesis, Uppsala universitet, Fysioterapi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-337629.
Full textBajan, Pierre-Marie. "Simulation d'activités et d'attaques : application à la cyberdéfense." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL014/document.
Full textThe concern over the security of the infrastructure of a company is only growing deeper and became a source of worries for companies. They use different systems to detect and deal with attack but those systems are usually made to detect one type only of the two main type of attack: attacks made to target the largest amount of people possible. Targeted attacks are rarer but more dangerous as it penetrates deep into a system and are very specifics. However the systems used to deal with it are proved of limited efficiency. Even when they send alerts and news to the operator, there is just to much information going along with it making the often ill-trained operators unable to react and overwhelm by massive information. The goal of this thesis is to create a tool that would help to form operator but also help to test more efficiently security systems. We'll approach the problem by first emulating the infrastructure and services of a small company with its different users and services. It will be use to create the data of the regular operations and interactions of a company during normal activity but also under attack. Once the system is emulated and we collected the necessary data, we will start to simulate the system according to what we need the simulation for. This simulation would need less resources than the emulation and will be scalable and capable to be dynamically change according to the needs. The aim is to have a light tool capable to simulate different behaviors and different type of realist simulation of a system to help improve the formation of operators and also test security devices more fully. The whole would be supervised by a console of control of the simulation who will receive the information of the simulated elements and the simulated operator console. It would have the capacity to create incidents and problems into the systems along with attacks
Hammi, Badis. "Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0023/document.
Full textCurrently, cloud computing is a flexible and cost-effective solution widely adopted for the large-scale production of IT services. However, beyond a main legitimate usage, malicious users take advantage of these features in order to get a ready-to-use attack platform, offering a massive power. Among the greatest beneficiaries of this cloud conversion into an attack support, botclouds are used to perpetrate Distributed Denial of Service (DDoS) attacks toward any third party connected to the Internet.Although such attacks, when perpetrated by botnets, have been extensively studied in the past, their operations and their implementation context are different herein and thus require new solutions. In order to achieve such a goal, we propose in the thesis work presented in this manuscript, a distributed approach for a source-based detection of DDoS attacks perpetrated by virtual machines hosted in a public cloud. Firstly, we present an experimental study that consists in the implementation of two botclouds in a real deployment environment hosting a legitimate workload. The analysis of the collected data allows the deduction of behavioural invariants that form the basis of a signature based detection system. Then, we present in the following a detection system based on the identification of principal components of the deployed botclouds. Finally, in order to deal with the scalability issues, we propose a distributed solution of our detection system, which relies on a mesh peer-to- peer architecture resulting from the overlap of several overlay trees
Ocampo, Mascaró Javier, Salazar Vera Jimena Silva, and Costa Bullón Abilio da. "Correlación entre conocimientos sobre consecuencias de la obesidad y grado de actividad física en universitarios." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2015. http://hdl.handle.net/10757/621624.
Full textLiao, Zhe Hui, and 廖哲輝. "A Method to Defend Against Activity Hijacking Attack by Using Shared-memory Side Channel." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/6vy494.
Full textБігун, Олеся Вікторівна. "Еколого-фауністичні особливості родини Culicidae у Херсонській області." Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/4175.
Full textUA : Робота виконана на 73 сторінках, 26 рисунки, 2 таблиці, 58 літературних джерел, з них 6 іноземною мовою. Об’єкт дослідження: кровосисні комарі Херсонської області. Предмет дослідження: еколого-фауністичні особливості родини Culicidae. Методи дослідження: загальноприйняті ентомологічні методи збору, лабораторного аналізу та статистичної обробки. Метою кваліфікаційної роботи було вивчення еколого-фауністичні особливості родини Culicidae Херсонської області. Теоретично та експериментально визначено: видовий склад кровосисних комарів та їх масовість, домінуючі види кровосисних комарів, сезонну та річну динаміку чисельності комарів, профілактичні заходи щодо зменшення чисельності кровосисних комарів. Новизна та актуальність досліджень полягає у тому, що подібні дослідження дозволять прогнозувати поширення кровосисними комарами небезпечних трансмісивних захворювань у Херсонській області. Значущість роботи полягає в тому, що отримані результати можуть будь використані ентомологами районних, міських санітарно-епідеміологічними станціями для ефективного проведення заходів з обмеження чисельності кровосисних комарів на території Херсонської області.
EN : Work is executed on 73 pages, 26 рисунки, 2 tables, 58 literary sources, from them 6 by a foreign language. The object of the research is bloodsucking mosquitoes of the Kherson area. The subject of the study is ecologo-faunistic features of family of Culicidae. Research methods: the generally accepted methods of entomologist of collection, labtest and statistical treatment. The purpose of the qualification work is a study ecologo-faunistic features of family of Culicidae of the Kherson area. Theoretically and experimentally determined: specific composition of bloodsucking mosquitoes and their mass character, dominant types of bloodsucking mosquitoes, seasonal and annual dynamics of quantity of mosquitoes, prophylactic measures in relation to reduction to the quantity of bloodsucking mosquitoes. A novelty and actuality of researches consist in that similar researches will allow to forecast distribution of dangerous трансмісивних diseases bloodsucking mosquitoes in the Kherson area. Meaningfulness of work consists in that the got results can be used by the entomologists of district, municipal the санітарно-епідеміологічними stations for effective realization of measures on the limit of quantity of bloodsucking mosquitoes on territory of the Kherson area.
Books on the topic "Activity of attack"
Brown, Kevin. Mass attack: A short novel. Peterborough: First & Best in Education, 1995.
Find full textShah, Alpa. Savage attack: Tribal insurgency in India. New Delhi: Social Science Press, 2014.
Find full textGlobal economic crisis and attack on working class: A document containing thousands of facts, reasons, reports, statistics, analysis, inferences and solutions on global economic crisis. Kolkata: Breehi Prakashani & Sirs Publication, 2014.
Find full textBaryshnikov, Nikolay. Fundamentals of professional intercultural communication. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1391408.
Full textLutherer, Lorenz Otto. Targeted: The anatomy of an animal rights attack. Norman: University of Oklahoma Press, 1992.
Find full textSimon, Yves René Marie. The Ethiopian campaign and French political thought. Notre Dame, Ind: University of Notre Dame Press, 2009.
Find full textThe Ethiopian campaign and French political thought. Notre Dame, Ind: University of Notre Dame Press, 2009.
Find full textSimon, Yves René Marie. The Ethiopian campaign and French political thought. Notre Dame, Ind: University of Notre Dame Press, 2009.
Find full text1943-, Gamble Michael, ed. Making sense of senselessness. Boston: McGraw-Hill, 2002.
Find full textBook chapters on the topic "Activity of attack"
Pedras, M. Soledade C. "Fungal Attack and Cruciferous Defenses: Tricking Plant Pathogens." In The Biological Activity of Phytochemicals, 127–39. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-1-4419-7299-6_9.
Full textDeBusk, Robert F. "Risk of Heart Attack After Sexual Activity." In Heart Disease and Erectile Dysfunction, 279–88. Totowa, NJ: Humana Press, 2004. http://dx.doi.org/10.1007/978-1-59259-748-2_18.
Full textHostiadi, Dandy Pramana, Tohari Ahmad, and Waskitho Wibisono. "A New Approach to Detecting Bot Attack Activity Scenario." In Advances in Intelligent Systems and Computing, 823–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73689-7_78.
Full textMiu, TungNgai, Chenxu Wang, Daniel Xiapu Luo, and Jinhe Wang. "Modeling User Browsing Activity for Application Layer DDoS Attack Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 747–50. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59608-2_42.
Full textSeveau, Stephanie. "Multifaceted Activity of Listeriolysin O, the Cholesterol-Dependent Cytolysin of Listeria monocytogenes." In MACPF/CDC Proteins - Agents of Defence, Attack and Invasion, 161–95. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8881-6_9.
Full textGauld, Nicola. "‘I attack this work of art deliberately’." In Museum Activism, 369–79. Abingdon, Oxon ; New York, NY : Routledge, 2019. | Series: Museum meanings: Routledge, 2019. http://dx.doi.org/10.4324/9781351251044-35.
Full textTasmin, Mahbuba, Sharif Uddin Ruman, Taoseef Ishtiak, Arif-ur-Rahman Chowdhury Suhan, Redwan Hasif, Shahnawaz Zulminan, and Rashedur M. Rahman. "Assessment of Deep Learning Models for Human Activity Recognition on Multi-variate Time Series Data and Non-targeted Adversarial Attack." In Advances in Intelligent Systems Research and Innovation, 129–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78124-8_6.
Full textScheaffer, Richard L., Ann Watkins, Mrudulla Gnanadesikan, and Jeffrey A. Witmer. "Application: Does Aspirin Help Prevent Heart Attacks? The Physician’s Health Study." In Activity-Based Statistics, 238–43. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4757-3843-8_52.
Full textFrediani, Emiliano. "Variazioni in tema di linguaggio e giustizia amministrativa di fronte al regime." In Studi e saggi, 73–98. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-455-7.03.
Full textStockemer, Daniel. "The Trajectory of Attac France." In The Micro and Meso Levels of Activism, 77–99. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137264329_5.
Full textConference papers on the topic "Activity of attack"
Chen, Xihui, Andrzej Mizera, and Jun Pang. "Activity tracking: A new attack on location privacy." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346806.
Full textYang, Li, Teng Wei, Jianfeng Ma, Shui Yu, and Chao Yang. "Inference Attack in Android Activity based on Program Fingerprint." In 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018. http://dx.doi.org/10.1109/cns.2018.8433169.
Full textTøndel, Inger Anne, Jostein Jensen, and Lillian Røstad. "Combining Misuse Cases with Attack Trees and Security Activity Models." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.101.
Full textHekmati, Arvin, Eugenio Grippo, and Bhaskar Krishnamachari. "Large-scale Urban IoT Activity Data for DDoS Attack Emulation." In SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485730.3493695.
Full textSrinivasan, Vijay, John Stankovic, and Kamin Whitehouse. "Protecting your daily in-home activity information from a wireless snooping attack." In the 10th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1409635.1409663.
Full textLin, Yen-Chen, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, and Min Sun. "Tactics of Adversarial Attack on Deep Reinforcement Learning Agents." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/525.
Full textTakemori, Kazuya, Dennis Arturo Ludeña Romaña, Shinichiro Kubota, Kenichi Sugitani, and Yasuo Musashi. "Detection of NS Resource Record Based DNS Query Request Packet Traffic and SSH Dictionary Attack Activity." In 2009 Second International Conference on Intelligent Networks and Intelligent Systems (ICINIS). IEEE, 2009. http://dx.doi.org/10.1109/icinis.2009.69.
Full textLöfdahl, Jan-Olof. "Cost Effective Maintenance of Gas Turbine Machinery in Swedish Navy Fast Surface Attack Ships." In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-148.
Full textRomero, Maximiliano, Giuseppe Andreoni, and Silvia Piardi. "Sailing as Stroke Rehabilitation Strategy." In Applied Human Factors and Ergonomics Conference. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe100726.
Full textTeshima, G., R. Harris, R. Keck, A. Meunier, J. Burnier, and B. Keyt. "CHARACTERIZATION OF LIMITED PROTEOLYTIC DIGESTS OF TISSUE PLASMINOGEN ACTIVATOR." In XIth International Congress on Thrombosis and Haemostasis. Schattauer GmbH, 1987. http://dx.doi.org/10.1055/s-0038-1644375.
Full textReports on the topic "Activity of attack"
Prusky, Dov, Noel T. Keen, and Stanley Freeman. Elicitation of Preformed Antifungal Compounds by Non-Pathogenic Fungus Mutants and their Use for the Prevention of Postharvest Decay in Avocado Fruits. United States Department of Agriculture, January 1996. http://dx.doi.org/10.32747/1996.7570573.bard.
Full textAhern, Kenneth. The Importance of Psychology in Economic Activity: Evidence from Terrorist Attacks. Cambridge, MA: National Bureau of Economic Research, February 2018. http://dx.doi.org/10.3386/w24331.
Full textAvni, Adi, and Kirankumar S. Mysore. Functional Genomics Approach to Identify Signaling Components Involved in Defense Responses Induced by the Ethylene Inducing Xyalanase Elicitor. United States Department of Agriculture, December 2009. http://dx.doi.org/10.32747/2009.7697100.bard.
Full textRyan, Mark David, Greg Hearn, Marion McCutcheon, Stuart Cunningham, and Katherine Kirkwood. Australian Cultural and Creative Activity: A Population and Hotspot Analysis: Albany and Denmark. Queensland University of Technology, September 2021. http://dx.doi.org/10.5204/rep.eprints.213126.
Full textPrusky, Dov, Lisa Vaillancourt, and Robert Fluhr. Host Ammonification by Postharvest Pathogens and its Contribution to Fungal Colonization and Symptom Development. United States Department of Agriculture, December 2006. http://dx.doi.org/10.32747/2006.7592640.bard.
Full textKerrigan, Susan, Phillip McIntyre, and Marion McCutcheon. Australian Cultural and Creative Activity: A Population and Hotspot Analysis: Bendigo. Queensland University of Technology, 2020. http://dx.doi.org/10.5204/rep.eprints.206968.
Full textSessa, Guido, and Gregory B. Martin. molecular link from PAMP perception to a MAPK cascade associated with tomato disease resistance. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597918.bard.
Full textKeinan, Ehud. Asian Chemists speak with one voice. AsiaChem Magazine, November 2020. http://dx.doi.org/10.51167/acm00001.
Full textBELENIUK, VASILY. INFLUENCE OF EDUCATIONAL MEASURES ON INCREASING THE INTEREST OF YOUTH IN SCIENTIFIC ACTIVITIES, ON THE EXAMPLE OF IMPLEMENTATION OF THE “SCHOOL OF YOUNG SCIENTISTS”. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2658-4034-2021-12-1-2-33-40.
Full textThomas, Catherine, and Lynne Koontz. 2020 national park visitor spending effects: Economic contributions to local communities, states, and the nation. National Park Service, May 2021. http://dx.doi.org/10.36967/nrr-2286547.
Full text