Journal articles on the topic 'Activity of attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Activity of attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Adhana, Finandito, and I. Ketut Gede Suhartana. "Deteksi Serangan Denial of Service di Situs Web dengan Wireshark Menggunakan Metode IDS Berbasis Anomali." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 375. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p02.
Full textOuchani, Samir, and Gabriele Lenzini. "Generating attacks in SysML activity diagrams by detecting attack surfaces." Journal of Ambient Intelligence and Humanized Computing 6, no. 3 (March 18, 2015): 361–73. http://dx.doi.org/10.1007/s12652-015-0269-8.
Full textD'Andrea, Giovanni, Antonio R. Cananzi, Moreno Toldo, and Francesco Ferro-Milone. "Platelet Activity in Cluster Headache." Cephalalgia 6, no. 3 (September 1986): 163–67. http://dx.doi.org/10.1046/j.1468-2982.1986.0603163.x.
Full textTsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.
Full textSheleme, Mihret, and R. Rajesh Sharma. "Cyber-attack and Measuring its Risk." IRO Journal on Sustainable Wireless Systems 3, no. 4 (December 29, 2021): 219–25. http://dx.doi.org/10.36548/jsws.2021.4.002.
Full textHambach, Anke, Stefan Evers, Oliver Summ, Ingo W. Husstedt, and Achim Frese. "The impact of sexual activity on idiopathic headaches: An observational study." Cephalalgia 33, no. 6 (February 19, 2013): 384–89. http://dx.doi.org/10.1177/0333102413476374.
Full textBruni, O., PM Russo, C. Violani, and V. Guidetti. "Sleep and Migraine: An Actigraphic Study." Cephalalgia 24, no. 2 (February 2004): 134–39. http://dx.doi.org/10.1111/j.1468-2982.2004.00657.x.
Full textImaizumi, Mitsuhiro, and Mitsutaka Kimura. "Reliability Evaluation of a Server System Considering Signature Update." International Journal of Reliability, Quality and Safety Engineering 28, no. 01 (June 30, 2020): 2150003. http://dx.doi.org/10.1142/s0218539321500030.
Full textJitprapaikulsan, Jiraporn, James P. Fryer, Masoud Majed, Carin Y. Smith, Sarah M. Jenkins, Philippe Cabre, Shannon R. Hinson, et al. "Clinical utility of AQP4-IgG titers and measures of complement-mediated cell killing in NMOSD." Neurology - Neuroimmunology Neuroinflammation 7, no. 4 (May 28, 2020): e727. http://dx.doi.org/10.1212/nxi.0000000000000727.
Full textBabar, Sachin D., Neeli R. Neeli R, and Ramjee Prasad. "Activity Modelling and Countermeasures on Jamming Attack." Journal of Cyber Security and Mobility 2, no. 1 (2013): 1–23. http://dx.doi.org/10.13052/jcsm2245-1439.211.
Full textWei, Baodian, Dongsu Liu, and Xinmei Wang. "Activity attack on reduced variants of Rijndael." Journal of Electronics (China) 21, no. 4 (July 2004): 314–21. http://dx.doi.org/10.1007/bf02687887.
Full textIonescu-Tirgovisti, Constantin, and Simion Pruna. "Peripheral sympathetic activity during a migraine attack." Lancet 338, no. 8774 (October 1991): 1084–85. http://dx.doi.org/10.1016/0140-6736(91)91945-q.
Full textSiregar, Junita Juwita. "Analisis Explotasi Keamanan Web Denial of Service Attack." ComTech: Computer, Mathematics and Engineering Applications 4, no. 2 (December 1, 2013): 1199. http://dx.doi.org/10.21512/comtech.v4i2.2597.
Full textChuang, Yao-Li, Noam Ben-Asher, and Maria R. D’Orsogna. "Local alliances and rivalries shape near-repeat terror activity of al-Qaeda, ISIS, and insurgents." Proceedings of the National Academy of Sciences 116, no. 42 (September 30, 2019): 20898–903. http://dx.doi.org/10.1073/pnas.1904418116.
Full textMorveli-Espinoza, Mariela, Juan Carlos Nieves, and Cesar Augusto Tacla. "Handling temporality in human activity reasoning." Journal of Intelligent & Fuzzy Systems 42, no. 5 (March 31, 2022): 4387–98. http://dx.doi.org/10.3233/jifs-219229.
Full textPooley, Simon, Hannes Botha, Xander Combrink, and George Powell. "Synthesizing Nile crocodile Crocodylus niloticus attack data and historical context to inform mitigation efforts in South Africa and eSwatini (Swaziland)." Oryx 54, no. 5 (July 11, 2019): 629–38. http://dx.doi.org/10.1017/s0030605318001102.
Full textViswanathan, Ganesh, and Prabhu J. "A hybrid threat model for system-centric and attack-centric for effective security design in SDLC." Web Intelligence 19, no. 1-2 (December 3, 2021): 1–11. http://dx.doi.org/10.3233/web-210452.
Full textSubroto, Gatot, Dwi Erwin Kusbianto, Sholeh Avivi, Slameto Slameto, and Setiyono Setiyono. "Correlation Between Secondary Metabolites of Leaf and the Resistance to Leaf Rust (Hemileia vastatrix) on Several Arabica Coffee Clones." Ilmu Pertanian (Agricultural Science) 4, no. 2 (August 16, 2019): 71. http://dx.doi.org/10.22146/ipas.42124.
Full textShaper, A. G., G. Wannamethee, and M. Walker. "Physical activity, hypertension and risk of heart attack." Atherosclerosis 97, no. 2-3 (December 1992): 234. http://dx.doi.org/10.1016/0021-9150(92)90152-7.
Full textOliveira, José, Pedro Pinto, and Henrique Santos. "Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices." Journal of Sensor and Actuator Networks 10, no. 1 (March 2, 2021): 19. http://dx.doi.org/10.3390/jsan10010019.
Full textRaj Panakadan, Rusheel, Chitluri Dhanush, and Dr Carmel Mary Belinda. "An effective solution for DDOS attack." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 194. http://dx.doi.org/10.14419/ijet.v7i1.7.10650.
Full textte Velde, Henk. "‘Parasitische politiek’ : Thorbecke en de persoonlijke aanval in de Nederlandse Tweede Kamer." Tijdschrift voor Taalbeheersing 42, no. 2 (July 1, 2020): 129–45. http://dx.doi.org/10.5117/tvt2020.2.003.teve.
Full textPurba, Mufria J., and Arif Gunawan Putra Simanjuntak. "PENGAMANAN MIKROTIK ROUTERBOARD DARI SERANGAN KEAMANAN DENGAN NOTIFIKASI BOT TELEGRAM." Majalah Ilmiah METHODA 11, no. 3 (December 31, 2021): 241–46. http://dx.doi.org/10.46880/methoda.vol11no3.pp241-246.
Full textMokhtari, Sohrab, Alireza Abbaspour, Kang K. Yen, and Arman Sargolzaei. "A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data." Electronics 10, no. 4 (February 8, 2021): 407. http://dx.doi.org/10.3390/electronics10040407.
Full textPETRICĂ, Gabriel, and Ioan-Cosmin MIHAI. "Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees." International Journal of Information Security and Cybercrime 9, no. 1 (June 22, 2020): 37–42. http://dx.doi.org/10.19107/ijisc.2020.01.05.
Full textCoppola, Gianluca, Martina Bracaglia, Davide Di Lenola, Elisa Iacovelli, Cherubino Di Lorenzo, Mariano Serrao, Maurizio Evangelista, Vincenzo Parisi, Jean Schoenen, and Francesco Pierelli. "Lateral inhibition in the somatosensory cortex during and between migraine without aura attacks: Correlations with thalamocortical activity and clinical features." Cephalalgia 36, no. 6 (October 6, 2015): 568–78. http://dx.doi.org/10.1177/0333102415610873.
Full textFerooz, Faria, Malik Tahir Hassan, Mazhar Javed Awan, Haitham Nobanee, Maryam Kamal, Awais Yasin, and Azlan Mohd Zain. "Suicide Bomb Attack Identification and Analytics through Data Mining Techniques." Electronics 10, no. 19 (September 30, 2021): 2398. http://dx.doi.org/10.3390/electronics10192398.
Full textRossi, LN, I. Cortinovis, L. Menegazzo, S. Menini, and V. Carnelli. "Behaviour During Attacks and Assessment of Intensity in Primary Headaches of Children and Adolescents." Cephalalgia 26, no. 2 (February 2006): 107–12. http://dx.doi.org/10.1111/j.1468-2982.2005.01000.x.
Full textDas, Abhijit, and Neeraj N. Baheti. "Limb‑shaking transient ischemic attack." Journal of Neurosciences in Rural Practice 04, no. 01 (January 2013): 55–56. http://dx.doi.org/10.4103/0976-3147.105615.
Full textLim, Hyo-young, Wan-ju Kim, Hong-jun Noh, and Jae-sung Lim. "Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups." Journal of Korean Institute of Communications and Information Sciences 42, no. 1 (January 31, 2017): 193–204. http://dx.doi.org/10.7840/kics.2017.42.1.193.
Full textBuresh, Donald L. "Russian Cyber-Attacks on Estonia, Georgia, and Ukraine, Including Tactics, Techniques, Procedures, and Effects." Journal of Advanced Forensic Sciences 1, no. 2 (August 19, 2021): 15–26. http://dx.doi.org/10.14302/issn.2692-5915.jafs-21-3930.
Full textWan, Runze, Lixin Ding, Naixue Xiong, and Xing Zhou. "Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987064. http://dx.doi.org/10.1177/1550147719870645.
Full textТецкий, Артём Григорьевич. "ПРИМЕНЕНИЕ ДЕРЕВЬЕВ АТАК ДЛЯ ОЦЕНИВАНИЯ ВЕРОЯТНОСТИ УСПЕШНОЙ АТАКИ WEB-ПРИЛОЖЕНИЯ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 3 (October 30, 2018): 74–79. http://dx.doi.org/10.32620/reks.2018.3.08.
Full textSarchielli, P., A. Floridi, ML Mancini, C. Rossi, F. Coppola, A. Baldi, LA Pini, and P. Calabresi. "NF-κB Activity and iNOS Expression in Monocytes from Internal Jugular Blood of Migraine Without Aura Patients During Attacks." Cephalalgia 26, no. 9 (September 2006): 1071–79. http://dx.doi.org/10.1111/j.1468-2982.2006.01164.x.
Full textde Tommaso, M., V. Sciruicchio, M. Guido, G. Sasanelli, LM Specchio, and FM Puca. "EEG Spectral Analysis in Migraine Without Aura Attacks." Cephalalgia 18, no. 6 (August 1998): 324–28. http://dx.doi.org/10.1046/j.1468-2982.1998.1806324.x.
Full textMedeiros, Ane H., Flávia P. Franco, Juliana L. Matos, Patrícia A. de Castro, Ludier K. Santos-Silva, Flávio Henrique-Silva, Gustavo H. Goldman, Daniel S. Moura, and Marcio C. Silva-Filho. "Sugarwin: A Sugarcane Insect-Induced Gene with Antipathogenic Activity." Molecular Plant-Microbe Interactions® 25, no. 5 (May 2012): 613–24. http://dx.doi.org/10.1094/mpmi-09-11-0254.
Full textCan Bostan, Ozge, Gulseren Tuncay, Ebru Damadoglu, Gul Karakaya, and Ali Fuat Kalyoncu. "Effect of COVID-19 on hereditary angioedema activity and quality of life." Allergy and Asthma Proceedings 42, no. 5 (September 1, 2021): 403–8. http://dx.doi.org/10.2500/aap.2021.42.210066.
Full textRachma, Aida Fahira, Anang Endaryanto, Deasy Fetarayani, and Retno Asih Setyoningrum. "Exclusive Breastfeeding Duration and Allergic Asthma Severity in Children." Jurnal Respirasi 7, no. 3 (September 30, 2021): 106. http://dx.doi.org/10.20473/jr.v7-i.3.2021.106-113.
Full textITO, Daiki, Kenta NOMURA, Masaki KAMIZONO, Yoshiaki SHIRAISHI, Yasuhiro TAKANO, Masami MOHRI, and Masakatu MORII. "Modeling Attack Activity for Integrated Analysis of Threat Information." IEICE Transactions on Information and Systems E101.D, no. 11 (November 1, 2018): 2658–64. http://dx.doi.org/10.1587/transinf.2017icp0015.
Full textShaper, A. G., G. Wannamethee, and M. Walker. "20 Physical activity, hypertension and risk of heart attack." Journal of Hypertension 10, no. 11 (November 1992): 1434–35. http://dx.doi.org/10.1097/00004872-199211000-00035.
Full textYang, Li, Yifang Zhi, Teng Wei, Shui Yu, and Jianfeng Ma. "Inference attack in Android Activity based on program fingerprint." Journal of Network and Computer Applications 127 (February 2019): 92–106. http://dx.doi.org/10.1016/j.jnca.2018.12.007.
Full textKuritzky, A., Y. Zoldan, R. Hering, and E. Stoupel. "Geomagnetic Activity and the Severity of the Migraine Attack." Headache: The Journal of Head and Face Pain 27, no. 2 (February 1987): 87–89. http://dx.doi.org/10.1111/j.1526-4610.1987.hed2702087.x.
Full textSaxena, Sahaj, Sajal Bhatia, and Rahul Gupta. "Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey." Designs 5, no. 3 (August 4, 2021): 52. http://dx.doi.org/10.3390/designs5030052.
Full textShinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.
Full textHagedorn, Andreas, Agneta Snoer, Rigmor Jensen, Bryan Haddock, and Mads Barloese. "The spectrum of cluster headache: A case report of 4600 attacks." Cephalalgia 39, no. 9 (March 26, 2019): 1134–42. http://dx.doi.org/10.1177/0333102419833081.
Full textMarta, I. Komang Krisna Ade, I. Nyoman Buda Hartawan, and I. Kadek Susila Satwika. "ANALISIS SISTEM MONITORING KEAMANAN SERVER DENGAN SMS ALERT BERBASIS SNORT." INSERT : Information System and Emerging Technology Journal 1, no. 1 (June 25, 2020): 25. http://dx.doi.org/10.23887/insert.v1i1.25874.
Full textGöbel, H., S. Krapat, M. Dworschak, D. Heuss, FBM Ensink, and D. Soyka. "Exteroceptive Suppression of Temporalis Muscle Activity During Migraine Attack and Migraine Interval Before and After Treatment with Sumatriptan." Cephalalgia 14, no. 2 (April 1994): 143–48. http://dx.doi.org/10.1046/j.1468-2982.1994.1402143.x.
Full textDrahuntsov, Roman, and Dmytro Rabchun. "POTENTIAL DISGUISING ATTACK VECTORS ON SECURITY OPERATION CENTERS AND SIEM SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 14 (2021): 6–14. http://dx.doi.org/10.28925/2663-4023.2021.14.614.
Full textBoucher, Jonathan, Christian Hébert, and Eric Bauce. "A flexible approach for predicting and mapping postfire wood borer attacks in black spruce and jack pine forests using the differenced normalized burn ratio (dNBR)." Canadian Journal of Forest Research 50, no. 9 (September 2020): 880–89. http://dx.doi.org/10.1139/cjfr-2019-0334.
Full textBerek, Klaus, Gabriel Bsteh, Michael Auer, Franziska Di Pauli, Astrid Grams, Dejan Milosavljevic, Paulina Poskaite, et al. "Kappa-Free Light Chains in CSF Predict Early Multiple Sclerosis Disease Activity." Neurology - Neuroimmunology Neuroinflammation 8, no. 4 (May 28, 2021): e1005. http://dx.doi.org/10.1212/nxi.0000000000001005.
Full text