Journal articles on the topic 'Attack and defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack and defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Full textK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Full textSiame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.
Full textGao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.
Full textKUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.
Full textAsabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.
Full textJurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.
Full textAkintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.
Full textLi, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.
Full textLi, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.
Full textCharreire, J., and C. Bedin. "Hypothesis: Autoimmunity: Attack or Defence?" Autoimmunity 3, no. 1 (1989): 75–79. http://dx.doi.org/10.3109/08916938909043615.
Full textGat, Azar. "Clausewitz on defence and attack." Journal of Strategic Studies 11, no. 1 (1988): 20–26. http://dx.doi.org/10.1080/01402398808437327.
Full textFordham, J. "Sham trusts: attack and defence." Trusts & Trustees 11, no. 8 (2005): 19–22. http://dx.doi.org/10.1093/tandt/11.8.19.
Full textLi, Zhe, Jin Liu, Yibo Dong, Jiaqi Ren, and Weili Li. "Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks." Entropy 25, no. 11 (2023): 1558. http://dx.doi.org/10.3390/e25111558.
Full textHaroon, Muhammad Shahzad, and Husnain Mansoor Ali. "Ensemble adversarial training based defense against adversarial attacks for machine learning-based intrusion detection system." Neural Network World 33, no. 5 (2023): 317–36. http://dx.doi.org/10.14311/nnw.2023.33.018.
Full textSkelhorn, John, and Candy Rowe. "Frequency-dependent taste-rejection by avian predation may select for defence chemical polymorphisms in aposematic prey." Biology Letters 1, no. 4 (2005): 500–503. http://dx.doi.org/10.1098/rsbl.2005.0359.
Full textYao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.
Full textU., Sakthivelu, and Vinoth Kumar C.N.S. "Defence Mechanism against Advanced Persistent Threat Attack Using Significant Features based Deep Learning Model." Journal of Internet Services and Information Security 14, no. 4 (2024): 263–77. https://doi.org/10.58346/jisis.2024.i4.016.
Full textAbimbola, Olamide, and Olayinka Oduola Idris. "A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review." Path of Science 11, no. 3 (2025): 4009. https://doi.org/10.22178/pos.115-11.
Full textPatel, Raj Kumar, Dr Lalan Kumar Singh, and Dr Narendra Kumar. "Literature Review of Distributed: Denial of Service Attack Protection." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1032–36. http://dx.doi.org/10.22214/ijraset.2023.48673.
Full textWu, Di, Xiangbin Yan, Rui Peng, and Shaomin Wu. "Optimal defence-attack strategies between one defender and two attackers." Journal of the Operational Research Society 71, no. 11 (2019): 1830–46. http://dx.doi.org/10.1080/01605682.2019.1630332.
Full textTaylor, Sean Joe, Farhan Ahmad, Hoang Nga Nguyen, and Siraj Ahmed Shaikh. "Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges." Sensors 23, no. 1 (2022): 134. http://dx.doi.org/10.3390/s23010134.
Full textDe Dreu, Carsten K. W., Ruthie Pliskin, Michael Rojek-Giffin, Zsombor Méder, and Jörg Gross. "Political games of attack and defence." Philosophical Transactions of the Royal Society B: Biological Sciences 376, no. 1822 (2021): 20200135. http://dx.doi.org/10.1098/rstb.2020.0135.
Full textOwen, Denis F. "The Language of Attack and Defence." Oikos 57, no. 1 (1990): 133. http://dx.doi.org/10.2307/3565746.
Full textGoyal, S., and A. Vigier. "Attack, Defence, and Contagion in Networks." Review of Economic Studies 81, no. 4 (2014): 1518–42. http://dx.doi.org/10.1093/restud/rdu013.
Full textRepel, Dusan, and Ingo Stengel. "Grammar-based transformations: attack and defence." Information Management & Computer Security 22, no. 2 (2014): 141–54. http://dx.doi.org/10.1108/imcs-09-2013-0071.
Full textSudhakaran, Pradeep, Manikannan Kaliyaperumal, T. Senthilkumar, R. Jeya, and B. Sowmiya. "Hierarchical and On-Demand Attack Defence Framework for IoT Devices." Wireless Communications and Mobile Computing 2022 (April 26, 2022): 1–8. http://dx.doi.org/10.1155/2022/4335871.
Full textLehmanski, Linda M. A., Lara M. Kösters, Jianbei Huang, Martin Göbel, Jonathan Gershenzon, and Henrik Hartmann. "Windthrow causes declines in carbohydrate and phenolic concentrations and increased monoterpene emission in Norway spruce." PLOS ONE 19, no. 5 (2024): e0302714. http://dx.doi.org/10.1371/journal.pone.0302714.
Full textPELTONEN, S. "Induced defence responses of cereals to pathogen attack." Agricultural and Food Science 8, no. 4-5 (1999): 479–92. http://dx.doi.org/10.23986/afsci.5642.
Full textAdepu, Pavan Kumar. "Adversarial Robustness in Generative AI: Defending Against Malicious Model Inversions and Deepfake Attacks." International Journal of Management Technology 13, no. 4 (2025): 27–43. https://doi.org/10.37745/ijmt.2013/vol13n42743.
Full textSharipuddin, Sharipuddin, and Eko Arip Winanto. "Defence against adversarial attacks on IoT detection systems using deep belief network." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 1073. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp1073-1081.
Full textSharipuddin, Sharipuddin Eko Arip Winanto. "Defence against adversarial attacks on IoT detection systems using deep belief network." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 1073–81. https://doi.org/10.11591/ijeecs.v35.i2.pp1073-1081.
Full textMahmood, Alaa Mohammed, and İsa Avcı. "Cybersecurity Defence Mechanism Against DDoS Attack with Explainability." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 278–90. https://doi.org/10.58496/mjcs/2024/027.
Full textYe, Shunyao. "Research on the Right of Self-Defence from the Perspective of International Law." Lecture Notes in Education Psychology and Public Media 5, no. 1 (2023): 844–52. http://dx.doi.org/10.54254/2753-7048/5/2022994.
Full textKane, Marie. "‘Knowing (and Not Knowing) One's Place’, Organisational Ranking and the Operation of Envy and Shame in Organisational Life." Organisational and Social Dynamics 12, no. 2 (2012): 194–209. http://dx.doi.org/10.33212/osd.v12n2.2012.194.
Full textAkande, Dapo, and Antonios Tzanakopoulos. "Legal: Use of Force in Self-Defence to Recover Occupied Territory." European Journal of International Law 32, no. 4 (2021): 1299–307. http://dx.doi.org/10.1093/ejil/chab109.
Full textHodder, Ryan W., Will G. Hopkins, Kevin A. Ball, Jamie Bahnisch, and Fabio R. Serpiello. "Exploration of collective tactical variables in elite netball: An analysis of team and sub-group positioning behaviours." PLOS ONE 19, no. 2 (2024): e0295787. http://dx.doi.org/10.1371/journal.pone.0295787.
Full textStamm, Raini, Meelis Stamm, Doris Torilo, Kaivo Thomson, and Alexander Jairus. "Comparative analysis of the elements of attack and defence in men’s and women’s games in the Estonian volleyball highest league." Papers on Anthropology 25, no. 1 (2016): 37. http://dx.doi.org/10.12697/poa.2016.25.1.04.
Full textHills, Samuel P., Erwan Izri, Daniel Howells, Ben Lonergan, Liam P. Kilduff, and Mark Waldron. "Assessing the locomotor demands of international men’s and women’s rugby sevens match-play according to passage of play." PLOS ONE 19, no. 6 (2024): e0304186. http://dx.doi.org/10.1371/journal.pone.0304186.
Full textJermy, Andrew. "Attack is the best form of defence." Nature Reviews Microbiology 10, no. 5 (2012): 311. http://dx.doi.org/10.1038/nrmicro2782.
Full textNarayan, Arpita, and Upendra Kumar. "A Defence Mechanism: DNS based DDoS Attack." International Journal of Computer Trends and Technology 33, no. 1 (2016): 1–8. http://dx.doi.org/10.14445/22312803/ijctt-v33p101.
Full textCohen, Fred. "Managing network security: Attack and defence strategies." Network Security 1999, no. 7 (1999): 7–11. http://dx.doi.org/10.1016/s1353-4858(00)80012-4.
Full textShah, Jyoti. "Plants under attack: systemic signals in defence." Current Opinion in Plant Biology 12, no. 4 (2009): 459–64. http://dx.doi.org/10.1016/j.pbi.2009.05.011.
Full textShende, Sumer. "Crossfire DoS Attack and its Defence Mechanism." International Journal of Computer Applications 132, no. 3 (2015): 9–11. http://dx.doi.org/10.5120/ijca2015907313.
Full textHausken, Kjell. "Defence and attack of complex interdependent systems." Journal of the Operational Research Society 70, no. 3 (2018): 364–76. http://dx.doi.org/10.1080/01605682.2018.1438763.
Full textYing, Fei, Shengjie Zhao, and Hao Deng. "Microservice Security Framework for IoT by Mimic Defense Mechanism." Sensors 22, no. 6 (2022): 2418. http://dx.doi.org/10.3390/s22062418.
Full textMartin, Kathy. "Herring gulls prey upon female willow ptarmigan." Canadian Journal of Zoology 63, no. 4 (1985): 984–85. http://dx.doi.org/10.1139/z85-146.
Full textVAN STEENBERGHE, RAPHAËL. "Self-Defence in Response to Attacks by Non-state Actors in the Light of Recent State Practice: A Step Forward?" Leiden Journal of International Law 23, no. 1 (2010): 183–208. http://dx.doi.org/10.1017/s0922156509990380.
Full textValverde Jiménez, Beatriz. "The Ethics of Facing Western Notions in Graham Greene’s A Burnt-Out Case." Interlitteraria 23, no. 1 (2018): 110–23. http://dx.doi.org/10.12697/il.2018.23.1.12.
Full textGürfidan, Remzi. "INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES." Mühendislik Bilimleri ve Tasarım Dergisi 12, no. 2 (2024): 416–29. http://dx.doi.org/10.21923/jesd.1458955.
Full text