Academic literature on the topic 'Attack by observation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack by observation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack by observation"
Adus, Emilia Hatija, and Yustina Pu'u. "POPULASI DAN TINGKAT SERANGAN HAMA KUTU PUTIH Dysmicoccus brevipes (Hemiptera : Pseudociccidae) PADA TANAMAN JAHE (Zingiber officinalle Rosc) DI DESA NUAMURI KECAMATAN KELIMUTU." AGRICA 14, no. 1 (July 15, 2021): 59–66. http://dx.doi.org/10.37478/agr.v14i1.1037.
Full textFernandes, Andrian, and Ngatiman . "PATTERNS OF Coptotermes sp. TERMITE ATTACK ON Shorea leprosula Miq IN KHDTK SEBULU, EAST KALIMANTAN." KnE Life Sciences 2, no. 1 (September 20, 2015): 544. http://dx.doi.org/10.18502/kls.v2i1.213.
Full textKruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (June 1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.
Full textZulaikha, Eva, Arneti Arneti, and Munzir Busniah. "Menguji Tingkat Serangan Wereng Batang Coklat Nilaparvata lugens Stal (Hemiptera: Delphacidae) pada Varietas Padi Asal Pasaman di Rumah Kaca." JPT : JURNAL PROTEKSI TANAMAN (JOURNAL OF PLANT PROTECTION) 5, no. 1 (July 11, 2021): 55. http://dx.doi.org/10.25077/jpt.5.1.55-59.2021.
Full textConti, Gustavo De Conti Teixeira Costa, Henrique De Oliveira Castro Castro, Auros Barreiros Freire Freire, Breno Ferreira Evangelista Evangelista, Gustavo Ferreira Pedrosa Pedrosa, Herbert Ugrinowitsch Ugrinowitsch, and Gibson Moreira Praça Praça. "High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack." Motricidade 14, no. 1 (May 24, 2018): 58. http://dx.doi.org/10.6063/motricidade.12221.
Full textUtami, Sri, and Agus Ismanto. "SERANGAN HAMA DEFOLIATOR PADA BIBIT TANAMAN KEHUTANAN." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (December 1, 2016): 97. http://dx.doi.org/10.30598/jhppk.2016.1.2.97.
Full textConti, Gustavo, Auro Freire, Breno Evangelista, Gustavo Pedrosa, Herbert Ugrinowitsch, and Henrique Castro. "Brazilian high-level men’s volleyball." Kinesiology 50, no. 2 (2018): 211–17. http://dx.doi.org/10.26582/k.50.2.4.
Full textHe, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Jia Xuan Fei. "Protecting User’s Privacy from Browser-Based Attacks." Applied Mechanics and Materials 631-632 (September 2014): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.941.
Full textCosta, Gustavo De Conti Teixeira, Breno Ferreira de Britto Evangelista, Mariana Pereira Maia, Juliana Sampaio Ceccato, Auro Barreiros Freire, Michel Milistetd, José Cícero Moraes, and Herbert Ugrinowitsch. "Voleibol: análise do ataque realizado a partir do fundo da quadra na Superliga Masculina Brasileira." Brazilian Journal of Kinanthropometry and Human Performance 19, no. 2 (May 28, 2017): 233. http://dx.doi.org/10.5007/1980-0037.2017v19n2p233.
Full textLemos, Walkymário Paulo, José Cola Zanuncio, and José Eduardo Serrão. "Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade) adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae)." Brazilian Archives of Biology and Technology 48, no. 6 (November 2005): 975–81. http://dx.doi.org/10.1590/s1516-89132005000800014.
Full textDissertations / Theses on the topic "Attack by observation"
Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.
Full textChabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.
Full textLucas, Audrey. "Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits coeurs de calcul." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S070.
Full textThis thesis deals with protection development and evaluation against fault attacks (FA) and side channel attacks (SCA) simultaneously. These protections have been developed for elliptic curves cryptography (ECC) and its main operation, the scalar multiplication (MS). Two protections have been proposed. The first is point verification (PV) checking that the current point is effectively on the curve, with a uniformization behavior. Thus, this new SM with PV is robust against some FAs and also SPA, since it is uniform. The second one is called counter iteration (IC). ICC protects the scalar against major FAs with a uniform behavior. Its overhead is very small. Our protections have been implemented on Cortex M0 microcontroller for Weiertrass and Montgomery curves and for different types of coordinates. The overhead is between 48 % and 62 %, in the worst case (when the PV is made at each SM iteration). This overhead is smaller than overhead of usual basic protections against SPA. A theorical activity simulator has also been developed. It reproduces the architecture of a simple 32-bit microcontroller. Theoric activity is modeled by the Hamming weigh variations of manipulated data during execution. Thanks to the simulator, the impact of operands is illustrated for arithmetic units. Moreover, SPA and DPA attacks were made for evaluating our protections. Our protections show some security improvements
Linge, Yanis. "Etudes cryptographiques et statistiques de signaux compromettants." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM037/document.
Full textThe main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some leakage models supposed by the attacker. Three main axis are developed here. First, we have implemented many side channel attacks on GPGPU using the API OpenCL. These implementations are more effective than the classical ones, so an attacker can exploit more data. Then, in order to provide a new side channel attack, we have suggested the use of a new dependency measurement proposed by Reshef et al., the MIC. The MIC is more advantageous than the mutual information, because its computation does not depend of a kernel choice nor a windows size. So, its use in side channel analysis is simple, even if the time complexity is large. Finally, we have introduced a new attack based on the join distribution of the input and the output of a cryptographic sub-function. If the distribution depends on the key used in the function, we can retrieve the secret key. This attack can be efficient even in presence of some countermeasures because it does not required the knowledge of both plain text or cipher text
Pelletier, Heather L. "An Exploration of the Relationship Between Vicarious Learning Experiences and Panic Attacks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1310070759.
Full textTaylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Full textOur Ph.D states that given the magnitude of malicious behavior in the Internet, end-host software must be monitored. To limit the number of monitoring points, we propose to monitor the software from an interconnection point, i.e. a midpoint. We have designed for this purpose Luth, a tool to compose and parallelize a set of midpoint inspectors (MI) that implement mini IDS, IPS or firewall-s, while checking the correction and optimality of the resulting inspection tree, using a configuration language, its interpreter and associated algorithms. We then configure this tool to monitor some end-host software used to observe malicious traffic. First, we demonstrate why malware downloading honeypots must be monitored by designing an original attack. Then, we show how we configure Luth to block these attacks while accepting the intrusions emulated by the honeypot. In a second step, we use Luth to implement a sandbox that analyzes dynamically and as safely as wanted malware's network communications. We show how the information obtained by this analysis enables us to cluster the analyzed malware and therefore limit the number of malware to analyze manually. Finally, we show how we automatically generate signatures from this analysis to detect those malware from a midpoint device
Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Full textEdwards, Timothy Robin. "A prospective observational study to investigate the effect of prehospital airway management strategies on mortality and morbidity of patients who experience return of spontaneous circulation post cardiac arrest and are transferred directly to regional Heart Attack Centres by the Ambulance Service." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19508.
Full textLe, Bouder Hélène. "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0759/document.
Full textThe main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic algorithms are properly designed mathematically, they may be vulnerable to physical attacks. Physical attacks are mainly divided in two families: the side channel attacks which are based on the observation of the circuit behaviour during the computation, and the fault injection attacks which consist in disturbing the computation in order to alter the correct progress of the algorithm. These attacks are used to target the cipher key or to reverse engineer the algorithm. A formalism is proposed in order to describe the two families in a unified way. Unifying the different attacks under a same formalism allows to deal with them with common mathematical tools. Additionally, it allows a comparison between different attacks. Using this framework, a generic method to assess the vulnerabilities of generalized Feistel networks to differential fault analysis is presented. This work is furthermore extended to improve a FIRE attack on DES-like cryptosystems with customized s-boxes
Books on the topic "Attack by observation"
Ground attack-- Vietnam: The Marines who controlled the skies. New York: Ivy Books, 1993.
Find full textRaybould, Philip John Charles. Some observations of sulphate and acid attack on concrete cores taken from precast shell piles: A short term study. [London]: Queen Mary College, 1985.
Find full textOffice, General Accounting. Operation Desert Shield/Desert Storm: Observations on the performance of the Army's Hellfire missile : report to the Secretary of the Army. Washington, D.C: U.S. General Accounting Office, 1992.
Find full textJenkins, Brian, Henry Willis, and Bing Han. Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013. RAND Corporation, 2016. http://dx.doi.org/10.7249/pe173.
Full textPowell, Roger A., Stephen Ellwood, Roland Kays, and Tiit Maran. Stink or swim: techniques to meet the challenges for the study and conservation of small critters that hide, swim, or climb, and may otherwise make themselves unpleasant. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198759805.003.0008.
Full textYona, Sergio. Epicurean Economic and Social Undertones of Satires 1.1–3. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0003.
Full textYona, Sergio. Deficient Wealth, Excessive Frankness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0006.
Full textWeightman, Gavin. The Great Inoculator. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300241440.001.0001.
Full textTherese, McAllister, Corley Gene, United States. Federal Insurance and Mitigation Administration., United States. Federal Emergency Management Agency. Region II., and Greenhorne & O'Mara., eds. World Trade Center building performance study: Data collection, preliminary observations, and recommendations. Washington, D.C: Federal Emergency Management Agency, Federal Insurance and Mitigation Administration, 2002.
Find full textMay, John. Few Observations on the Mode of Attack And Employment of the Heavy Artillery at Ciudad Rodrigo And Badajoz in 1812 And St. Sebastian in 1813. Naval & Military Press, 2004.
Find full textBook chapters on the topic "Attack by observation"
Apiecionek, Łukasz. "Fuzzy Observation of DDoS Attack." In Theory and Applications of Ordered Fuzzy Numbers, 239–52. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59614-3_14.
Full textApiecionek, Łukasz, Jacek M. Czerniak, Wojciech T. Dobrosielski, and Dawid Ewald. "New Proposal of Fuzzy Observation of DDoS Attack." In Uncertainty and Imprecision in Decision Making and Decision Support: Cross-Fertilization, New Models and Applications, 240–50. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65545-1_22.
Full textGupta, Prashant, and Manisha J. Nene. "An Observation on Social Media Content to Analyze Cyberpsycho Attack." In Smart Computing and Informatics, 507–14. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_52.
Full textZarzycki, Hubert, Łukasz Apiecionek, Jacek M. Czerniak, and Dawid Ewald. "The Proposal of Fuzzy Observation and Detection of Massive Data DDOS Attack Threat." In Advances in Intelligent Systems and Computing, 363–78. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47024-1_34.
Full textNuida, Koji. "Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory." In International Symposium on Mathematics, Quantum Theory, and Cryptography, 57–78. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_8.
Full textJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Sensor Observations: A Gaussian Source Estimator." In Malicious Attack Propagation and Source Identification, 89–93. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_8.
Full textJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator." In Malicious Attack Propagation and Source Identification, 69–77. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_6.
Full textBaringoltz, Sara. "Some Clinical Observations on Patients with “Panic Attack” Diagnosis." In Cognitive Psychotherapy Toward a New Millennium, 303–6. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0567-9_51.
Full textMcEvoy, Thomas Richard, and Stephen D. Wolthusen. "Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation." In Lecture Notes in Computer Science, 70–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41476-3_6.
Full textSiddhanti, Akhilesh Anilkumar, Subhamoy Maitra, and Nishant Sinha. "Certain Observations on ACORN v3 and the Implications to TMDTO Attacks." In Security, Privacy, and Applied Cryptography Engineering, 264–80. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71501-8_15.
Full textConference papers on the topic "Attack by observation"
Bolonkin, Alexander, and James Cloutier. "Some Optimal Problems in Search, Observation, and Attack." In AIAA Atmospheric Flight Mechanics Conference and Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2005. http://dx.doi.org/10.2514/6.2005-6232.
Full textZhao, Mengchen, Bo An, Wei Gao, and Teng Zhang. "Efficient Label Contamination Attacks Against Black-Box Learning Models." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/551.
Full textHarrison, W. S., A. W. Krings, and N. Hanebutte. "Optimizing the observation windows size for kernel attack signatures." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265450.
Full textWu, Huijun, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. "Adversarial Examples for Graph Data: Deep Insights into Attack and Defense." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/669.
Full textWang, Lun, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, and Dawn Song. "BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/509.
Full textLalou, Mohammed, Hamamache Kheddouci, and Salim Hariri. "Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based Approach." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.168.
Full textLuo, Xiaoyuan, Jianjin Li, Zhongping Jiang, and Xinping Guan. "Complete observation against attack vulnerability for cyber-physical systems with application to power grids." In 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT). IEEE, 2015. http://dx.doi.org/10.1109/drpt.2015.7432368.
Full text"Microscopic Observation of Pattern Attack for Different Chemical Composition of Aluminium Alloy Sacrificial Anode by Aggressive Ions on Finished Surface." In International Conference on Advances in Science, Engineering, Technology and Natural Resources. International Institute of Chemical, Biological & Environmental Engineering, 2015. http://dx.doi.org/10.15242/iicbe.c0815029.
Full textFernandes, Antonio Carlos, Sina Mirzaei Sefat, Fabio Moreira Coelho, and Mario Ribeiro. "Towards the Understanding of Manifold Fluttering During Pendulous Installation: Flow Induced Rotation of Flat Plates in Uniform Flow." In ASME 2010 29th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/omae2010-20950.
Full textManohar, Krishpersad, Annil Rampartap, and Rikhi Ramkissoon. "Self-Starting Hybrid ‘H’ Type Wind Turbine." In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36187.
Full textReports on the topic "Attack by observation"
Bolonkin, Alexander A., and James R. Cloutier. Search, Observation, and Attack Problems. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada410927.
Full textBooker, Lashon B. The Effects of Observation Errors on the Attack Vulnerability of Complex Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2012. http://dx.doi.org/10.21236/ada576235.
Full textRoss, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. Madison, WI: U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-0333.
Full textRoss, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. Madison, WI: U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-333.
Full text