Academic literature on the topic 'Attack by observation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack by observation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack by observation"

1

Adus, Emilia Hatija, and Yustina Pu'u. "POPULASI DAN TINGKAT SERANGAN HAMA KUTU PUTIH Dysmicoccus brevipes (Hemiptera : Pseudociccidae) PADA TANAMAN JAHE (Zingiber officinalle Rosc) DI DESA NUAMURI KECAMATAN KELIMUTU." AGRICA 14, no. 1 (2021): 59–66. http://dx.doi.org/10.37478/agr.v14i1.1037.

Full text
Abstract:
This study aims to determine the population and level of attack of mealybug pests on ginger plants during harvesting in Nuamuri Village, Kelimutu District, Ende Regency. This research was carried out from February 2020 to July 2020, in Detubewa village, Nuamaro village and Nuamuri village. Observations were made by directly counting pests and damaged and attacked rhizomes, using the path method. Data analysis used is data obtained from the location of observations in tabulation based on the results of direct observations in the field. What was observed was the population and attack rate of eac
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandes, Andrian, and Ngatiman . "PATTERNS OF Coptotermes sp. TERMITE ATTACK ON Shorea leprosula Miq IN KHDTK SEBULU, EAST KALIMANTAN." KnE Life Sciences 2, no. 1 (2015): 544. http://dx.doi.org/10.18502/kls.v2i1.213.

Full text
Abstract:
<p>Red meranti (Shorea leprosula Miq) as a major commercial timber has been widely planted in Dipterocarp forests. Coptotermes sp. termite often attacks S. leprosula Miq to its death, but the attack patterns are unknown. This research aims to get data on the frequency, intensity, and patterns of Coptotermes sp. attack in KHDTK Sebulu, East Kalimantan. Methods used were observation, recording, and mapping on S. leprosula Miq trees attacked by termites in KHDTK Sebulu. The results showed that the frequency of termite attacks on S. leprosula Miq in KHDTK Sebulu was 6.4-30.5% and termite att
APA, Harvard, Vancouver, ISO, and other styles
3

Kruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.

Full text
Abstract:
Changes in heart rate and blood pressure (BP) have been monitored beat-to-beat in a cluster headache patient with and without attacks using a non-invasive Doppler servo method. Two attacks were monitored and during one of them a tilt test was carried out. The variability of heart rate and BP was greater during the attack than during the interparoxysmal period. A marked bradycardia occurred during attacks. Systolic BP increased slightly. There was no heart rate increase after tilting during the attack, whereas this was present invariably during tests carried out interparoxysmally. BP changes du
APA, Harvard, Vancouver, ISO, and other styles
4

Zulaikha, Eva, Arneti Arneti, and Munzir Busniah. "Menguji Tingkat Serangan Wereng Batang Coklat Nilaparvata lugens Stal (Hemiptera: Delphacidae) pada Varietas Padi Asal Pasaman di Rumah Kaca." JPT : JURNAL PROTEKSI TANAMAN (JOURNAL OF PLANT PROTECTION) 5, no. 1 (2021): 55. http://dx.doi.org/10.25077/jpt.5.1.55-59.2021.

Full text
Abstract:
Brown planthopper (BPH) is a major pest on rice plants that can cause hopperburn and crop failure. The study aimed to determine the level of BPH attack on several local rice varieties in the Pasaman Regency. This research was conducted in a greenhouse, Faculty of Agriculture, Universitas Andalas, using a completely randomized design (CRD), with five treatments and five replications. The treatments were four different rice varieties from Pasaman and control (Siganteng, Pulau Batu, Mundam Kuning, Mundam Putih, IR 42). BPH was infested when the rice was five days after sowing. Observation paramet
APA, Harvard, Vancouver, ISO, and other styles
5

Conti, Gustavo De Conti Teixeira Costa, Henrique De Oliveira Castro Castro, Auros Barreiros Freire Freire, et al. "High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack." Motricidade 14, no. 1 (2018): 58. http://dx.doi.org/10.6063/motricidade.12221.

Full text
Abstract:
This study aimed to identify the predictive factors of attacks, performed from positions 1 and 6 according to the effect of reception in high level Brazilian male volleyball and to find the predictive factors that differentiate the game practiced from these positions. The sample consisted in the observation of 142 games of the Brazilian Men's Super League, totalling 2969 actions of reception, setting and attack from positions 1 and 6. The significance value adopted was 5% (p ≤ 0.05). The analysis of the predictive factors of the game performed by the attacker of position 1 showed greater chanc
APA, Harvard, Vancouver, ISO, and other styles
6

Utami, Sri, and Agus Ismanto. "SERANGAN HAMA DEFOLIATOR PADA BIBIT TANAMAN KEHUTANAN." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (2016): 97. http://dx.doi.org/10.30598/jhppk.2016.1.2.97.

Full text
Abstract:
One of the efforts to support the success of forest plantation development is the availability of quality seeds (free from pests and diseases and have the ability to grow good). Defoliator pests is one of the problems frequently encountered pest attack seedlings in the nursery. Defoliator pest attacks will result in the failure of seedlings. The study was conducted at Modern Nursery located in the Sukamoro Village, Banyuasin, South Sumatra Province from February to May 2013. The purpose of the study was to analize the pest which attacks some seedlings e.g. Jabon (Anthocephalus cadamba), kayu b
APA, Harvard, Vancouver, ISO, and other styles
7

Conti, Gustavo, Auro Freire, Breno Evangelista, Gustavo Pedrosa, Herbert Ugrinowitsch, and Henrique Castro. "Brazilian high-level men’s volleyball." Kinesiology 50, no. 2 (2018): 211–17. http://dx.doi.org/10.26582/k.50.2.4.

Full text
Abstract:
The present study aimed to characterize and differentiate between the predictive factors of the attacks performed by the opposite player from positions 1 and 2. The sample consisted of the observation records of 142 volleyball games of the Brazilian Men’s Super-League season 2014/2015, totaling 8,010 actions of reception, setting and attack, with 5,965 actions from position 2 and 2,045 from position 1. The analysis of the predictive factors of the opposite player’s attack, according to the position of the attack, showed that the attacks from position 2 are more likely to occur after reception
APA, Harvard, Vancouver, ISO, and other styles
8

He, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Jia Xuan Fei. "Protecting User’s Privacy from Browser-Based Attacks." Applied Mechanics and Materials 631-632 (September 2014): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.941.

Full text
Abstract:
Recently there has been a new kind of attacks, browser-based attacks, against anonymous communication systems, such as Tor. This kind of attacks exploits JavaScript in the browser or the HTML meta refresh to generate some predefined signals to correlate users and their visited websites. A novel and efficient defense against such attacks is proposed in this paper. Our main observation is that the attacker must generate enough signals from the client site (the browser) to correlate the user and the website while we can detect the attack at the client site. More specifically, when a user is brows
APA, Harvard, Vancouver, ISO, and other styles
9

Costa, Gustavo De Conti Teixeira, Breno Ferreira de Britto Evangelista, Mariana Pereira Maia, et al. "Voleibol: análise do ataque realizado a partir do fundo da quadra na Superliga Masculina Brasileira." Brazilian Journal of Kinanthropometry and Human Performance 19, no. 2 (2017): 233. http://dx.doi.org/10.5007/1980-0037.2017v19n2p233.

Full text
Abstract:
DOI: http://dx.doi.org/10.5007/1980-0037.2017v19n2p233 The aim of this study was to identify the effect of attacks from positions 1 and 6 in high-level Brazilian Men’s Volleyball in order to understand the offensive structure of the game. The sample was composed of the observation of 142 2014-2015 Men’s Superleague games, totaling 2969 reception, set and attack actions from positions 1 and 6. The results showed association between place of attack, attack tempo, type of attack and effect of attack (p<0.001). The results showed that the point of attack, when it is performed from position 6, i
APA, Harvard, Vancouver, ISO, and other styles
10

Lemos, Walkymário Paulo, José Cola Zanuncio, and José Eduardo Serrão. "Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade) adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae)." Brazilian Archives of Biology and Technology 48, no. 6 (2005): 975–81. http://dx.doi.org/10.1590/s1516-89132005000800014.

Full text
Abstract:
Attack behavior of the predator Podisus rostralis (Stäl) (Heteroptera: Pentatomidae) adults on fourth instar Bombyx mori L. (Lepidoptera: Bombycidae) caterpillars was studied in laboratory conditions. Ten 24 hours old adults of this predator were observed during two hours with the following attack behavior: (1) Predator: prey finding; prey observation; touching prey with antenna; attack behavior; prey paralysis; predator retreat after attack; attack cessation; successive attacks; and (2) Prey: defense. The predator P. rostralis found its prey before attacking and it approached it with slow cir
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Attack by observation"

1

Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.

Full text
Abstract:
Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing and government services. In recent years, critical infrastructures have become increasingly dependent on ICT; more interconnected and are often, as a result, linked to the Internet. Consequently, this makes these systems more vulnerable and increases the threat of cyber-attack. In addition, the growing use of wireless networks means that infrastructures can be more susceptible to a direct digital attack than ever before. Traditionally, protecting against environmental
APA, Harvard, Vancouver, ISO, and other styles
2

Chabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.

Full text
Abstract:
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation, and eventually the comparison of different arithmetic operators for cryptosystems based on elliptic curves (ECC). Provided solutions must be robust against some side-channel attacks, and efficient at a hardware level (execution speed and area). In the case of ECC, we want to protect the secret key, a large integer, used in the scalar multiplication. Our protection methods use representations of numbers, and behaviour of algorithms to make more difficult some attacks. For instance, we randomly c
APA, Harvard, Vancouver, ISO, and other styles
3

Lucas, Audrey. "Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits coeurs de calcul." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S070.

Full text
Abstract:
Cette thèse porte sur le développement et l'évaluation de protections contrant simultanément des attaques par perturbation (FA) et des attaques par observation (SCA) dans le contexte de la cryptographie basée sur les courbes elliptiques (ECC). Deux protections ont été proposées pour la multiplication scalaire (SM), l'opération principale d'ECC. La première, nommée vérification de point (PV), permet une uniformisation de la SM grâce à une vérification de l'appartenance du point courant à la courbe. La SM ainsi obtenue est uniforme et donc résistante aux SPA mais aussi résistante à certaines FA.
APA, Harvard, Vancouver, ISO, and other styles
4

Linge, Yanis. "Etudes cryptographiques et statistiques de signaux compromettants." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM037/document.

Full text
Abstract:
Cette thèse porte sur les attaques par observations. Ces attaques étudient les variations d'émanation d'un composant pour retrouver une clé secrète. Ces émanations peuvent être multiples, par exemple, la consommation de courant électrique, le rayonnement électromagnétique, etc. Généralement, ces attaques font appel à des méthodes statistiques pour examiner la relation entre les émanations du composant et des modèles de consommation imaginés par l'attaquant. Trois axes sont développés dans cette thèse. Dans un premier temps, nous avons implémenté différentes attaques par observations sur des ca
APA, Harvard, Vancouver, ISO, and other styles
5

Pelletier, Heather L. "An Exploration of the Relationship Between Vicarious Learning Experiences and Panic Attacks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1310070759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Taylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.

Full text
Abstract:
Asphalt and concrete reclamation machines are used to cut roadways when a repair is required. The performance of these machines can affect the quality of road repairs, and cost/profitability for both contractors and governments. We believe that several performance characteristics in reclamation machines are governed by the placement and pattern of cutting picks on the cutter head. Previous studies, focused on mining and excavation applications, have shown strong correlation between placement and wear. The following study employs a screening experiment (observational study) to find significant
APA, Harvard, Vancouver, ISO, and other styles
7

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.

Full text
Abstract:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
APA, Harvard, Vancouver, ISO, and other styles
8

Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Edwards, Timothy Robin. "A prospective observational study to investigate the effect of prehospital airway management strategies on mortality and morbidity of patients who experience return of spontaneous circulation post cardiac arrest and are transferred directly to regional Heart Attack Centres by the Ambulance Service." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19508.

Full text
Abstract:
Introduction: The most appropriate airway management technique for use by paramedics in out-of-hospital cardiac arrest is yet to be determined and evidence relating to the influence of airway management strategy on outcome remains equivocal. In cases where return of spontaneous circulation (ROSC) occurs following out-of-hospital cardiac arrest, patients may undergo direct transfer to a specialist heart attack centre (HAC) where the post resuscitation 12 lead ECG demonstrates evidence of ST elevation myocardial infarction. To date, no studies have investigated the role of airway management stra
APA, Harvard, Vancouver, ISO, and other styles
10

Le, Bouder Hélène. "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0759/document.

Full text
Abstract:
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste. Cependant, une fois implémenté dans un circuit, il est possible d'attaquer les failles de ce dernier. Par opposition à la cryptanalyse classique, on parle alors d'attaques physiques. Celles-ci ne permettent pas d'attaquer l'algorithme en soi, mais son implémentation matérielle. Il existe deux grandes familles d'attaques physiques différentes : les attaques par observation du circuit durant le chiffrement, et les attaques par in
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Attack by observation"

1

Ground attack-- Vietnam: The Marines who controlled the skies. Ivy Books, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raybould, Philip John Charles. Some observations of sulphate and acid attack on concrete cores taken from precast shell piles: A short term study. Queen Mary College, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Operation Desert Shield/Desert Storm: Observations on the performance of the Army's Hellfire missile : report to the Secretary of the Army. U.S. General Accounting Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jenkins, Brian, Henry Willis, and Bing Han. Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013. RAND Corporation, 2016. http://dx.doi.org/10.7249/pe173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Powell, Roger A., Stephen Ellwood, Roland Kays, and Tiit Maran. Stink or swim: techniques to meet the challenges for the study and conservation of small critters that hide, swim, or climb, and may otherwise make themselves unpleasant. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198759805.003.0008.

Full text
Abstract:
The study of musteloids requires different perspectives and techniques than those needed for most mammals. Musteloids are generally small yet travel long distances and many live or forage underground or under water, limiting the use of telemetry and direct observation. Some are arboreal and nocturnal, facilitating telemetry but limiting observation, trapping, and many non-invasive techniques. Large sexual size dimorphism arguably doubles sample sizes for many research questions. Many musteloids defend themselves by expelling noxious chemicals. This obscure group does not attract funding, even
APA, Harvard, Vancouver, ISO, and other styles
6

Yona, Sergio. Epicurean Economic and Social Undertones of Satires 1.1–3. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0003.

Full text
Abstract:
In this chapter, the philosophical observations of Philodemus concerning the nature of imparting ethical advice are connected more fully to Horace’s three introductory satires, in which he explores and criticizes Roman society for its many foibles, including its obsession with wealth acquisition, unhealthy sexual affairs, and lack of mutual forbearance in friendships. It attempts to show how some of Philodemus’ works, especially treatises like On Property Management, On Wealth, On Choices and Avoidances, and On Anger, as well as his poetic treatment of sex in the Epigrams, contribute to the ph
APA, Harvard, Vancouver, ISO, and other styles
7

Yona, Sergio. Deficient Wealth, Excessive Frankness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0006.

Full text
Abstract:
The final chapter involves Horace’s description of the contrast between Epicurean moderation and Stoic excess through a series of portraits. The first is that of a rustic farmer, whose advice on meager fare and contentment even in the face of a financial crisis is the perfect embodiment of Epicurean teachings on the loss of wealth and the acceptance of poverty, as explained by Epicurus and Philodemus. The farmer’s sermon on how to deal with the vicissitudes of life with equanimity is followed by a humorous, long-winded, and ultimately ineffectual criticism from a lightweight Stoic, whose advic
APA, Harvard, Vancouver, ISO, and other styles
8

Weightman, Gavin. The Great Inoculator. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300241440.001.0001.

Full text
Abstract:
Smallpox was the scourge of the eighteenth century: it showed no mercy, almost wiping out whole societies. Young and old, poor and royalty were equally at risk — unless they had survived a previous attack. Daniel Sutton, a young surgeon from Suffolk, used this knowledge to pioneer a simple and effective inoculation method to counter the disease. His technique paved the way for Edward Jenner's discovery of vaccination — but, while Jenner is revered, Sutton has been vilified for not widely revealing his methods until later in life. This book reclaims Sutton's importance, showing how the clinicia
APA, Harvard, Vancouver, ISO, and other styles
9

Therese, McAllister, Corley Gene, United States. Federal Insurance and Mitigation Administration., United States. Federal Emergency Management Agency. Region II., and Greenhorne & O'Mara., eds. World Trade Center building performance study: Data collection, preliminary observations, and recommendations. Federal Emergency Management Agency, Federal Insurance and Mitigation Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

May, John. Few Observations on the Mode of Attack And Employment of the Heavy Artillery at Ciudad Rodrigo And Badajoz in 1812 And St. Sebastian in 1813. Naval & Military Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Attack by observation"

1

Apiecionek, Łukasz. "Fuzzy Observation of DDoS Attack." In Theory and Applications of Ordered Fuzzy Numbers. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59614-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Apiecionek, Łukasz, Jacek M. Czerniak, Wojciech T. Dobrosielski, and Dawid Ewald. "New Proposal of Fuzzy Observation of DDoS Attack." In Uncertainty and Imprecision in Decision Making and Decision Support: Cross-Fertilization, New Models and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65545-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Prashant, and Manisha J. Nene. "An Observation on Social Media Content to Analyze Cyberpsycho Attack." In Smart Computing and Informatics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zarzycki, Hubert, Łukasz Apiecionek, Jacek M. Czerniak, and Dawid Ewald. "The Proposal of Fuzzy Observation and Detection of Massive Data DDOS Attack Threat." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47024-1_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nuida, Koji. "Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_8.

Full text
Abstract:
Abstract In CRYPTO 2008, 1 year earlier than Gentry’s pioneering “bootstrapping” technique for the first fully homomorphic encryption (FHE) scheme, Ostrovsky and Skeith III had suggested a completely different approach towards achieving FHE. They showed that the $$\mathsf {NAND}$$ operator can be realized in some non-commutative groups; consequently, homomorphically encrypting the elements of the group will yield an FHE scheme, without ciphertext noise to be bootstrapped. However, no observations on how to homomorphically encrypt the group elements were presented in their paper, and there have been no follow-up studies in the literature. The aim of this paper is to exhibit more clearly what is sufficient and what seems to be effective for constructing FHE schemes based on their approach. First, we prove that it is sufficient to find a surjective homomorphism $$\pi :\widetilde{G} \rightarrow G$$ between finite groups for which bit operators are realized in G and the elements of the kernel of $$\pi $$ are indistinguishable from the general elements of $$\widetilde{G}$$. Secondly, we propose new methodologies to realize bit operators in some groups G. Thirdly, we give an observation that a naive approach using matrix groups would never yield secure FHE due to an attack utilizing the “linearity” of the construction. Then we propose an idea to avoid such “linearity” by using combinatorial group theory. Concretely realizing FHE schemes based on our proposed framework is left as a future research topic.
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Sensor Observations: A Gaussian Source Estimator." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baringoltz, Sara. "Some Clinical Observations on Patients with “Panic Attack” Diagnosis." In Cognitive Psychotherapy Toward a New Millennium. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0567-9_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McEvoy, Thomas Richard, and Stephen D. Wolthusen. "Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41476-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Siddhanti, Akhilesh Anilkumar, Subhamoy Maitra, and Nishant Sinha. "Certain Observations on ACORN v3 and the Implications to TMDTO Attacks." In Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71501-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack by observation"

1

Bolonkin, Alexander, and James Cloutier. "Some Optimal Problems in Search, Observation, and Attack." In AIAA Atmospheric Flight Mechanics Conference and Exhibit. American Institute of Aeronautics and Astronautics, 2005. http://dx.doi.org/10.2514/6.2005-6232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Mengchen, Bo An, Wei Gao, and Teng Zhang. "Efficient Label Contamination Attacks Against Black-Box Learning Models." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/551.

Full text
Abstract:
Label contamination attack (LCA) is an important type of data poisoning attack where an attacker manipulates the labels of training data to make the learned model beneficial to him. Existing work on LCA assumes that the attacker has full knowledge of the victim learning model, whereas the victim model is usually a black-box to the attacker. In this paper, we develop a Projected Gradient Ascent (PGA) algorithm to compute LCAs on a family of empirical risk minimizations and show that an attack on one victim model can also be effective on other victim models. This makes it possible that the attac
APA, Harvard, Vancouver, ISO, and other styles
3

Harrison, W. S., A. W. Krings, and N. Hanebutte. "Optimizing the observation windows size for kernel attack signatures." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Huijun, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. "Adversarial Examples for Graph Data: Deep Insights into Attack and Defense." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/669.

Full text
Abstract:
Graph deep learning models, such as graph convolutional networks (GCN) achieve state-of-the-art performance for tasks on graph data. However, similar to other deep learning models, graph deep learning models are susceptible to adversarial attacks. However, compared with non-graph data the discrete nature of the graph connections and features provide unique challenges and opportunities for adversarial attacks and defenses. In this paper, we propose techniques for both an adversarial attack and a defense against adversarial attacks. Firstly, we show that the problem of discrete graph connections
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Lun, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, and Dawn Song. "BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/509.

Full text
Abstract:
Recent research has confirmed the feasibility of backdoor attacks in deep reinforcement learning (RL) systems. However, the existing attacks require the ability to arbitrarily modify an agent's observation, constraining the application scope to simple RL systems such as Atari games. In this paper, we migrate backdoor attacks to more complex RL systems involving multiple agents and explore the possibility of triggering the backdoor without directly manipulating the agent's observation. As a proof of concept, we demonstrate that an adversary agent can trigger the backdoor of the victim agent wit
APA, Harvard, Vancouver, ISO, and other styles
6

Lalou, Mohammed, Hamamache Kheddouci, and Salim Hariri. "Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based Approach." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luo, Xiaoyuan, Jianjin Li, Zhongping Jiang, and Xinping Guan. "Complete observation against attack vulnerability for cyber-physical systems with application to power grids." In 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT). IEEE, 2015. http://dx.doi.org/10.1109/drpt.2015.7432368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Microscopic Observation of Pattern Attack for Different Chemical Composition of Aluminium Alloy Sacrificial Anode by Aggressive Ions on Finished Surface." In International Conference on Advances in Science, Engineering, Technology and Natural Resources. International Institute of Chemical, Biological & Environmental Engineering, 2015. http://dx.doi.org/10.15242/iicbe.c0815029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fernandes, Antonio Carlos, Sina Mirzaei Sefat, Fabio Moreira Coelho, and Mario Ribeiro. "Towards the Understanding of Manifold Fluttering During Pendulous Installation: Flow Induced Rotation of Flat Plates in Uniform Flow." In ASME 2010 29th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/omae2010-20950.

Full text
Abstract:
The pendulous installation method of a manifold has a first phase that can be considered as a free fall in water. Of course, this is not free due to the fluid action. The consequence is that the manifold may oscillate rotationally which characterizes a fluttering behavior. However, the manifold is a complex body with non-uniform shape, several modules, porosity etc. Hence, in order to improve the understanding of the fluttering, this work presents advances in the observation of flow induced rotation on a flat plate in uniform flow. This has been started experimentally and subsequently numerica
APA, Harvard, Vancouver, ISO, and other styles
10

Manohar, Krishpersad, Annil Rampartap, and Rikhi Ramkissoon. "Self-Starting Hybrid ‘H’ Type Wind Turbine." In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36187.

Full text
Abstract:
Wind energy is one of the fastest growing alternative energy resources being taped into worldwide. Vertical axis Darrieus ‘H’ type lift turbines have the potential to compete effectively with the more widely used conventional horizontal axis wind turbines. However, a disadvantage is when the rotor is stationary, no net rotational force arises, even at high wind speed. The rotor must already be spinning to generate torque and the design is normally not self-starting. In this study a hybrid Darrieus ‘H’ type lift turbine was designed to operate as a self-starting drag type turbine at low rotatio
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack by observation"

1

Bolonkin, Alexander A., and James R. Cloutier. Search, Observation, and Attack Problems. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada410927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Booker, Lashon B. The Effects of Observation Errors on the Attack Vulnerability of Complex Networks. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada576235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ross, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-0333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ross, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!