Academic literature on the topic 'Attack by observation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack by observation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack by observation"
Adus, Emilia Hatija, and Yustina Pu'u. "POPULASI DAN TINGKAT SERANGAN HAMA KUTU PUTIH Dysmicoccus brevipes (Hemiptera : Pseudociccidae) PADA TANAMAN JAHE (Zingiber officinalle Rosc) DI DESA NUAMURI KECAMATAN KELIMUTU." AGRICA 14, no. 1 (2021): 59–66. http://dx.doi.org/10.37478/agr.v14i1.1037.
Full textFernandes, Andrian, and Ngatiman . "PATTERNS OF Coptotermes sp. TERMITE ATTACK ON Shorea leprosula Miq IN KHDTK SEBULU, EAST KALIMANTAN." KnE Life Sciences 2, no. 1 (2015): 544. http://dx.doi.org/10.18502/kls.v2i1.213.
Full textKruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.
Full textZulaikha, Eva, Arneti Arneti, and Munzir Busniah. "Menguji Tingkat Serangan Wereng Batang Coklat Nilaparvata lugens Stal (Hemiptera: Delphacidae) pada Varietas Padi Asal Pasaman di Rumah Kaca." JPT : JURNAL PROTEKSI TANAMAN (JOURNAL OF PLANT PROTECTION) 5, no. 1 (2021): 55. http://dx.doi.org/10.25077/jpt.5.1.55-59.2021.
Full textConti, Gustavo De Conti Teixeira Costa, Henrique De Oliveira Castro Castro, Auros Barreiros Freire Freire, et al. "High level of Brazilian men´s volleyball: characterization and difference of predictive factors of back row attack." Motricidade 14, no. 1 (2018): 58. http://dx.doi.org/10.6063/motricidade.12221.
Full textUtami, Sri, and Agus Ismanto. "SERANGAN HAMA DEFOLIATOR PADA BIBIT TANAMAN KEHUTANAN." JURNAL HUTAN PULAU-PULAU KECIL 1, no. 2 (2016): 97. http://dx.doi.org/10.30598/jhppk.2016.1.2.97.
Full textConti, Gustavo, Auro Freire, Breno Evangelista, Gustavo Pedrosa, Herbert Ugrinowitsch, and Henrique Castro. "Brazilian high-level men’s volleyball." Kinesiology 50, no. 2 (2018): 211–17. http://dx.doi.org/10.26582/k.50.2.4.
Full textHe, Gao Feng, Tao Zhang, Yuan Yuan Ma, and Jia Xuan Fei. "Protecting User’s Privacy from Browser-Based Attacks." Applied Mechanics and Materials 631-632 (September 2014): 941–45. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.941.
Full textCosta, Gustavo De Conti Teixeira, Breno Ferreira de Britto Evangelista, Mariana Pereira Maia, et al. "Voleibol: análise do ataque realizado a partir do fundo da quadra na Superliga Masculina Brasileira." Brazilian Journal of Kinanthropometry and Human Performance 19, no. 2 (2017): 233. http://dx.doi.org/10.5007/1980-0037.2017v19n2p233.
Full textLemos, Walkymário Paulo, José Cola Zanuncio, and José Eduardo Serrão. "Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade) adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae)." Brazilian Archives of Biology and Technology 48, no. 6 (2005): 975–81. http://dx.doi.org/10.1590/s1516-89132005000800014.
Full textDissertations / Theses on the topic "Attack by observation"
Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.
Full textChabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.
Full textLucas, Audrey. "Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits coeurs de calcul." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S070.
Full textLinge, Yanis. "Etudes cryptographiques et statistiques de signaux compromettants." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM037/document.
Full textPelletier, Heather L. "An Exploration of the Relationship Between Vicarious Learning Experiences and Panic Attacks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1310070759.
Full textTaylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Full textBranlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Full textEdwards, Timothy Robin. "A prospective observational study to investigate the effect of prehospital airway management strategies on mortality and morbidity of patients who experience return of spontaneous circulation post cardiac arrest and are transferred directly to regional Heart Attack Centres by the Ambulance Service." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19508.
Full textLe, Bouder Hélène. "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0759/document.
Full textBooks on the topic "Attack by observation"
Raybould, Philip John Charles. Some observations of sulphate and acid attack on concrete cores taken from precast shell piles: A short term study. Queen Mary College, 1985.
Find full textOffice, General Accounting. Operation Desert Shield/Desert Storm: Observations on the performance of the Army's Hellfire missile : report to the Secretary of the Army. U.S. General Accounting Office, 1992.
Find full textJenkins, Brian, Henry Willis, and Bing Han. Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013. RAND Corporation, 2016. http://dx.doi.org/10.7249/pe173.
Full textPowell, Roger A., Stephen Ellwood, Roland Kays, and Tiit Maran. Stink or swim: techniques to meet the challenges for the study and conservation of small critters that hide, swim, or climb, and may otherwise make themselves unpleasant. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198759805.003.0008.
Full textYona, Sergio. Epicurean Economic and Social Undertones of Satires 1.1–3. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0003.
Full textYona, Sergio. Deficient Wealth, Excessive Frankness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786559.003.0006.
Full textWeightman, Gavin. The Great Inoculator. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300241440.001.0001.
Full textTherese, McAllister, Corley Gene, United States. Federal Insurance and Mitigation Administration., United States. Federal Emergency Management Agency. Region II., and Greenhorne & O'Mara., eds. World Trade Center building performance study: Data collection, preliminary observations, and recommendations. Federal Emergency Management Agency, Federal Insurance and Mitigation Administration, 2002.
Find full textMay, John. Few Observations on the Mode of Attack And Employment of the Heavy Artillery at Ciudad Rodrigo And Badajoz in 1812 And St. Sebastian in 1813. Naval & Military Press, 2004.
Find full textBook chapters on the topic "Attack by observation"
Apiecionek, Łukasz. "Fuzzy Observation of DDoS Attack." In Theory and Applications of Ordered Fuzzy Numbers. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59614-3_14.
Full textApiecionek, Łukasz, Jacek M. Czerniak, Wojciech T. Dobrosielski, and Dawid Ewald. "New Proposal of Fuzzy Observation of DDoS Attack." In Uncertainty and Imprecision in Decision Making and Decision Support: Cross-Fertilization, New Models and Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65545-1_22.
Full textGupta, Prashant, and Manisha J. Nene. "An Observation on Social Media Content to Analyze Cyberpsycho Attack." In Smart Computing and Informatics. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5547-8_52.
Full textZarzycki, Hubert, Łukasz Apiecionek, Jacek M. Czerniak, and Dawid Ewald. "The Proposal of Fuzzy Observation and Detection of Massive Data DDOS Attack Threat." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47024-1_34.
Full textNuida, Koji. "Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_8.
Full textJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Sensor Observations: A Gaussian Source Estimator." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_8.
Full textJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_6.
Full textBaringoltz, Sara. "Some Clinical Observations on Patients with “Panic Attack” Diagnosis." In Cognitive Psychotherapy Toward a New Millennium. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0567-9_51.
Full textMcEvoy, Thomas Richard, and Stephen D. Wolthusen. "Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41476-3_6.
Full textSiddhanti, Akhilesh Anilkumar, Subhamoy Maitra, and Nishant Sinha. "Certain Observations on ACORN v3 and the Implications to TMDTO Attacks." In Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71501-8_15.
Full textConference papers on the topic "Attack by observation"
Bolonkin, Alexander, and James Cloutier. "Some Optimal Problems in Search, Observation, and Attack." In AIAA Atmospheric Flight Mechanics Conference and Exhibit. American Institute of Aeronautics and Astronautics, 2005. http://dx.doi.org/10.2514/6.2005-6232.
Full textZhao, Mengchen, Bo An, Wei Gao, and Teng Zhang. "Efficient Label Contamination Attacks Against Black-Box Learning Models." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/551.
Full textHarrison, W. S., A. W. Krings, and N. Hanebutte. "Optimizing the observation windows size for kernel attack signatures." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265450.
Full textWu, Huijun, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, and Liming Zhu. "Adversarial Examples for Graph Data: Deep Insights into Attack and Defense." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/669.
Full textWang, Lun, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, and Dawn Song. "BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/509.
Full textLalou, Mohammed, Hamamache Kheddouci, and Salim Hariri. "Identifying the Cyber Attack Origin with Partial Observation: A Linear Regression Based Approach." In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W). IEEE, 2017. http://dx.doi.org/10.1109/fas-w.2017.168.
Full textLuo, Xiaoyuan, Jianjin Li, Zhongping Jiang, and Xinping Guan. "Complete observation against attack vulnerability for cyber-physical systems with application to power grids." In 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT). IEEE, 2015. http://dx.doi.org/10.1109/drpt.2015.7432368.
Full text"Microscopic Observation of Pattern Attack for Different Chemical Composition of Aluminium Alloy Sacrificial Anode by Aggressive Ions on Finished Surface." In International Conference on Advances in Science, Engineering, Technology and Natural Resources. International Institute of Chemical, Biological & Environmental Engineering, 2015. http://dx.doi.org/10.15242/iicbe.c0815029.
Full textFernandes, Antonio Carlos, Sina Mirzaei Sefat, Fabio Moreira Coelho, and Mario Ribeiro. "Towards the Understanding of Manifold Fluttering During Pendulous Installation: Flow Induced Rotation of Flat Plates in Uniform Flow." In ASME 2010 29th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/omae2010-20950.
Full textManohar, Krishpersad, Annil Rampartap, and Rikhi Ramkissoon. "Self-Starting Hybrid ‘H’ Type Wind Turbine." In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36187.
Full textReports on the topic "Attack by observation"
Bolonkin, Alexander A., and James R. Cloutier. Search, Observation, and Attack Problems. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada410927.
Full textBooker, Lashon B. The Effects of Observation Errors on the Attack Vulnerability of Complex Networks. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada576235.
Full textRoss, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-0333.
Full textRoss, Robert, John W. Forsman, John R. Erickson, and Allen M. Brackley. Nondestructive Testing Technique to Quantify Deterioration from Marine Borer Attack in Sitka Spruce and Western Hemlock Logs: Observations from a Pilot Test. U.S. Department of Agriculture, Forest Service, Forest Products Laboratory, 2014. http://dx.doi.org/10.2737/fpl-rn-333.
Full text