Academic literature on the topic 'Attack rate'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack rate.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attack rate"

1

Wu, Zhijun, Yue Yin, Guang Li, and Meng Yue. "Coherent Detection of Synchronous Low-Rate DoS Attacks." Security and Communication Networks 2021 (March 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6694264.

Full text
Abstract:
Low-rate denial-of-service (LDoS) attacks are characterized by low average rate and periodicity. Under certain conditions, the high concealment of LDoS attacks enables them to transfer the attack stream to the network without being detected at all before the end. In this article, plenty of LDoS attack traffic is spread to the victim end to detect LDoS attacks. Through experimental analysis, it is found that the attack pulses at the victim end have sequence correlation, so the coherence detection technology in spread spectrum communication is proposed to detect LDoS attacks. Therefore, this paper proposes an attack detection method based on coherent detection, which adopts bivariate cyclic convolution algorithm. Similar to the generation of receiving terminal phase dry detection code in spread spectrum communication, we construct a local detection sequence to complete the extraction of LDoS attack stream from the background traffic of the victim terminal, that is, the coherent detection of LDoS attacks. When predicting the features of an LDoS attack, how to construct the parameters of the detection sequence (such as period, pulse duration, amplitude, and so on) is very important. In this paper, we observe the correlation of LDoS attacks and use coherence detection to detect LDoS attacks. By comparing calculated cross-correlation values with designed double threshold rules, the existence of attacks can be determined. The simulation platform and experiments show that this method has high detection performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Xia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.

Full text
Abstract:
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.
APA, Harvard, Vancouver, ISO, and other styles
3

Aladaileh, Mohammad Adnan, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Taief Alaa Al-Amiedy, and Dyala R. Ibrahim. "Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis." Applied Sciences 13, no. 2 (January 5, 2023): 775. http://dx.doi.org/10.3390/app13020775.

Full text
Abstract:
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. However, the new technology is security deficient. A DDoS attack is one of the common attacks that threaten SDN controllers, leading to the degradation or even collapse of the entire SDN network. Entropy-based approaches and their variants are considered the most efficient approaches to detecting DDoS attacks on SDN controllers. Therefore, this work analyzes the feasibility and impacts of an entropy-based DDoS attack detection approach for detecting low-rate and high-rate DDoS attacks against the controller, measured in terms of detection rate (DR) and false-positive rate (FPR), triggered by a single or multiple host attacks targeting a single or multiple victims. Eight simulation scenarios, representing low and high DDoS attack traffic rates on the controller, have been used to evaluate an entropy-based DDoS attack detection approach. The experimental results reveal that the entropy-based approach enhances the average DR for detecting high-rate DDoS attack traffic compared with low-rate DDoS attack traffic by 6.25%, 20.26%, 6.74%, and 8.81%. In addition, it reduces the average FPRs for detecting a high DDoS attack traffic rate compared with a low DDoS attack traffic rate by 67.68%, 77.54%, 66.94%, and 64.81.
APA, Harvard, Vancouver, ISO, and other styles
4

Ash, Caroline. "Attack rate in Manaus." Science 371, no. 6526 (January 14, 2021): 248.16–250. http://dx.doi.org/10.1126/science.371.6526.248-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.

Full text
Abstract:
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances in this new type of attack and corresponding countermeasures. The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled authentication information. Recent publications are summarized to generalize an overarching attack methodology and to derive the limitations and future directions of ML-based stealing attacks. Furthermore, countermeasures are proposed towards developing effective protections from three aspects—detection, disruption, and isolation.
APA, Harvard, Vancouver, ISO, and other styles
6

Kruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (June 1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.

Full text
Abstract:
Changes in heart rate and blood pressure (BP) have been monitored beat-to-beat in a cluster headache patient with and without attacks using a non-invasive Doppler servo method. Two attacks were monitored and during one of them a tilt test was carried out. The variability of heart rate and BP was greater during the attack than during the interparoxysmal period. A marked bradycardia occurred during attacks. Systolic BP increased slightly. There was no heart rate increase after tilting during the attack, whereas this was present invariably during tests carried out interparoxysmally. BP changes during “attack tilt” were difficult to evaluate because of large variation. This may be the first observation of a baroreflex arc dysfunction during a cluster headache attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Lu, Mingchao Liao, Cao Yuan, and Haoyu Zhang. "Low-Rate DDoS Attack Detection Using Expectation of Packet Size." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3691629.

Full text
Abstract:
Low-rate Distributed Denial-of-Service (low-rate DDoS) attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.
APA, Harvard, Vancouver, ISO, and other styles
8

Lysenko, Sergii, Kira Bobrovnikova, Serhii Matiukh, Ivan Hurman, and Oleg Savenko. "Detection of the botnets’ low-rate DDoS attacks based on self-similarity." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3651. http://dx.doi.org/10.11591/ijece.v10i4.pp3651-3659.

Full text
Abstract:
An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the botnet’s behavior in the network. Detection process involves the analysis of the network traffic, generated by the botnets’ low-rate DDoS attack. Proposed technique is the part of botnets detection system – BotGRABBER system. The novelty of the paper is that the low-rate DDoS-attacks detection involves not only the network features, inherent to the botnets, but also network traffic self-similarity analysis, which is defined with the use of Hurst coefficient. Detection process consists of the knowledge formation based on the features that may indicate low-rate DDoS attack performed by a botnet; network monitoring, which analyzes information obtained from the network and making conclusion about possible DDoS attack in the network; and the appliance of the security scenario for the corporate area network’s infrastructure in the situation of low-rate attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Gang, Lejun Ji, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang. "Extracting Low-Rate DDoS Attack Characteristics: The Case of Multipath TCP-Based Communication Networks." Wireless Communications and Mobile Computing 2021 (July 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/2264187.

Full text
Abstract:
The multipath TCP (MPTCP) enables multihomed mobile devices to realize multipath parallel transmission, which greatly improves the transmission performance of the mobile communication network. With the rapid development of all kinds of emerging technologies, network attacks have shown a trend of development with many types and rapid updates. Among them, low-rate distributed denial of service (LDDoS) attacks are considered to be one of the most threatening issues in the field of network security. In view of the current research status, by using the network simulation software NS2, this paper first compares and analyzes the throughput and delay performance of the MPTCP transmission system under LDDoS attacks and, further, conducts simulation experiments and analysis on the queue occupancy rate of the LDDoS attack flow to extract the basic attack characteristics of the LDDoS attacks. The experimental results show that the LDDoS attacks will have a major destructive effect on the throughput performance and delay performance of the MPTCP transmission system, resulting in a decrease in the robustness of the transmission system. By analyzing and comparing the occupancy rate of the LDDoS attack flow in the MPTCP transmission system, it can be concluded that (1) the occupancy rate of the LDDoS scattered pulse traffic sent by each puppet machine changes slightly, and (2) the occupancy rate of LDDoS attack data flow is much greater than that of ordinary TCP data flow.
APA, Harvard, Vancouver, ISO, and other styles
10

Amstey, Marvin S. "Attack rate for neonatal herpesvirus." American Journal of Obstetrics and Gynecology 155, no. 1 (July 1986): 229–30. http://dx.doi.org/10.1016/0002-9378(86)90127-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Attack rate"

1

Chui, Hiu-fai Sam. "Evaluation of measures taken by financial institutes under the interest rate swing caused by the currency attack /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19882117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chui, Hiu-fai Sam, and 徐曉暉. "Evaluation of measures taken by financial institutes under the interest rate swing caused by the currency attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.

Full text
Abstract:
Time Memory Trade O (TMTO) is a cryptanalytic method that aims to develop an attack which has a lower memory complexity than lookup table and a lower online time complexity than exhaustive search. TMTO methods are widely studied in the literature and used for inverting various cryptosystems. We focus on the design and the analysis of TMTO on symmetric ciphers in this thesis. Firstly, the summary of the random mapping statistics from the view point of TMTO is presented. We also recalculate some expected values with a simpler approach than the existing proofs. Then, we propose some variant constructions and also present three new distinguishers based on random mappings. Next, we provide a detailed analysis of the success rate of two main improvements of the attack
Distinguished Point Method and Rainbow Method. Finally, we discuss the adjustment of the parameters to achieve a high success rate. To support our theoretical framework, we also present empirical results of our analysis to actual ciphers.
APA, Harvard, Vancouver, ISO, and other styles
4

Xia, Yu. "Selective Dropping of Rate Limiting Against Denial of Service Attacks." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bencel, Jozef. "Analýza bezpečnosti bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218125.

Full text
Abstract:
This master's thesis deals with security of wireless network standard 802.11. There are described security mechanisms as hide SSID, MAC address filtering, WEP, WPA, WPA2 protocols. There are described also the most often kinds of attacks (Denial of Service, disclosure WEP key, Man-in-the-Middle). The work contains investigation of used security mechanisms in wireless networks in parts of Brno. There were used NetStumbler and inSSIDer applications for this measurement. The last part of work contains measurement of security mechanisms (WEP, WPA, WPA2) effect to transfer rate from the point of view of the end user. The measurement was realized with Iperf application.
APA, Harvard, Vancouver, ISO, and other styles
6

Ikusan, Ademola A. "Collaboratively Detecting HTTP-based Distributed Denial of Service Attack using Software Defined Network." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1515067456228498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Taylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.

Full text
Abstract:
Asphalt and concrete reclamation machines are used to cut roadways when a repair is required. The performance of these machines can affect the quality of road repairs, and cost/profitability for both contractors and governments. We believe that several performance characteristics in reclamation machines are governed by the placement and pattern of cutting picks on the cutter head. Previous studies, focused on mining and excavation applications, have shown strong correlation between placement and wear. The following study employs a screening experiment (observational study) to find significant contributors to tool wear, in applications of asphalt milling or reclamation. We have found that picks fail by two primary modes: tip breakage, and body abrasive wear. Results indicate that the circumferential spacing of a bit, relative to neighboring bits, has the strongest effect on tip breakage. We have also shown that bit skew angle has a large positive effect on body abrasive wear.
APA, Harvard, Vancouver, ISO, and other styles
8

Larsson, Niklas, and Josefsson Fredrik Ågren. "A study of slow denial of service mitigation tools and solutions deployed in the cloud." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157721.

Full text
Abstract:
Slow rate Denial of Service (DoS) attacks have been shown to be a very effective way of attacking vulnerable servers while using few resources. This thesis investigates the effectiveness of mitigation tools used for protection against slow DoS attacks, specifically slowheader and slow body. Finally, we propose a service that cloud providers could implement to ensure better protection against slow rate DoS attacks. The tools studied in this thesis are, a Web Application firewall, a reverse proxy using an event-based architecture and Amazon’s Elastic Load Balancing. To gather data a realistic HTTP load script was built that simulated load on the server while using probe requests to gather response time data from the server. The script recorded the impact the attacks had for each server configuration.The results show that it’s hard to protect against slow rate DoS attacks while only using firewalls or load balancers. We found that using a reverse proxy with an event-based architecture was the best way to protect against slow rate DoS attacks and that such a service would allow the customer to use their server of choice while also being protected.
APA, Harvard, Vancouver, ISO, and other styles
9

SEGAFREDO, GIULIA. "New Heart Failure Hospitalization in the Italian region of Lombardy - Epidemiological and economic impact." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2015. http://hdl.handle.net/10281/76821.

Full text
Abstract:
Le ospedalizzazioni per scompenso cardiaco (hospitalized heart failure, HHF) costituiscono un notevole problema per i sistemi sanitari, sia dal punto di vista clinico che di salute pubblica. Data l’eterogeneità delle manifestazioni e degli esiti della malattia, la letteratura più recente ha suggerito di distinguere i pazienti ambulatoriali con scompenso cardiaco da quelli con un’ospedalizzazione per scompenso cardiaco. La ragione di questa scelta è che la prognosi di questi due gruppi di pazienti sembra essere molto diversa. La prognosi dei pazienti ambulatoriali, infatti, è cambiata radicalmente, in modo positivo, negli ultimi vent’anni, grazie allo sviluppo di nuovi trattamenti, come gli ACE-inibitori, i bloccanti del recettore dell'angiotensina (ARB), i beta-bloccanti, gli antagonisti del recettore dei mineralcorticoidi, l’utilizzo della terapia di risincronizzazione e di defibrillatori impiantabili, mentre quella dei pazienti HHF è rimasta pressoché invariata. Inoltre, sebbene la ricerca clinica ed epidemiologica abbia posto grande attenzione a diversi aspetti della gestione dei pazienti ambulatoriali, portando ad una buona conoscenza delle caratteristiche epidemiologiche, fisiopatologiche e farmacologiche, tali conoscenze non sono completamente applicabili all’ambito del HHF, lasciando aperti alcuni importanti quesiti riguardo l’impatto di tale condizione. L'obiettivo di questo progetto è stato, attraverso l'utilizzo dei database sanitari amministrativi della Regione Lombardia, di meglio caratterizzare l'impatto di HHF cercando di fornire una risposta a queste tre domande: 1. Quanti sono i nuovi pazienti con HHF nella Regione Lombardia? In questo capitolo sono stati descritti i metodi sviluppati per quantificare l'impatto epidemiologico del HHF in questa regione. Più in dettaglio, è descritto il processo che ha portato all’identificazione della fonte di dati appropriata, allo sviluppo di un algoritmo per l'identificazione del paziente, alla selezione dei casi e alla quantificazione del tasso d'incidenza e del tasso di attacco. 2. Determinanti di nuove ospedalizzazioni per scompenso - Fattori di rischio In questo capitolo è stato valutato il ruolo del trattamento antipertensivo nella prevenzione HHF. Più specificamente è stato valutato (i) l'effetto dell’aderenza al trattamento antipertensivo (ii) l'effetto del farmaco all'ingresso (iii) l'effetto dell’aderenza ad una specifica classe antipertensivi, sulla comparsa del primo episodio di HHF in una popolazione di nuovi utilizzatori di antipertensivi. 3. Conseguenze dei nuovi ricoveri per scompenso cardiaco - Esiti, fattori prognostici e impatto economico. In questo capitolo, sono stati descritti (i)frequenza di mortalità e riospdedalizzazioni a breve (trenta giorni) e lungo (un anno) termine dopo la prima ospedalizzazione per HF, (ii) fattori prognostici a breve e lungo termine, (iii) impatto economico di HHF in Regione Lombardia.
APA, Harvard, Vancouver, ISO, and other styles
10

Carvalho, Thiago Lima de Carvalho. "Comparação de respotas funcionais de duas espécie de peixes píscivoras." Universidade Federal Rural do Semi-Árido, 2016. http://bdtd.ufersa.edu.br:80/tede/handle/tede/573.

Full text
Abstract:
Submitted by Socorro Pontes (socorrop@ufersa.edu.br) on 2017-03-20T15:42:34Z No. of bitstreams: 1 ThiagoLC_DISSERT.pdf: 1446311 bytes, checksum: f9df761557b8cd9c1f4395f10697bdbd (MD5)
Made available in DSpace on 2017-03-20T15:42:35Z (GMT). No. of bitstreams: 1 ThiagoLC_DISSERT.pdf: 1446311 bytes, checksum: f9df761557b8cd9c1f4395f10697bdbd (MD5) Previous issue date: 2016-02-22
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Species of the Cichla genus have been introduced in a variety of tropical aquatic ecosystems, thus resulting in a marked reduction in diversity and population size of native fish assemblies due to their predatory behavior. Despite Cichla induced impact the mechanisms by which the species are still poorly known. In this study we compared the functional response of an alien predator fish C. kelberi and a native predator H. aff. malabaricus. More specifically, the tested hypotheses were: 1) both predator species have functional responses of type II on different prey species, and 2) the functional responses of the alien predator were higher for all preys when compared to the native predator. The predators were acclimated in tanks of 500 liters and fed twice daily with preys O. niloticus and L.vannamei for 3 days, 4 preys in the morning and 4 in the afternoon. Hunger levels were standardized after a fast of 48 hours. After the pre-experimental phase an exemplar of C. kelberi was randomly introduced in each tank of O. niloticus with initial prey densities of 2, 4, 8, 16, 25 and 40, and for L. vannamei 2, 4, 8, 16, 32 and 64 (n = 4 per density). After 24 hours the number of prey consumed was counted. This method was repeated for the native predator H. aff. malabaricus. Totaling 48 experimental units. The functional response C. kelberi was greater than or equivalent to the native predator H. aff. malabaricus. There was no difference in consumption between the two species at low densities. The attack rate did not differ between the two predators and handling time was driven by C. kelberi for the species O. niloticus. However, the two species showed functional response type II, thus corroborating with the comparative functional response method to predict the impact on native communities. Functional Comparative Response is a quick and reliable method to predict the ecological impacts of invasive species
Espécies do gênero Cichla têm sido introduzidas em vários ecossistemas aquáticos tropicais, resultando em uma redução na diversidade e tamanho populacional de assembleias de peixes nativos, devido a sua atuação predatória. Os mecanismos de predação pelos quais o tucunaré (Cichla kelberi) permanece pouco conhecido. Nesse estudo foram comparadas as resposta funcionais de um peixe predador alienígena C. kelberi e de um predador nativo Hoplias aff. malabaricus. Especificamente, foram testadas as hipóteses: 1) que ambas as espécies de predador apresentam respostas funcionais do Tipo II, na qual a espécie preda em baixa densidade, sobre diferentes espécies de presas, e que 2) as respostas funcionais do predador alienígena foram maiores para todas as presas, quando comparados com o predador nativo. Os predadores foram aclimatados nos tanques de 500 litros e alimentados duas vezes ao dia com alevinos de Oreochromis niloticus e Litopenaeus vannamei durante 3 dias, 4 presas pela manhã e 4 presas a tarde. Os níveis de fome foram padronizados depois de um jejum de 48 horas. Foi introduzido aleatoriamente um exemplar de C. kelberi em cada tanque de O. niloticus com densidades iniciais de presas de 2, 4, 8, 16, 25 e 40 e para L. vannamei 2, 4, 8, 16, 32 e 64 (n = 4 por densidade), e depois de 24 horas contabilizado o número de presas consumidas. Este método foi repetido para o predador nativo H. aff. malabaricus. Totalizando 48 unidades experimentais. A resposta funcional de C, kelberi foi maior ou equivalente a do predador nativo H. aff. malabaricus. Não houve diferença no consumo entre as duas espécies nas baixas densidades. A taxa de ataque não diferenciou entre os dois predadores e o tempo de manipulação foi impulsionado por C, kelberi para a espécie O. niloticus. As duas espécies apresentaram resposta funcional do tipo II corroborando com o método de resposta funcional comparativa de prever os impactos nas comunidades nativas. Respostas funcionais é um método rápido e confiável para previsão de impactos ecológicos de espécies invasoras
2017-03-20
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Attack rate"

1

United States. General Accounting Office. National Security and International Affairs Division. Joint direct attack munition: Low-rate initial production decision. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Owings, Lisa. Rat attack. Minneapolis, MN: Bellwether Media, Inc., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rat attacks. New York: Scholastic Inc., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1968-, Francis Peter, Matthews Roger 1948-, and University of Leicester. Centre for the Study of Public Order., eds. Tackling racial attacks. Leicester: Centre for the Study of Public Order, University of Leicester, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Buiter, Willem H. Anomalous speculative attacks on fixed exchange rate regimes. Coventry: University of Warwick, Dept. of Economics, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

N, Morris J., British Medical Association, and British Cardiac Society, eds. Exercise in leisure time: Coronary attack and death rates. London: British Medical Association in association with the British Cardiac Society, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Scattaglia, Maria. Speculative attacks in an exchange rate model with Calvo contracts. [s.l.]: typescript, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hayward, Helen. The race to the bottom: Workers' rights under global attack. London: War on Want, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Iain Duncan. A race against time: Europe's growing vulnerability to missile attack. London: Stephen Gilbert on behalf of the Conservative Party, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Melick, William R. Estimation of speculative attack models: Mexico yet again. Basle, Switzerland: Bank for International Settlements, Monetary and Economic Dept., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Attack rate"

1

Nahler, Gerhard. "attack rate." In Dictionary of Pharmaceutical Medicine, 10–11. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nahler, Gerhard. "secondary attack rate." In Dictionary of Pharmaceutical Medicine, 167. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maciá-Fernández, Gabriel, Jesús E. Díaz-Verdejo, and Pedro García-Teodoro. "Low Rate DoS Attack to Monoprocess Servers." In Security in Pervasive Computing, 43–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Molland, Håvard, John Erik Mathiassen, and Tor Helleseth. "Improved Fast Correlation Attack Using Low Rate Codes." In Cryptography and Coding, 67–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40974-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Li, Jie Chen, and Bo Zhang. "Improved RED Algorithm for Low-Rate DoS Attack." In Advances in Intelligent and Soft Computing, 311–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28655-1_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maciá-Fernández, Gabriel, Jesús E. Díaz-Verdejo, Pedro García-Teodoro, and Francisco de Toro-Negro. "LoRDAS: A Low-Rate DoS Attack against Application Servers." In Critical Information Infrastructures Security, 197–209. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89173-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sood, Shaurya, Manash Saikia, and Neminath Hubballi. "WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters." In Information Systems Security, 26–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Xiu-gui, Xiang-yun Qian, Rui Zhang, Ning Huang, and Hui Xia. "Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons." In Wireless Algorithms, Systems, and Applications, 375–83. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19214-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ahmed, Ejaz, George Mohay, Alan Tickle, and Sajal Bhatia. "Use of IP Addresses for High Rate Flooding Attack Detection." In Security and Privacy – Silver Linings in the Cloud, 124–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15257-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Yajuan. "Countermeasures on Application Level Low-Rate Denial-of-Service Attack." In Information and Communications Security, 70–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attack rate"

1

Poggioni, Valentina, Alina Elena Baia, and Alfredo Milani. "Combining Attack Success Rate and DetectionRate for effective Universal Adversarial Attacks." In ESANN 2021 - European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Louvain-la-Neuve (Belgium): Ciaco - i6doc.com, 2021. http://dx.doi.org/10.14428/esann/2021.es2021-160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flores, Carlos E., Mireya Méndez, Bernardita Chateau, Claudia Astudillo, Hugo Cerda, Soledad Montes, and Tatiana Espinoza. "Attack Rate Of Adenovirus In Childrens Hospital." In American Thoracic Society 2011 International Conference, May 13-18, 2011 • Denver Colorado. American Thoracic Society, 2011. http://dx.doi.org/10.1164/ajrccm-conference.2011.183.1_meetingabstracts.a4933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Jingtang, and Xiaolong Yang. "The NewShrew attack: A new type of low-rate TCP-Targeted DoS attack." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mathew, R., and V. Katkar. "Survey of low rate DoS attack detection mechanisms." In the International Conference & Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Udhayan, J., and R. Anitha. "Demystifying and Rate Limiting ICMP hosted DoS/DDoS Flooding Attacks with Attack Productivity Analysis." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grauer, Jared A., Eugene A. Morelli, and Daniel G. Murri. "Flight Test Techniques for Quantifying Pitch Rate and Angle of Attack Rate Dependencies." In AIAA Atmospheric Flight Mechanics Conference. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2017. http://dx.doi.org/10.2514/6.2017-0935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhuyan, M. H., A. Kalwar, A. Goswami, D. K. Bhattacharyya, and J. K. Kalita. "Low-Rate and High-Rate Distributed DoS Attack Detection Using Partial Rank Correlation." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Samaali, Imen, Monia Turki-Hadj Alouane, and Gael Mane. "Attack restoration in low bit-rate audio coding, using an algebraic detector for attack localization." In 2010 5th International Symposium On I/V Communications and Mobile Network (ISVC). IEEE, 2010. http://dx.doi.org/10.1109/isvc.2010.5656260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Zenghui, and Liguo Guan. "Attack Simulation and Signature Extraction of Low-Rate DoS." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumawat, Harsh, and Gaurav Meena. "Characterization, Detection and Mitigation of Low-Rate DoS attack." In the 2014 International Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2677855.2677924.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attack rate"

1

Hu, Yang Yang, Xing Zhang, Yue Luo, and Yadong Wang. Systematic review and Meta analysis of the efficacy and safety of rifaximin in the prevention and treatment of hepatic encephalopathy. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, February 2023. http://dx.doi.org/10.37766/inplasy2023.2.0061.

Full text
Abstract:
Review question / Objective: P:Liver cirrhosis patients with risk factors associated with HE attack;HE patients caused by chronic liver diseases represented by cirrhosis. I: Rifaximin treatment. C: Other drugs or placebo. O:HE incidence; HE improvement; All-cause mortality; Blood ammonia level; PSE index; mental state; NCT-A; NCT-B; Adverse events. Condition being studied: Hepatic encephalopathy(HE) is a neuropsychiatric disorder syndrome based on metabolic disorders, which is caused by severe acute and chronic liver dysfunction or various abnormalities of portosystemic shunt (hereinafter referred to as portosystemic shunt). The research data shows that the prevalence of OHE in patients with cirrhosis is 10-14%, and the prevalence of HE in patients with decompensated cirrhosis is 16-21%. HE can lead to 60-80% of patients with liver cirrhosis with mild cognitive impairment, affecting their ability of daily life and quality of life. When OHE occurs, the one-year mortality rate of patients with liver cirrhosis is 64%, which brings a heavy economic burden to patients and public health resources. Therefore, the prevention and early management of HE is very important.
APA, Harvard, Vancouver, ISO, and other styles
2

Flach, G. P. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling. Office of Scientific and Technical Information (OSTI), May 2015. http://dx.doi.org/10.2172/1179683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Flood, Robert, and Peter Garber. The Linkage Between Speculative Attack and Target Zone Models of Exchange Rates. Cambridge, MA: National Bureau of Economic Research, April 1989. http://dx.doi.org/10.3386/w2918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Buiter, Willem. Borrowing to Defend the Exchange Rate and the Timing and Magnitude of Speculative Attacks. Cambridge, MA: National Bureau of Economic Research, February 1986. http://dx.doi.org/10.3386/w1844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Villamizar-Villegas, Mauricio, Lucía Arango-Lozano, Geraldine Castelblanco, Nicolás Fajardo-Baquero, and Maria A. Ruiz-Sanchez. The effects of Monetary Policy on Capital Flows: A Meta-Analysis. Banco de la República de Colombia, July 2022. http://dx.doi.org/10.32468/be.1204.

Full text
Abstract:
We investigate whether central banks are able to attract or redirect capital flows, by bringing together the entire empirical literature into the first quantitative meta-analysis on the subject. We dissect policy effects by the type of flow and by the origin of the monetary shock. Further, we assess whether policy effects depend on factors that drive investors to either search for yields or fly to safety. Our findings indicate a mean effect size of inflows in the amount of 0.09% of quarterly GDP in response to either a 100 basis point (bp) increase in the domestic policy rate or a 100bp reduction in the external rate. However, the effect size under a random effect specification is much lower (0.01%). Factors that significantly attract inflows include foreign exchange reserves, output growth, and financial openness, while factors that deter flows include foreign debt, capital controls, and departures from the uncovered interest rate parity. Also, both local and global risks matter (global risks exerting a larger pressure). Finally, we shed light on differences across the different types of flows: banking flows being the most responsive to monetary policy, while foreign direct investment being the least responsive.
APA, Harvard, Vancouver, ISO, and other styles
6

Zwetsloot, Remco, Jacob Feldgoise, and James Dunham. Trends in U.S. Intention-to-Stay Rates of International Ph.D. Graduates Across Nationality and STEM Fields. Center for Security and Emerging Technology, April 2020. http://dx.doi.org/10.51593/20200001.

Full text
Abstract:
Policymakers continue to debate the ability of the United States to attract and retain top international talent. This Issue Brief assesses how many international Ph.D. graduates across various STEM fields and nationalities intend to stay in the United States after completing their degrees.
APA, Harvard, Vancouver, ISO, and other styles
7

Eichengreen, Barry, Andrew Rose, and Charles Wyplosz. Speculative Attacks on Pegged Exchange Rates: An Empirical Exploration with Special Reference to the European Monetary System. Cambridge, MA: National Bureau of Economic Research, October 1994. http://dx.doi.org/10.3386/w4898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/nevx1787.

Full text
Abstract:
As research continues into how fire department interventions affect fire dynamics in the modern fire environment; questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies may not support current, experienced-based practices. This gap between the research to date and the fire ground suppression experience has driven the need for further study. Therefore, research into the various methods of fire attack will allow a broader understanding of how firefighter interventions on the fire ground can impact the outcome of both life safety and property protection. This study will build upon the fire research conducted to date by analyzing how firefighting tactics, specifically different fire suppression tools and tactics, affect the thermal exposure and survivability of both firefighters and building occupants and affect fire behavior in structures. The purpose of this study is to improve firefighter safety, fireground tactics, and the knowledge of fire dynamics by providing the fire service with scientific information, developed from water flow and full-scale fire testing, in representative single-family homes. The project will be comprised of 3 parts: • Part I: Water Distribution • Part II: Air Entrainment • Part III: Full-Scale Residential Fire Experiments This report details the results and analysis from the water distribution experiments. These tests were conducted without the presence of fire to gain a fundamental understanding of water flows into compartments. Each test was designed to quantify water distribution within a compartment by evaluating the differences caused by various application methods, hose stream types, nozzle movements, pressures/flow rates, stream locations and elevation angles.
APA, Harvard, Vancouver, ISO, and other styles
9

Weinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/gmax3657.

Full text
Abstract:
As research continues into how fire department interventions affect fire dynamics in the modern fire environment, questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies did not support current, experience-based practices. This gap between the research to date and the fire ground suppression experience has driven the need for further study. This study will build upon the fire research conducted to date by analyzing how firefighting tactics, specifically different fire suppression tools and tactics, affect the thermal exposure and survivability of both firefighters and building occupants and affect fire behavior in structures. The purpose of this study is to improve firefighter safety, fire ground tactics, and the knowledge of fire dynamics by providing the fire service with scientific information, developed from water flow and full-scale fire testing, in representative single-family homes. This study will build and expand upon the fire research conducted to date by analyzing how firefighting tactics, specifically suppression methods, affect the thermal exposure and survivability of both firefighters and building occupants in addition to impacting fire behavior in structures. The purpose of this study is to improve firefighter safety, fireground tactics, and the knowledge of fire dynamics by providing the fire service with credible scientific information, developed from both water flow and full-scale fire testing, in representative single family homes. The project is comprised of 3 parts: • Part I: Water Distribution • Part II: Air Entrainment • Part III: Full-Scale Residential Fire Experiments This report details the results and analysis from the air entrainment testing. These tests were conducted without the presence of fire to gain a fundamental understanding of how hose streams entrain air. Each set of experiments was intended to add to the understanding of air entrainment and pressure from fire service hose streams by evaluating the differences caused by various application methods, hose stream types, nozzle movements, pressures/flow rates, manufacturers, and ventilation configurations.
APA, Harvard, Vancouver, ISO, and other styles
10

Castro, Rubén, Leonardo González, Ignacio Schiappacasse, and Juan Tapia. The Impact of Covid-19 on Pensions due to Early Withdrawals of Pension Savings. Inter-American Development Bank, November 2022. http://dx.doi.org/10.18235/0004517.

Full text
Abstract:
The Chilean pension system was hit hard during 2020-2021 by the withdrawal of 25 per cent of the individual pensions funds accumulated by 2019, an amount equivalent to 20 per cent of Chiles GDP. We estimate here the impact of those withdrawals on new pension allowances, using a combination of official data sets and the IDB model for the actuarial projection of pensions, including its heterogeneity matrix, to simulate the distribution of pension impacts. The withdrawal impact decreases in new retirees of future years until disappearing around the year 2065. We estimate respective impacts of about 31 percent and 37 percent for males and females new self-financed pensions around the year 2022, which goes to about 56 percent among the third of the affiliates with the lowest savings. However, we found that the recent increase in non-contributory pensions more than counteracted this impact for roughly 90 percent of 2022 new retirees. Regarding labor markets shocks, we found only a moderate role for them in the long-term evolution of the pension system, as we also found to be the case of seven Caribbean countries (Cuba, Haiti, Dominican Republic, Jamaica, Trinidad and Tobago, Bahamas and Barbados). As an overall conclusion, we recommend studying contribution rates, because low-salary workers attain a substantial replacement rate with just the non-contributory pension, which casts doubt on whether a mandatory contribution is appropriate for them.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography