Academic literature on the topic 'Attack rate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack rate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack rate"
Wu, Zhijun, Yue Yin, Guang Li, and Meng Yue. "Coherent Detection of Synchronous Low-Rate DoS Attacks." Security and Communication Networks 2021 (March 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6694264.
Full textXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Full textAladaileh, Mohammad Adnan, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Taief Alaa Al-Amiedy, and Dyala R. Ibrahim. "Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis." Applied Sciences 13, no. 2 (January 5, 2023): 775. http://dx.doi.org/10.3390/app13020775.
Full textAsh, Caroline. "Attack rate in Manaus." Science 371, no. 6526 (January 14, 2021): 248.16–250. http://dx.doi.org/10.1126/science.371.6526.248-p.
Full textMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Full textKruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (June 1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.
Full textZhou, Lu, Mingchao Liao, Cao Yuan, and Haoyu Zhang. "Low-Rate DDoS Attack Detection Using Expectation of Packet Size." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3691629.
Full textLysenko, Sergii, Kira Bobrovnikova, Serhii Matiukh, Ivan Hurman, and Oleg Savenko. "Detection of the botnets’ low-rate DDoS attacks based on self-similarity." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3651. http://dx.doi.org/10.11591/ijece.v10i4.pp3651-3659.
Full textLei, Gang, Lejun Ji, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang. "Extracting Low-Rate DDoS Attack Characteristics: The Case of Multipath TCP-Based Communication Networks." Wireless Communications and Mobile Computing 2021 (July 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/2264187.
Full textAmstey, Marvin S. "Attack rate for neonatal herpesvirus." American Journal of Obstetrics and Gynecology 155, no. 1 (July 1986): 229–30. http://dx.doi.org/10.1016/0002-9378(86)90127-4.
Full textDissertations / Theses on the topic "Attack rate"
Chui, Hiu-fai Sam. "Evaluation of measures taken by financial institutes under the interest rate swing caused by the currency attack /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19882117.
Full textChui, Hiu-fai Sam, and 徐曉暉. "Evaluation of measures taken by financial institutes under the interest rate swing caused by the currency attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268766.
Full textSaran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.
Full textDistinguished Point Method and Rainbow Method. Finally, we discuss the adjustment of the parameters to achieve a high success rate. To support our theoretical framework, we also present empirical results of our analysis to actual ciphers.
Xia, Yu. "Selective Dropping of Rate Limiting Against Denial of Service Attacks." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1461705316.
Full textBencel, Jozef. "Analýza bezpečnosti bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218125.
Full textIkusan, Ademola A. "Collaboratively Detecting HTTP-based Distributed Denial of Service Attack using Software Defined Network." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1515067456228498.
Full textTaylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.
Full textLarsson, Niklas, and Josefsson Fredrik Ågren. "A study of slow denial of service mitigation tools and solutions deployed in the cloud." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157721.
Full textSEGAFREDO, GIULIA. "New Heart Failure Hospitalization in the Italian region of Lombardy - Epidemiological and economic impact." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2015. http://hdl.handle.net/10281/76821.
Full textCarvalho, Thiago Lima de Carvalho. "Comparação de respotas funcionais de duas espécie de peixes píscivoras." Universidade Federal Rural do Semi-Árido, 2016. http://bdtd.ufersa.edu.br:80/tede/handle/tede/573.
Full textMade available in DSpace on 2017-03-20T15:42:35Z (GMT). No. of bitstreams: 1 ThiagoLC_DISSERT.pdf: 1446311 bytes, checksum: f9df761557b8cd9c1f4395f10697bdbd (MD5) Previous issue date: 2016-02-22
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Species of the Cichla genus have been introduced in a variety of tropical aquatic ecosystems, thus resulting in a marked reduction in diversity and population size of native fish assemblies due to their predatory behavior. Despite Cichla induced impact the mechanisms by which the species are still poorly known. In this study we compared the functional response of an alien predator fish C. kelberi and a native predator H. aff. malabaricus. More specifically, the tested hypotheses were: 1) both predator species have functional responses of type II on different prey species, and 2) the functional responses of the alien predator were higher for all preys when compared to the native predator. The predators were acclimated in tanks of 500 liters and fed twice daily with preys O. niloticus and L.vannamei for 3 days, 4 preys in the morning and 4 in the afternoon. Hunger levels were standardized after a fast of 48 hours. After the pre-experimental phase an exemplar of C. kelberi was randomly introduced in each tank of O. niloticus with initial prey densities of 2, 4, 8, 16, 25 and 40, and for L. vannamei 2, 4, 8, 16, 32 and 64 (n = 4 per density). After 24 hours the number of prey consumed was counted. This method was repeated for the native predator H. aff. malabaricus. Totaling 48 experimental units. The functional response C. kelberi was greater than or equivalent to the native predator H. aff. malabaricus. There was no difference in consumption between the two species at low densities. The attack rate did not differ between the two predators and handling time was driven by C. kelberi for the species O. niloticus. However, the two species showed functional response type II, thus corroborating with the comparative functional response method to predict the impact on native communities. Functional Comparative Response is a quick and reliable method to predict the ecological impacts of invasive species
Espécies do gênero Cichla têm sido introduzidas em vários ecossistemas aquáticos tropicais, resultando em uma redução na diversidade e tamanho populacional de assembleias de peixes nativos, devido a sua atuação predatória. Os mecanismos de predação pelos quais o tucunaré (Cichla kelberi) permanece pouco conhecido. Nesse estudo foram comparadas as resposta funcionais de um peixe predador alienígena C. kelberi e de um predador nativo Hoplias aff. malabaricus. Especificamente, foram testadas as hipóteses: 1) que ambas as espécies de predador apresentam respostas funcionais do Tipo II, na qual a espécie preda em baixa densidade, sobre diferentes espécies de presas, e que 2) as respostas funcionais do predador alienígena foram maiores para todas as presas, quando comparados com o predador nativo. Os predadores foram aclimatados nos tanques de 500 litros e alimentados duas vezes ao dia com alevinos de Oreochromis niloticus e Litopenaeus vannamei durante 3 dias, 4 presas pela manhã e 4 presas a tarde. Os níveis de fome foram padronizados depois de um jejum de 48 horas. Foi introduzido aleatoriamente um exemplar de C. kelberi em cada tanque de O. niloticus com densidades iniciais de presas de 2, 4, 8, 16, 25 e 40 e para L. vannamei 2, 4, 8, 16, 32 e 64 (n = 4 por densidade), e depois de 24 horas contabilizado o número de presas consumidas. Este método foi repetido para o predador nativo H. aff. malabaricus. Totalizando 48 unidades experimentais. A resposta funcional de C, kelberi foi maior ou equivalente a do predador nativo H. aff. malabaricus. Não houve diferença no consumo entre as duas espécies nas baixas densidades. A taxa de ataque não diferenciou entre os dois predadores e o tempo de manipulação foi impulsionado por C, kelberi para a espécie O. niloticus. As duas espécies apresentaram resposta funcional do tipo II corroborando com o método de resposta funcional comparativa de prever os impactos nas comunidades nativas. Respostas funcionais é um método rápido e confiável para previsão de impactos ecológicos de espécies invasoras
2017-03-20
Books on the topic "Attack rate"
United States. General Accounting Office. National Security and International Affairs Division. Joint direct attack munition: Low-rate initial production decision. Washington, D.C: The Office, 1997.
Find full text1968-, Francis Peter, Matthews Roger 1948-, and University of Leicester. Centre for the Study of Public Order., eds. Tackling racial attacks. Leicester: Centre for the Study of Public Order, University of Leicester, 1993.
Find full textBuiter, Willem H. Anomalous speculative attacks on fixed exchange rate regimes. Coventry: University of Warwick, Dept. of Economics, 1990.
Find full textN, Morris J., British Medical Association, and British Cardiac Society, eds. Exercise in leisure time: Coronary attack and death rates. London: British Medical Association in association with the British Cardiac Society, 1990.
Find full textScattaglia, Maria. Speculative attacks in an exchange rate model with Calvo contracts. [s.l.]: typescript, 1993.
Find full textHayward, Helen. The race to the bottom: Workers' rights under global attack. London: War on Want, 2000.
Find full textSmith, Iain Duncan. A race against time: Europe's growing vulnerability to missile attack. London: Stephen Gilbert on behalf of the Conservative Party, 2002.
Find full textMelick, William R. Estimation of speculative attack models: Mexico yet again. Basle, Switzerland: Bank for International Settlements, Monetary and Economic Dept., 1996.
Find full textBook chapters on the topic "Attack rate"
Nahler, Gerhard. "attack rate." In Dictionary of Pharmaceutical Medicine, 10–11. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_91.
Full textNahler, Gerhard. "secondary attack rate." In Dictionary of Pharmaceutical Medicine, 167. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_1267.
Full textMaciá-Fernández, Gabriel, Jesús E. Díaz-Verdejo, and Pedro García-Teodoro. "Low Rate DoS Attack to Monoprocess Servers." In Security in Pervasive Computing, 43–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_5.
Full textMolland, Håvard, John Erik Mathiassen, and Tor Helleseth. "Improved Fast Correlation Attack Using Low Rate Codes." In Cryptography and Coding, 67–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40974-8_7.
Full textMa, Li, Jie Chen, and Bo Zhang. "Improved RED Algorithm for Low-Rate DoS Attack." In Advances in Intelligent and Soft Computing, 311–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28655-1_49.
Full textMaciá-Fernández, Gabriel, Jesús E. Díaz-Verdejo, Pedro García-Teodoro, and Francisco de Toro-Negro. "LoRDAS: A Low-Rate DoS Attack against Application Servers." In Critical Information Infrastructures Security, 197–209. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89173-4_17.
Full textSood, Shaurya, Manash Saikia, and Neminath Hubballi. "WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters." In Information Systems Security, 26–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0_2.
Full textYang, Xiu-gui, Xiang-yun Qian, Rui Zhang, Ning Huang, and Hui Xia. "Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons." In Wireless Algorithms, Systems, and Applications, 375–83. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19214-2_31.
Full textAhmed, Ejaz, George Mohay, Alan Tickle, and Sajal Bhatia. "Use of IP Addresses for High Rate Flooding Attack Detection." In Security and Privacy – Silver Linings in the Cloud, 124–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15257-3_12.
Full textTang, Yajuan. "Countermeasures on Application Level Low-Rate Denial-of-Service Attack." In Information and Communications Security, 70–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_7.
Full textConference papers on the topic "Attack rate"
Poggioni, Valentina, Alina Elena Baia, and Alfredo Milani. "Combining Attack Success Rate and DetectionRate for effective Universal Adversarial Attacks." In ESANN 2021 - European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Louvain-la-Neuve (Belgium): Ciaco - i6doc.com, 2021. http://dx.doi.org/10.14428/esann/2021.es2021-160.
Full textFlores, Carlos E., Mireya Méndez, Bernardita Chateau, Claudia Astudillo, Hugo Cerda, Soledad Montes, and Tatiana Espinoza. "Attack Rate Of Adenovirus In Childrens Hospital." In American Thoracic Society 2011 International Conference, May 13-18, 2011 • Denver Colorado. American Thoracic Society, 2011. http://dx.doi.org/10.1164/ajrccm-conference.2011.183.1_meetingabstracts.a4933.
Full textLuo, Jingtang, and Xiaolong Yang. "The NewShrew attack: A new type of low-rate TCP-Targeted DoS attack." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883403.
Full textMathew, R., and V. Katkar. "Survey of low rate DoS attack detection mechanisms." In the International Conference & Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1980022.1980227.
Full textUdhayan, J., and R. Anitha. "Demystifying and Rate Limiting ICMP hosted DoS/DDoS Flooding Attacks with Attack Productivity Analysis." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809072.
Full textGrauer, Jared A., Eugene A. Morelli, and Daniel G. Murri. "Flight Test Techniques for Quantifying Pitch Rate and Angle of Attack Rate Dependencies." In AIAA Atmospheric Flight Mechanics Conference. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2017. http://dx.doi.org/10.2514/6.2017-0935.
Full textBhuyan, M. H., A. Kalwar, A. Goswami, D. K. Bhattacharyya, and J. K. Kalita. "Low-Rate and High-Rate Distributed DoS Attack Detection Using Partial Rank Correlation." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.24.
Full textSamaali, Imen, Monia Turki-Hadj Alouane, and Gael Mane. "Attack restoration in low bit-rate audio coding, using an algebraic detector for attack localization." In 2010 5th International Symposium On I/V Communications and Mobile Network (ISVC). IEEE, 2010. http://dx.doi.org/10.1109/isvc.2010.5656260.
Full textLiu, Zenghui, and Liguo Guan. "Attack Simulation and Signature Extraction of Low-Rate DoS." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.38.
Full textKumawat, Harsh, and Gaurav Meena. "Characterization, Detection and Mitigation of Low-Rate DoS attack." In the 2014 International Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2677855.2677924.
Full textReports on the topic "Attack rate"
Hu, Yang Yang, Xing Zhang, Yue Luo, and Yadong Wang. Systematic review and Meta analysis of the efficacy and safety of rifaximin in the prevention and treatment of hepatic encephalopathy. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, February 2023. http://dx.doi.org/10.37766/inplasy2023.2.0061.
Full textFlach, G. P. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling. Office of Scientific and Technical Information (OSTI), May 2015. http://dx.doi.org/10.2172/1179683.
Full textFlood, Robert, and Peter Garber. The Linkage Between Speculative Attack and Target Zone Models of Exchange Rates. Cambridge, MA: National Bureau of Economic Research, April 1989. http://dx.doi.org/10.3386/w2918.
Full textBuiter, Willem. Borrowing to Defend the Exchange Rate and the Timing and Magnitude of Speculative Attacks. Cambridge, MA: National Bureau of Economic Research, February 1986. http://dx.doi.org/10.3386/w1844.
Full textVillamizar-Villegas, Mauricio, Lucía Arango-Lozano, Geraldine Castelblanco, Nicolás Fajardo-Baquero, and Maria A. Ruiz-Sanchez. The effects of Monetary Policy on Capital Flows: A Meta-Analysis. Banco de la República de Colombia, July 2022. http://dx.doi.org/10.32468/be.1204.
Full textZwetsloot, Remco, Jacob Feldgoise, and James Dunham. Trends in U.S. Intention-to-Stay Rates of International Ph.D. Graduates Across Nationality and STEM Fields. Center for Security and Emerging Technology, April 2020. http://dx.doi.org/10.51593/20200001.
Full textEichengreen, Barry, Andrew Rose, and Charles Wyplosz. Speculative Attacks on Pegged Exchange Rates: An Empirical Exploration with Special Reference to the European Monetary System. Cambridge, MA: National Bureau of Economic Research, October 1994. http://dx.doi.org/10.3386/w4898.
Full textWeinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Water Mapping. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/nevx1787.
Full textWeinschenk, Craig, Keith Stakes, and Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, December 2017. http://dx.doi.org/10.54206/102376/gmax3657.
Full textCastro, Rubén, Leonardo González, Ignacio Schiappacasse, and Juan Tapia. The Impact of Covid-19 on Pensions due to Early Withdrawals of Pension Savings. Inter-American Development Bank, November 2022. http://dx.doi.org/10.18235/0004517.
Full text