Academic literature on the topic 'Communicative attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Communicative attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Communicative attack"
Baryshnikov, N. V. "STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION." MGIMO Review of International Relations, no. 6(33) (December 28, 2013): 90–94. http://dx.doi.org/10.24833/2071-8160-2013-6-33-90-94.
Full textBahrom, Umarov, and Safarova Zamira. "Questions Communicative Attack in the Technology of Pedagogical Communication." International Journal of Social Science And Human Research 04, no. 04 (2021): 807–11. https://doi.org/10.47191/ijsshr/v4-i4-35.
Full textOlsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.
Full textSirajuddin, Mohammad. "Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.2 (2017): 178. http://dx.doi.org/10.14419/ijet.v7i1.2.9061.
Full textGukosyants, O. Yu, O. A. Alimuradov, and Z. U. Khakiyeva. "Communicative Strategies and Tactics of Trolls-Aggressors in Computer-Mediated Communication during COVID-19 Pandemic." Nauchnyi dialog 11, no. 7 (2022): 175–96. http://dx.doi.org/10.24224/2227-1295-2022-11-7-175-196.
Full textMyasnikov, Stanislav. "THE JUSTIFICATION STRATEGIES OF RUSSIAN FOREIGN POLICY SINCE 2014: A STUDY OF THE CASES OF CRIMEA JOINING RUSSIA AND RUSSIAN MILITARY OPERATION IN SYRIA." Вестник Пермского университета. Политология 14, no. 4 (2020): 14–26. http://dx.doi.org/10.17072/2218-1067-2020-4-14-26.
Full textDemirdiş, Semra. "Networked Gatekeeping in ‘Twitter’ During a Crisis Event: A Case Study of #Taksim in Türkiye." Etkileşim 6, no. 12 (2023): 216–34. http://dx.doi.org/10.32739/etkilesim.2023.6.12.220.
Full textTroshchenkova, Ekaterina. "“Communicative Parasitism” in the Russian Segment of Telegram Channels." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 2. Jazykoznanije, no. 5 (November 2023): 53–71. http://dx.doi.org/10.15688/jvolsu2.2023.5.4.
Full textKuchynska, Valeriiya. "IMPLEMENTATION OF COMMUNICATIVE STRATEGY OF DISCREDITATION AND ATTACK IN SPANISH POLITICAL DISCOURSE." PROBLEMS OF SEMANTICS, PRAGMATICS AND COGNITIVE LINGUISTICS, no. 41 (2022): 111–22. http://dx.doi.org/10.17721/2663-6530.2022.41.11.
Full textBrowning, Blair, and Jimmy Sanderson. "The Positives and Negatives of Twitter: Exploring How Student-Athletes Use Twitter and Respond to Critical Tweets." International Journal of Sport Communication 5, no. 4 (2012): 503–21. http://dx.doi.org/10.1123/ijsc.5.4.503.
Full textDissertations / Theses on the topic "Communicative attack"
Corzine, Larry M. "Communication breakdown DHS operations during a cyber attack." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4987.
Full textBas, Ali Karaca Volkan. "A simulation on organizational communication patterns during a terrorist attack." Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483636.
Full textKaraca, Volkan. "A simulation on organizational communication patterns during a terrorist attack." Thesis, Monterey, California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/4106.
Full textShahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.
Full textToure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Full textGroeling, Tim. "When politicians attack : the causes, contours, and consequences of partisan political communication /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2001. http://wwwlib.umi.com/cr/ucsd/fullcit?p3027048.
Full textLambert, Maria T. "Attack of the Mommy Mafia| Examining The Honest Company's Use of Coombs' SCCT Strategies." Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1593182.
Full textBedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textFranz, Elke, Stefan Pfennig, and André Fischer. "Communication Overhead of Network Coding Schemes Secure against Pollution Attacks." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-89807.
Full textAtiiq, Syafiq Al. "Adaptive Counteraction Against Denial of Service Attack." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219382.
Full textBooks on the topic "Communicative attack"
Baryshnikov, Nikolay. Fundamentals of professional intercultural communication. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1391408.
Full textGroeling, Tim J. When politicians attack: Party cohesion in the media. Cambridge University Press, 2010.
Find full textChakravarty, Sambuddho. Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication. [publisher not identified], 2014.
Find full textPang, Zhong-Hua, Guo-Ping Liu, Donghua Zhou, and Dehui Sun. Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-0520-7.
Full textKarppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. VTT Technical Research Centre of Finland, 2005.
Find full textDavid, Sanders, ed. Advocacy versus attack: The imipact of political adverstising in the 2001 UK general election. John F. Kennedy School of Government, Harvard University, 2002.
Find full textJr, Denton Robert E., ed. Language, symbols, and the media: Communication in the aftermath of the World Trade Center attack. Transaction Publishers, 2006.
Find full textJr, Denton Robert E., ed. Language, symbols, and the media: Communication in the aftermath of the World Trade Center attack. Transaction Publishers, 2004.
Find full textUnited States. General Accounting Office, ed. Army aviation: Apache Longbow weight and communication issues : report to the Secretary of Defense. The Office, 1998.
Find full textOffice, General Accounting. Army aviation: Modernization strategy needs to be reassessed : report to Congressional requesters. The Office, 1994.
Find full textBook chapters on the topic "Communicative attack"
Almström Persson, Gunilla. "Crisis Communication on Social Media: Informalization in the Hour-by-Hour Struggle for Information." In Nordic Perspectives on the Discourse of Things. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33122-0_6.
Full textYang, Qing, and Lin Huang. "Satellite Communication." In Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8_9.
Full textGazdag, András, György Lupták, and Levente Buttyán. "Correlation-Based Anomaly Detection for the CAN Bus." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_4.
Full textFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Full textYang, Qing, and Lin Huang. "433/315 MHz Communication." In Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8_4.
Full textBriddick, Curtis, Pam Briggs, and James Nicholson. "Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62918-1_5.
Full textJap, Dirmanto, and Jakub Breier. "Differential Fault Attack on LEA." In Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_27.
Full textKwatra, Saloni, and Vicenç Torra. "Empirical Evaluation of Synthetic Data Created by Generative Models via Attribute Inference Attack." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57978-3_18.
Full textKantzavelou, Ioanna, and Patel A. "Issues of attack in distributed systems - A Generic Attack Model." In IFIP Advances in Information and Communication Technology. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34943-5_1.
Full textSirur, Sean, and Tim Muller. "The Reputation Lag Attack." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33716-2_4.
Full textConference papers on the topic "Communicative attack"
Kumar, Atul, and Kalpna Guleria. "Comprehensive Analysis and Detection of Multi-Step Cyber Attacks: Insights from the Multi-Step Cyber-Attack Dataset." In 2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2024. https://doi.org/10.1109/iceca63461.2024.10801010.
Full textShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Full textK, Ananthajothi, Adharshin C, and Amirdha M. "Security-Aware IoT Attack Detection Framework." In 2025 International Conference on Computing and Communication Technologies (ICCCT). IEEE, 2025. https://doi.org/10.1109/iccct63501.2025.11019030.
Full textAlahmadi, Mohammed. "Detecting SYN Flood Attack Using CSA-Nets." In 9th International Conference on Computer Science, Engineering and Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.132301.
Full textSegura, Gustavo A. Nunez, Arsenia Chorti, and Cíntia Borges Margi. "IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.
Full textFu, Yangyang, Zheng O’Neill, Jin Wen, and Veronica Adetola. "Evaluating the Impact of Cyber-Attacks on Grid-Interactive Efficient Buildings." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-73694.
Full textSinha, Somnath, and Sindhu B. "Impact of DoS attack in IoT system and identifying the attacker location for interference attacks." In 2021 6th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2021. http://dx.doi.org/10.1109/icces51350.2021.9489041.
Full textDayarathne, M. A. S. P., M. S. M. Jayathilaka, and R. M. V. A. Bandara. "Analysis of cyber attacks in power grids with increasing renewable energy penetration." In Engineering Research Unit Symposium 2023. Engineering Research Unit, 2023. http://dx.doi.org/10.31705/eru.2023.13.
Full textJovanović, Dragana, Vesna Karadžić, and Milena Vasić. "Risk communication challenges in a biological or chemical terror attack." In Proceedings of the International Congress Public Health - Achievements and Challenges. Institute of Public Health of Serbia "Dr Milan Jovanović Batut", 2024. http://dx.doi.org/10.5937/batutphco24020j.
Full textLim, Wei Heng, Weng Foong Liew, Chun Yew Lum, and Seah Fang Lee. "Phishing Security: Attack, Detection, and Prevention Mechanisms." In International Conference on Digital Transformation and Applications (ICDXA 2020). Tunku Abdul Rahman University College, 2020. http://dx.doi.org/10.56453/icdxa.2020.1017.
Full textReports on the topic "Communicative attack"
de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textSmythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.
Full textMartínez Solana, MY, AG Frazão Nogueira, and KP Valarezo. Communication of crisis management at the United Kingdom 2017’s attacks. Proposal for a protocol 2.0 for the communication of crisis. Revista Latina de Comunicación Social, 2017. http://dx.doi.org/10.4185/rlcs-2017-1235en.
Full textFloyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Full textOliveira, Andrea, and Asunción Huertas-Roig. La comunicación de crisis de Barcelona tras el atentado terrorista / The crisis communication of Barcelona after the terrorist attack. Revista Internacional de Relaciones Públicas, 2018. http://dx.doi.org/10.5783/rirp-15-2018-02-05-22.
Full textSotello, Wendy J., John T. Penner, Cynthia K. Scharf, and James B. Keeth. F-16 Avionic Systems Attack Control, Instrument and Flight Control, Communication, Navigation, and Penetration Aids. Training Requirements Analysis 452X2. Volume 1. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada252786.
Full textTorres-Mancera, Rocio, Carlos de las Heras-Pedrosa, Carmen Jambrino-Maldonado, and Patricia P. Iglesias-Sanchez. Public Relations and the Fundraising professional in the Cultural Heritage Industry: a study of Spain and Mexico / Las relaciones públicas y el profesional de la captación de fondos en la industria del patrimonio cultural: un estudio de España y México. Revista Internacional de Relaciones Públicas, 2021. http://dx.doi.org/10.5783/rirp-21-2021-03-27-48.
Full textTotten, Annette, Dana M. Womack, Marian S. McDonagh, et al. Improving Rural Health Through Telehealth-Guided Provider-to-Provider Communication. Agency for Healthcare Research and Quality, 2022. http://dx.doi.org/10.23970/ahrqepccer254.
Full textHorton, David, Victoria Soroker, Peter Landolt, and Anat Zada Byers. Characterization and Chemistry of Sexual Communication in Two Psyllid Pests of Pears (Homoptera: Psyllidae). United States Department of Agriculture, 2011. http://dx.doi.org/10.32747/2011.7592653.bard.
Full textDrury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.
Full text