Journal articles on the topic 'Communicative attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Communicative attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Baryshnikov, N. V. "STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION." MGIMO Review of International Relations, no. 6(33) (December 28, 2013): 90–94. http://dx.doi.org/10.24833/2071-8160-2013-6-33-90-94.
Full textBahrom, Umarov, and Safarova Zamira. "Questions Communicative Attack in the Technology of Pedagogical Communication." International Journal of Social Science And Human Research 04, no. 04 (2021): 807–11. https://doi.org/10.47191/ijsshr/v4-i4-35.
Full textOlsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.
Full textSirajuddin, Mohammad. "Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.2 (2017): 178. http://dx.doi.org/10.14419/ijet.v7i1.2.9061.
Full textGukosyants, O. Yu, O. A. Alimuradov, and Z. U. Khakiyeva. "Communicative Strategies and Tactics of Trolls-Aggressors in Computer-Mediated Communication during COVID-19 Pandemic." Nauchnyi dialog 11, no. 7 (2022): 175–96. http://dx.doi.org/10.24224/2227-1295-2022-11-7-175-196.
Full textMyasnikov, Stanislav. "THE JUSTIFICATION STRATEGIES OF RUSSIAN FOREIGN POLICY SINCE 2014: A STUDY OF THE CASES OF CRIMEA JOINING RUSSIA AND RUSSIAN MILITARY OPERATION IN SYRIA." Вестник Пермского университета. Политология 14, no. 4 (2020): 14–26. http://dx.doi.org/10.17072/2218-1067-2020-4-14-26.
Full textDemirdiş, Semra. "Networked Gatekeeping in ‘Twitter’ During a Crisis Event: A Case Study of #Taksim in Türkiye." Etkileşim 6, no. 12 (2023): 216–34. http://dx.doi.org/10.32739/etkilesim.2023.6.12.220.
Full textTroshchenkova, Ekaterina. "“Communicative Parasitism” in the Russian Segment of Telegram Channels." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 2. Jazykoznanije, no. 5 (November 2023): 53–71. http://dx.doi.org/10.15688/jvolsu2.2023.5.4.
Full textKuchynska, Valeriiya. "IMPLEMENTATION OF COMMUNICATIVE STRATEGY OF DISCREDITATION AND ATTACK IN SPANISH POLITICAL DISCOURSE." PROBLEMS OF SEMANTICS, PRAGMATICS AND COGNITIVE LINGUISTICS, no. 41 (2022): 111–22. http://dx.doi.org/10.17721/2663-6530.2022.41.11.
Full textBrowning, Blair, and Jimmy Sanderson. "The Positives and Negatives of Twitter: Exploring How Student-Athletes Use Twitter and Respond to Critical Tweets." International Journal of Sport Communication 5, no. 4 (2012): 503–21. http://dx.doi.org/10.1123/ijsc.5.4.503.
Full textZhaukumova, Sh, N. Khanina, and S. Zhakipbekova. "Pedagogical technologies for the development of professional communicative competence of future primary school teachers." Bulletin of the Karaganda University. Pedagogy series 109, no. 1 (2023): 62–71. http://dx.doi.org/10.31489/2023ped1/62-71.
Full textOlayemi Mahmud, Memunat. "A Speech Act Analysis of Language of Emotion in Governor Akeredolu's Post Owo Massacre Broadcast." Universal Library of Languages and Literatures 01, no. 01 (2024): 25–32. http://dx.doi.org/10.70315/uloap.ullli.2024.0101004.
Full textS K, Ravikumar, Pruthviraj R D, and Hariprasad A S. "A Review on -Communicative English for Engineers." International Journal of English Literature and Social Sciences 9, no. 5 (2024): 077–86. http://dx.doi.org/10.22161/ijels.95.11.
Full textBilyi, Oleh. "Attack on identity. (Russian culture as an existential threat to Ukraine)." Filosofska dumka (Philosophical Thought) -, no. 4 (2022): 145–60. http://dx.doi.org/10.15407/fd2022.04.145.
Full textKostikova, L., E. Chernyavskaya, and B. Shevchenko. "PROFESSIONAL LANGUAGE TRAINING OF MILITARY TRANSLATORS: COMMUNICATIVE TECHNOLOGIES." Scientific Research and Development. Modern Communication Studies 11, no. 3 (2022): 31–37. http://dx.doi.org/10.12737/2587-9103-2022-11-3-31-37.
Full textKrasnobaieva-Chorna, Zh. "TYPOLOGY OF VERBAL AGGRESSION OF prof. DOMINIC A. INFANTE: AN ATTEMPT TO PHRASEMICS ADAPTATION." Opera in linguistica ukrainiana, no. 28 (September 28, 2021): 275–83. http://dx.doi.org/10.18524/2414-0627.2021.28.235553.
Full textSergeev, O. "Communicative Functions Lucid Dreams in Short Story by Valery Bryusov “And Now, — When I’ve Awoke... Notes of Psychopaologist”." Scientific Research and Development. Modern Communication Studies 9, no. 2 (2020): 40–44. http://dx.doi.org/10.12737/2587-9103-2020-40-44.
Full textMIZANUR RAHMAN, SK MD, and KHALIL EL-KHATIB. "SECURE ANONYMOUS COMMUNICATION FOR WIRELESS SENSOR NETWORKS BASED ON PAIRING OVER ELLIPTIC CURVES." Journal of Interconnection Networks 10, no. 04 (2009): 459–79. http://dx.doi.org/10.1142/s0219265909002662.
Full textKosenko, Oleksandra, and Maksym Luchynskyi. "INFORMATION WARS AS A MARKETING TOOL IN THE CIVILIZATION OF SOCIETY." Bulletin of the National Technical University "Kharkiv Polytechnic Institute" (economic sciences), no. 3 (April 11, 2024): 3–9. https://doi.org/10.20998/2519-4461.2024.3.3.
Full textDoynikova, Marina Igorevna. "Speech behavior of deputies of the "Alternative for Germany" party (based on the materials of the Bundestag transcripts)." Philology. Theory & Practice 18, no. 3 (2025): 844–50. https://doi.org/10.30853/phil20250120.
Full textBaidawi, Achmad, Rabi'ah Rabi'ah, and Abdul Wafi. "Instilling Character Values Using Jigsaw in Teaching Grammar." Journal of English Education and Teaching 5, no. 3 (2021): 425–35. http://dx.doi.org/10.33369/jeet.5.3.425-435.
Full textBarbe, Danielle, Lori Pennington-Gray, and Ashley Schroeder. "Destinations’ response to terrorism on Twitter." International Journal of Tourism Cities 4, no. 4 (2018): 495–512. http://dx.doi.org/10.1108/ijtc-04-2018-0027.
Full textAgleeva, Z. R., and I. A. Kudryashov. "Ironic pragmatic effect in Russian dialogical communication." Philology and Culture, no. 4 (December 26, 2024): 7–13. https://doi.org/10.26907/2782-4756-2024-78-4-7-13.
Full textKadirov, M. M. "АНАЛИЗ И КЛАССИФИКАЦИЯ КИБЕРАТАК НА ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫЕ СИСТЕМЫ". Journal of Science and Innovative Development 6, № 4 (2023): 27–36. http://dx.doi.org/10.36522/2181-9637-2023-4-3.
Full textLokajová, Jana. "‘And we are Stuck in One Place, Minister.’ A Study of Evasiveness in Replies to Face-Threatening Questions in Slovak Political Interviews on Scandals (A Combined Approach)." Journal of Linguistics/Jazykovedný casopis 72, no. 2 (2021): 690–704. http://dx.doi.org/10.2478/jazcas-2021-0062.
Full textBellini, Pier Paolo. "Comunicazione autorevole e disintermediazione. Mutazioni prossemiche del post-pandemia." SocietàMutamentoPolitica 14, no. 28 (2023): 159–70. http://dx.doi.org/10.36253/smp-15022.
Full textWingate, V. Skye, and Nicholas A. Palomares. "The severity of bullying messages predicts increased levels of targets’ depression and general anxiety as a function of targets’ inferences of a bully’s goals." Journal of Social and Personal Relationships 38, no. 4 (2021): 1194–215. http://dx.doi.org/10.1177/0265407520983439.
Full textKompantseva, Larysa. "Psychological and Linguistic Description of Technology Discourse of New Media." PSYCHOLINGUISTICS 23, no. 2 (2018): 120–31. https://doi.org/10.5281/zenodo.1208639.
Full textTrivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." International Journal of Ambient Computing and Intelligence 10, no. 2 (2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.
Full textChristopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.
Full textWang, Yihe, Mingli Zhang, Kun Song, Tie Li, and Na Zhang. "An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid." Complexity 2021 (April 1, 2021): 1–16. http://dx.doi.org/10.1155/2021/5539829.
Full textNoman, Sinan Ameen, and Travis Atkison. "Techniques to Overcome Network Attacks (Sybil Attack, Jamming Attack, Timing Attack) in VANET." Journal of The Colloquium for Information Systems Security Education 10, no. 1 (2023): 7. http://dx.doi.org/10.53735/cisse.v10i1.174.
Full textAl Maamari, Amal S., and Nadir K.Salih. "Comparison between Black Hole and Flooding Attack in Mobile Ad-hoc Network and their Simulation Study." International Journal of Research Publication and Reviews 03, no. 12 (2022): 241–48. http://dx.doi.org/10.55248/gengpi.2022.31202.
Full textSengar, Hirendra Singh. "An ECC based Secure Authentication Protocol for M2M Communication in Industrial IOT Edge Device." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 30–40. http://dx.doi.org/10.22214/ijraset.2024.62939.
Full textGuo, Tingting, Zhenxia Zhao, and Xinghua Han. "The Discourse Analysis of Social Factors Influencing Interest Contention in Business Dispute Settlement: A Perspective of Discourse Information Theory." Asian Social Science 15, no. 3 (2019): 46. http://dx.doi.org/10.5539/ass.v15n3p46.
Full text,, Yuliawati, Nia Kania Kurniawati, Yoki Yusanto, Yoki Yusanto, and Eka Elviani Srilestari. "Rutinitas Kerja Jurnalis Media Online Dalam Pikiran Rakyat Media Network." Reslaj : Religion Education Social Laa Roiba Journal 6, no. 3 (2023): 1379–90. http://dx.doi.org/10.47467/reslaj.v6i3.5192.
Full textVictorio, Mauro, Arman Sargolzaei, and Mohammad Reza Khalghani. "A Secure Control Design for Networked Control Systems with Linear Dynamics under a Time-Delay Switch Attack." Electronics 10, no. 3 (2021): 322. http://dx.doi.org/10.3390/electronics10030322.
Full textZhao, Min, Danyang Qin, Ruolin Guo, and Guangchao Xu. "Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles." Mobile Information Systems 2020 (June 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/2168086.
Full textKhabarov, Artyom A. "Techniques of Linguistic Cognitive Manipulation in the Information and Psychological Confrontation Environment." Current Issues in Philology and Pedagogical Linguistics, no. 4 (December 25, 2021): 72–82. http://dx.doi.org/10.29025/2079-6021-2021-4-72-82.
Full textSepúlveda, Johanna, Mathieu Gross, Andreas Zankl, and Georg Sigl. "Beyond Cache Attacks." ACM Transactions on Embedded Computing Systems 20, no. 2 (2021): 1–23. http://dx.doi.org/10.1145/3433653.
Full textChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textZhu, Hongliang, Zhihua Zhang, Juan Du, Shoushan Luo, and Yang Xin. "Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks." International Journal of Distributed Sensor Networks 14, no. 11 (2018): 155014771881504. http://dx.doi.org/10.1177/1550147718815046.
Full textCui, Xi, and Eric Rothenbuhler. "Communicating Terror: Mediatization and Ritualization." Television & New Media 19, no. 2 (2017): 155–62. http://dx.doi.org/10.1177/1527476417715685.
Full textButts, Jonathan, Mason Rice, and Sujeet Shenoi. "An Adversarial Model for Expressing Attacks on Control Protocols." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 9, no. 3 (2012): 243–55. http://dx.doi.org/10.1177/1548512911449409.
Full textMEDEIROS (PUCRS), Felipe Castelo Branco. "LYING IS A KIND OF DECEPTION / (MENTIRA É UM TIPO DE ENGANAÇÃO)." Kínesis - Revista de Estudos dos Pós-Graduandos em Filosofia 10, no. 23 (2018): 42–55. http://dx.doi.org/10.36311/1984-8900.2018.v10n23.05.p42.
Full textFAFIYEBI, Damilola Oluseyi. "A Critical Discourse Analysis of Selected Utterances of State Actors on the 2019 Xenophobic Attacks on Nigerians in South Africa." Journal of Language and Literature 20, no. 2 (2020): 199. http://dx.doi.org/10.24071/joll.v20i2.2394.
Full textDr., Janaki Sivakumar, Smitha Nayak Ms., and Amala Nirmal Doss Dr. "IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks." International Journal of Engineering and Management Research 10, no. 1 (2020): 72–78. https://doi.org/10.31033/ijemr.10.1.13.
Full textCiumacenco, Valentina. "Modality and Irony in Political Discourse." ACROSS 7, no. 1 (2023): 58–71. https://doi.org/10.5281/zenodo.7981151.
Full textGornostaeva, Anna. "Methodology of Analysis of Ironic Image Functions in Political Discourse." Bulletin of Baikal State University 34, no. 2 (2024): 389–96. https://doi.org/10.17150/2500-2759.2024.34(2).389-396.
Full textWu, Zhijun, Yue Yin, Guang Li, and Meng Yue. "Coherent Detection of Synchronous Low-Rate DoS Attacks." Security and Communication Networks 2021 (March 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6694264.
Full text