Academic literature on the topic 'Counter attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Counter attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Counter attack"
W., B. "Counter attack." Canadian Medical Association Journal 174, no. 2 (2006): 211–12. http://dx.doi.org/10.1503/cmaj.051546.
Full textCho, Jonghyeon, Taehun Kim, Soojin Kim, Miok Im, Taehyun Kim, and Youngjoo Shin. "Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor." Applied Sciences 10, no. 3 (2020): 984. http://dx.doi.org/10.3390/app10030984.
Full textBarth, R. L. "Sassoon’s Counter-Attack." Explicator 49, no. 2 (1991): 117–18. http://dx.doi.org/10.1080/00144940.1991.11484030.
Full textInnis, Jack. "Corrosion Counter-Attack!" CoatingsPro 12, no. 3 (2012): 36–85. https://doi.org/10.5006/cp2012_12_3-36.
Full textMcLaughlin, Kevin L. "Cyber Attack! Is a Counter Attack Warranted?" Information Security Journal: A Global Perspective 20, no. 1 (2011): 58–64. http://dx.doi.org/10.1080/19393555.2010.544705.
Full textTin, Derrick, Dennis G. Barten, Harald De Cauwer, and Gregory R. Ciottone. "Transport Terrorism: A Counter-Terrorism Medicine Analysis." Prehospital and Disaster Medicine 37, no. 2 (2022): 217–22. http://dx.doi.org/10.1017/s1049023x22000371.
Full textZegzhda, Dmitry, Evgeny Pavlenko, and Elena Aleksandrova. "Modelling Artificial Immunization Processes to Counter Cyberthreats." Symmetry 13, no. 12 (2021): 2453. http://dx.doi.org/10.3390/sym13122453.
Full textParvin, Sazia, Farookh Khadeer Hussain, and Sohrab Ali. "A Methodology to Counter DoS Attacks in Mobile IP Communication." Mobile Information Systems 8, no. 2 (2012): 127–52. http://dx.doi.org/10.1155/2012/268781.
Full textBarten, Dennis G., Derrick Tin, Harald De Cauwer, Robert G. Ciottone, and Gregory R. Ciottone. "A Counter-Terrorism Medicine Analysis of Drone Attacks." Prehospital and Disaster Medicine 37, no. 2 (2022): 192–96. http://dx.doi.org/10.1017/s1049023x22000139.
Full textMrs.Ashvinee, N.Kharat* Prof.Mr.(Dr.).B.D.Phulpagar. "SURVEY ON METHODS FOR EVASION ATTACK DETECTION." INTERNATIONAL JOURNALOFRESEARCH SCIENCE& MANAGEMENT 4, no. 7 (2017): 54–60. https://doi.org/10.5281/zenodo.831440.
Full textDissertations / Theses on the topic "Counter attack"
Lu, Huabo. "Sender cover traffic to counter an improved Statistical Disclosure Attack." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5040.
Full textNazari, Mahmood, and Lokesh Galla. "Denial of Service attack in IPv6 networks and counter measurements." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30204.
Full textJang, Jae-Won. "Security of Non-Volatile Memories - Attack Models, Analyses, and Counter-Measures." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5709.
Full textTroia, Marco. "Siegfried Sassoon: analisi e traduzione di una selezione di war poems tratte dalla raccolta Counter-Attack and Other Poems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/12734/.
Full textChabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.
Full textDrozd, Mary R. "Campylobacter jejuni Survival Strategies and Counter-Attack: An investigation of Campylobacter phosphate mediated biofilms and the design of a high-throughput small-molecule screen for TAT inhibition." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1344351339.
Full textFalla, Willy. "Cadre groupal et monde emboîtés en formation d’adultes ou de jeunes adultes ; les formateurs au travail lors de mises en turbulence du cadre. Recherche participante." Thesis, Paris 10, 2010. http://www.theses.fr/2010PA100197.
Full textFerguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.
Find full textOdesanmi, Abiola, and Daryl Moten. "Secure Telemetry: Attacks and Counter Measures on iNET." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595801.
Full textMatte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.
Full textBooks on the topic "Counter attack"
(Editor), David Drake, and Bill Fawcett (Editor), eds. Counter Attack. Ace Books, 1988.
Find full textLutes, W. John. Scandinavian defense: Anderssen counter attack.--. Chess Enterprises Inc., 1988.
Find full textTracy, Brian. Counter-attack: Business strategies for explosive growth in the new economy. CelebrityPress, 2010.
Find full textChhoton, Gupta, ed. Nepal, the counter-attack: Phase one, 19 April 2001-4 May 2002. The Compiler, 2004.
Find full textLarsen, Bent. Bent Larsen: Master of counter-attack : Larsen's games of chess, 1948-69. B.T. Batsford, 1992.
Find full textHanson, Peter G. Counter-attack!: The joy of stress action plan for gaining control of your life and health. Stoddart, 1993.
Find full textRoach, Kent. The 9/11 effect: Comparative counter-terrorism. Cambridge University Press, 2011.
Find full textBook chapters on the topic "Counter attack"
Florence, P. Sargant. "Counter-Attack." In Economics and Human Behaviour. Routledge, 2022. http://dx.doi.org/10.4324/9781003306528-6.
Full textBerry, Mike. "Countering the Counter-Attack." In A Theory of Housing Provision under Capitalism. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-24471-1_16.
Full textWestern, J. R. "1760–The Frustrated Counter-Attack." In The English Militia in the Eighteenth Century. Routledge, 2023. http://dx.doi.org/10.4324/9781032639598-9.
Full textBoase, Alan M. "Counter-Attack II: Silhon and Chanet." In The Fortunes of Montaigne. Routledge, 2024. http://dx.doi.org/10.4324/9781003514183-14.
Full textBoase, Alan M. "Counter-Attack—I: Garasse, Mersenne, Boucher." In The Fortunes of Montaigne. Routledge, 2024. http://dx.doi.org/10.4324/9781003514183-13.
Full textAndrews, Stuart. "Canning’s Counter-Attack: the Weekly Anti-Jacobin." In The British Periodical Press and the French Revolution, 1789–99. Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9781403932716_6.
Full textPlantin, Christian. "Attack, Defense and Counter-Attack in the Inuit Duel Songs of Ammassalik." In Argumentation Through Languages and Cultures. Springer Nature Switzerland, 2020. http://dx.doi.org/10.1007/978-3-031-19321-7_4.
Full textTanaka, Hidema. "Network Counter-Attack Strategy by Topology Map Analysis." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_13.
Full textLiang, Qiao. "How Can Small Teams Implement a “Counter Attack”?" In Continuous Delivery 2.0. CRC Press, 2021. http://dx.doi.org/10.1201/9781003221579-15.
Full textJaffe, Josh. "A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter." In Cryptographic Hardware and Embedded Systems - CHES 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74735-2_1.
Full textConference papers on the topic "Counter attack"
Putra, Nathanael Berliano Novanka, Jonathan Sebastian Marbun, Rheva Anindya Wijayanti, Dzakwan Al Dzaky Bewasana, and Nurul Qomariasih. "Counter Attack Malware Application Using Automatic Reverse Engineering Web Application." In 2024 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). IEEE, 2024. https://doi.org/10.1109/apwimob64015.2024.10792960.
Full textAstrov, Igor, and Sanja Bauk. "On Cyber Vulnerability of MASS: A Simulation Experiment to Counter a Rudder Controller Attack." In 2024 International Conference on Applied Mathematics & Computer Science (ICAMCS). IEEE, 2024. https://doi.org/10.1109/icamcs62774.2024.00021.
Full textInman, Maria, Ashwani K. Rawat, E. Jennings Taylor, and Patrick J. Moran. "Detection of Crevice Corrosion under an O-Ring by Polarization Resistance Measurements Using Electrodes Embedded in the O-Ring." In CORROSION 1997. NACE International, 1997. https://doi.org/10.5006/c1997-97312.
Full textGregorio, Fabrizio. "Heavy Class Helicopter Fuselage Model Performance Improvement using Vortex Generators." In Vertical Flight Society 80th Annual Forum & Technology Display. The Vertical Flight Society, 2024. http://dx.doi.org/10.4050/f-0074-2018-12695.
Full textLitzenburger, Achim K. E. "Performance of Polypropylene Dual Laminates in Waste Incineration Plants." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09313.
Full textHernandez, M. A., J. Genesca, and J. Uruchurtu. "Electrochemical Characterization of an Al-Zn-In Galvanic Anode." In CORROSION 2002. NACE International, 2002. https://doi.org/10.5006/c2002-02022.
Full textSakai, T., K. Aoki, K. Matsumoto, and F. Nakayasu. "Study on Oxide Thin Film of Alloy 600." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89490.
Full textGiovanetti, Eli, and Kenneth Hall. "Optimal Design of Compound Helicopters Using Higher Harmonic Control." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9553.
Full textTakada, Masaru, Yuki Osada, and Masakatu Morii. "Counter Attack Against the Bus-Off Attack on CAN." In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2019. http://dx.doi.org/10.1109/asiajcis.2019.00004.
Full textTienteu, Marcial, Edmund Smith, Edgar Mateos Santillan, et al. "Template Attack Against AES in Counter Mode With Unknown Initial Counter." In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2023. http://dx.doi.org/10.1109/ccwc57344.2023.10099238.
Full textReports on the topic "Counter attack"
Berger, J. M. A Paler Shade of White: Identity & In-group Critique in James Mason’s Siege. RESOLVE Network, 2021. http://dx.doi.org/10.37805/remve2021.1.
Full textYilmaz, Ihsan, Zahid Ahmed, Galib Bashirov, Nicholas Morieson, and Kainat Shakil. Islamist Populists in Power: Promises, Compromises and Attacks on Democratic Institutions. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/pp0013.
Full textMinovi, Darya, Kristie Ellickson, Jules Barbati-Dajches, and Rachel Cleetus. Science and Democracy Under Siege Documenting Six Months of the Trump Administration’s Destructive Actions. Union of Concerned Scientists, 2025. https://doi.org/10.47923/2025.15927.
Full textFloyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.
Full textRosand, Eric. 20 Years After 9/11: Why Cities Matter More Than Ever When It Comes to Preventing and Countering Violent Extremism. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.20.
Full textDemuynck, Méryl, and Thomas Renard. Conceptualising and Addressing the Migration-Terrorism Nexus: Literature Review, Case Studies, and Policy Recommendations. International Centre for Counter Terrorism, 2025. https://doi.org/10.19165/2025.6672.
Full textIffat, Idris. Effectiveness of Different Methods to the Counter Financing of Terrorism. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.091.
Full textBottura, Beatrice, Paris O’Keeffe-Johnston, Pinelopi Gkampeta, et al. Anticipating the Trump Effect: Strengthening the EU Pact on Migration and Asylum Amid Populist Pressures. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0001.
Full textMolas, Bàrbara. The Insurrection Wave: A Comparative Assessment of Anti-Government Attacks in Germany, the US, and Brazil. ICCT, 2023. http://dx.doi.org/10.19165/2023.2.03.
Full textBaek, Chung-Ah, Deepta Chopra, Jerker Edström, et al. Building Solidarities: Gender Justice in a Time of Backlash. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.041.
Full text