Academic literature on the topic 'Counter attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Counter attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Counter attack"

1

W., B. "Counter attack." Canadian Medical Association Journal 174, no. 2 (2006): 211–12. http://dx.doi.org/10.1503/cmaj.051546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cho, Jonghyeon, Taehun Kim, Soojin Kim, Miok Im, Taehyun Kim, and Youngjoo Shin. "Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor." Applied Sciences 10, no. 3 (2020): 984. http://dx.doi.org/10.3390/app10030984.

Full text
Abstract:
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim. Hence, a spy can obtain secret information without alerting the victim. To resist this attack, many detection techniques have been proposed. However, these approaches have limitations as they do not operate in real time. This article proposes a real-time detection method against cache side channel attacks. The proposed technique performs the detection of cache side channel attacks immediately after observing a
APA, Harvard, Vancouver, ISO, and other styles
3

Barth, R. L. "Sassoon’s Counter-Attack." Explicator 49, no. 2 (1991): 117–18. http://dx.doi.org/10.1080/00144940.1991.11484030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Innis, Jack. "Corrosion Counter-Attack!" CoatingsPro 12, no. 3 (2012): 36–85. https://doi.org/10.5006/cp2012_12_3-36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McLaughlin, Kevin L. "Cyber Attack! Is a Counter Attack Warranted?" Information Security Journal: A Global Perspective 20, no. 1 (2011): 58–64. http://dx.doi.org/10.1080/19393555.2010.544705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tin, Derrick, Dennis G. Barten, Harald De Cauwer, and Gregory R. Ciottone. "Transport Terrorism: A Counter-Terrorism Medicine Analysis." Prehospital and Disaster Medicine 37, no. 2 (2022): 217–22. http://dx.doi.org/10.1017/s1049023x22000371.

Full text
Abstract:
AbstractBackground:Many capital cities around the world have been subjected to terrorist attacks on their transport systems with devastating consequences. Large crowds in small enclosed spaces, disruption to people movement, and the psychosocial and financial repercussions of attacks are some of the many soft target vulnerabilities of mass-transit systems.This study is an epidemiological examination of all terrorism-related events targeting air, sea, and ground transport modalities sustained from 1970-2019, comparing the rates of fatal injuries (FI) and non-fatal injuries (NFI).Method:The Glob
APA, Harvard, Vancouver, ISO, and other styles
7

Zegzhda, Dmitry, Evgeny Pavlenko, and Elena Aleksandrova. "Modelling Artificial Immunization Processes to Counter Cyberthreats." Symmetry 13, no. 12 (2021): 2453. http://dx.doi.org/10.3390/sym13122453.

Full text
Abstract:
This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer at
APA, Harvard, Vancouver, ISO, and other styles
8

Parvin, Sazia, Farookh Khadeer Hussain, and Sohrab Ali. "A Methodology to Counter DoS Attacks in Mobile IP Communication." Mobile Information Systems 8, no. 2 (2012): 127–52. http://dx.doi.org/10.1155/2012/268781.

Full text
Abstract:
Similar to wired communication, Mobile IP communication is susceptible to various kinds of attacks. Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication. The number of approaches hitherto proposed to prevent DoS attack in the area of mobile IP communication is much less compared to those for the wired domain and mobile ad hoc networks. In this work, the effects of Denial of Service attack on mobile IP communication are analyzed in detail. We propose to use packet filtering techniques that work in different domains and base stations of mobi
APA, Harvard, Vancouver, ISO, and other styles
9

Barten, Dennis G., Derrick Tin, Harald De Cauwer, Robert G. Ciottone, and Gregory R. Ciottone. "A Counter-Terrorism Medicine Analysis of Drone Attacks." Prehospital and Disaster Medicine 37, no. 2 (2022): 192–96. http://dx.doi.org/10.1017/s1049023x22000139.

Full text
Abstract:
AbstractBackground:The rapid popularization of unmanned aerial vehicles (UAVs; also referred to as drones), in both the recreational and industrial sectors, has paved the way for rapid developments in drone capabilities. Although the threat of UAVs used by terrorists has been recognized by specialists in both Counter-Terrorism and Counter-Terrorism Medicine (CTM), there are limited data on the extent and characteristics of drone use by terrorist organizations.Methods:Data collection was performed using a retrospective database search through the Global Terrorism Database (GTD). The GTD was sea
APA, Harvard, Vancouver, ISO, and other styles
10

Mrs.Ashvinee, N.Kharat* Prof.Mr.(Dr.).B.D.Phulpagar. "SURVEY ON METHODS FOR EVASION ATTACK DETECTION." INTERNATIONAL JOURNALOFRESEARCH SCIENCE& MANAGEMENT 4, no. 7 (2017): 54–60. https://doi.org/10.5281/zenodo.831440.

Full text
Abstract:
Network security has become more necessary to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security sanctions a better understanding of the emergence of security technology. Network attacks had become a curse to technology, where attacker destroy or gain illegal access to system recourses and restrict the legitimate users from accessing the information. In this paper, we are going study different type of network security attack and learn counter measures for that attack. We are also going to study
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Counter attack"

1

Lu, Huabo. "Sender cover traffic to counter an improved Statistical Disclosure Attack." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5040.

Full text
Abstract:
The statistical disclosure attack (SDA) is quite an effective method for attackers to go against an anonymity system and to reveal the information behind it. It targets at a particular anonymity system user, tries to find its sending/receiving relationship with others after a long term observation. In this thesis, we first make an improvement for SDA, using weighted mean instead of the orginal arithmetic mean to calculate the cumulative observed receiver popularity in order to get a more precise value of the attack result. Second, we present an analysis for the effectiveness of the sender gene
APA, Harvard, Vancouver, ISO, and other styles
2

Nazari, Mahmood, and Lokesh Galla. "Denial of Service attack in IPv6 networks and counter measurements." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30204.

Full text
Abstract:
This thesis describes and expresses the different IPv6 based cyber-attacks which could result in the Denial of Service (DoS) on the IPv6 network. IPv6 is the next generation internet protocol and the demand of its benefits is implacable. Therefore, we tried to answer to the following questions: How effective is DoS in IPv6 networks? How to protect IPv6 networks from DoS? The effect of implementing new changes in network often leads to new challenges and security breaches that make IP based networks challenging to monitor and defense. Better understanding of types of network and traffic require
APA, Harvard, Vancouver, ISO, and other styles
3

Jang, Jae-Won. "Security of Non-Volatile Memories - Attack Models, Analyses, and Counter-Measures." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5709.

Full text
Abstract:
The unprecedented demand for performance in the latest technologies will ultimately require changes in the way we design cache. Emerging high density embedded memories such as Spin-Transfer Torque Random Access Memory (STTRAM) have emerged as a possible candidate for universal memory due to its high speed, low power, non-volatility, and low cost. Although attractive, STTRAM is susceptible to contactless tampering through malicious exposure to magnetic field with the intention to steal or modify the bitcell content. In this thesis, we explore various attack techniques on STTRAM and then propose
APA, Harvard, Vancouver, ISO, and other styles
4

Troia, Marco. "Siegfried Sassoon: analisi e traduzione di una selezione di war poems tratte dalla raccolta Counter-Attack and Other Poems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/12734/.

Full text
Abstract:
The purpose of this dissertation is to offer a translation from English into Italian of seventeen poems from the collection of WWI poems Counter-Attack and Other Poems, by British author Siegfried Sassoon. Besides personal interest, the importance of this work lies in the fact that Siegfried Sassoon was never translated systematically into Italian. His 1918 poems show an anti-military feeling, which is often presented by a strong irony, forming a single blast against everything Sassoon found repellent concerning the war. They drip with intensity, sarcasm, bite, and bitterness, but at the same
APA, Harvard, Vancouver, ISO, and other styles
5

Chabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.

Full text
Abstract:
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation, and eventually the comparison of different arithmetic operators for cryptosystems based on elliptic curves (ECC). Provided solutions must be robust against some side-channel attacks, and efficient at a hardware level (execution speed and area). In the case of ECC, we want to protect the secret key, a large integer, used in the scalar multiplication. Our protection methods use representations of numbers, and behaviour of algorithms to make more difficult some attacks. For instance, we randomly c
APA, Harvard, Vancouver, ISO, and other styles
6

Drozd, Mary R. "Campylobacter jejuni Survival Strategies and Counter-Attack: An investigation of Campylobacter phosphate mediated biofilms and the design of a high-throughput small-molecule screen for TAT inhibition." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1344351339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Falla, Willy. "Cadre groupal et monde emboîtés en formation d’adultes ou de jeunes adultes ; les formateurs au travail lors de mises en turbulence du cadre. Recherche participante." Thesis, Paris 10, 2010. http://www.theses.fr/2010PA100197.

Full text
Abstract:
Quand la fonction interprétante instituante de l’équipe est opérante, l’attaque du cadre en institution, devient une tentative pour intérioriser, à partir de l’expérience de confrontation au dispositif institutionnel, le cadre compris comme une préconception non saturée au sens où l’entend Bion. En reprenant les élaborations relatives au rôle du contre-transfert dans la cure individuelle et en établissant une analogie de structure entre le couple transfert –contre-transfert, une dialectique entre asymétrie et solidarité caractérise le dispositif psychanalytique. Un lien étroit s’établit entre
APA, Harvard, Vancouver, ISO, and other styles
8

Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.

Find full text
Abstract:
Approved for public release; distribution is unlimited.<br>Cyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant a
APA, Harvard, Vancouver, ISO, and other styles
9

Odesanmi, Abiola, and Daryl Moten. "Secure Telemetry: Attacks and Counter Measures on iNET." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595801.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada<br>iNet is a project aimed at improving and modernizing telemetry systems by moving from a link to a networking solution. Changes introduce new risks and vulnerabilities. The nature of the security of the telemetry system changes when the elements are in an Ethernet and TCP/IP network configuration. The network will require protection from intrusion and malware that can be initiated internal to, or external of
APA, Harvard, Vancouver, ISO, and other styles
10

Matte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.

Full text
Abstract:
Le récent développement des appareils portatifs possédant une interface Wi-Fi (smartphones, tablettes et « wearables ») s'accompagne d'une menace sur la vie privée de leurs utilisateurs, et sur la société toute entière. Ces appareils émettent en continu des signaux pouvant être capturés par un attaquant passif, à l'aide de matériel peu coûteux et de connaissances basiques. Ces signaux contiennent un identifiant unique appelé l'adresse MAC. Pour faire face à cette menace, les acteurs du secteur déploient actuellement une contre-mesure sur les appareils récents: le changement aléatoire de l'adre
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Counter attack"

1

Abernethy, Mark. Counter attack. Arena Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Editor), David Drake, and Bill Fawcett (Editor), eds. Counter Attack. Ace Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fred, Reinfeld. Attack & counter attack in chess. Harper & Row, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harris, Alisa M. The collected counter-attack. Harris, Alisa, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lutes, W. John. Scandinavian defense: Anderssen counter attack.--. Chess Enterprises Inc., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tracy, Brian. Counter-attack: Business strategies for explosive growth in the new economy. CelebrityPress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chhoton, Gupta, ed. Nepal, the counter-attack: Phase one, 19 April 2001-4 May 2002. The Compiler, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Larsen, Bent. Bent Larsen: Master of counter-attack : Larsen's games of chess, 1948-69. B.T. Batsford, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hanson, Peter G. Counter-attack!: The joy of stress action plan for gaining control of your life and health. Stoddart, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roach, Kent. The 9/11 effect: Comparative counter-terrorism. Cambridge University Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Counter attack"

1

Florence, P. Sargant. "Counter-Attack." In Economics and Human Behaviour. Routledge, 2022. http://dx.doi.org/10.4324/9781003306528-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Berry, Mike. "Countering the Counter-Attack." In A Theory of Housing Provision under Capitalism. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-24471-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Western, J. R. "1760–The Frustrated Counter-Attack." In The English Militia in the Eighteenth Century. Routledge, 2023. http://dx.doi.org/10.4324/9781032639598-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boase, Alan M. "Counter-Attack II: Silhon and Chanet." In The Fortunes of Montaigne. Routledge, 2024. http://dx.doi.org/10.4324/9781003514183-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boase, Alan M. "Counter-Attack—I: Garasse, Mersenne, Boucher." In The Fortunes of Montaigne. Routledge, 2024. http://dx.doi.org/10.4324/9781003514183-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Andrews, Stuart. "Canning’s Counter-Attack: the Weekly Anti-Jacobin." In The British Periodical Press and the French Revolution, 1789–99. Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9781403932716_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Plantin, Christian. "Attack, Defense and Counter-Attack in the Inuit Duel Songs of Ammassalik." In Argumentation Through Languages and Cultures. Springer Nature Switzerland, 2020. http://dx.doi.org/10.1007/978-3-031-19321-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tanaka, Hidema. "Network Counter-Attack Strategy by Topology Map Analysis." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Qiao. "How Can Small Teams Implement a “Counter Attack”?" In Continuous Delivery 2.0. CRC Press, 2021. http://dx.doi.org/10.1201/9781003221579-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jaffe, Josh. "A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter." In Cryptographic Hardware and Embedded Systems - CHES 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74735-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Counter attack"

1

Putra, Nathanael Berliano Novanka, Jonathan Sebastian Marbun, Rheva Anindya Wijayanti, Dzakwan Al Dzaky Bewasana, and Nurul Qomariasih. "Counter Attack Malware Application Using Automatic Reverse Engineering Web Application." In 2024 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). IEEE, 2024. https://doi.org/10.1109/apwimob64015.2024.10792960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Astrov, Igor, and Sanja Bauk. "On Cyber Vulnerability of MASS: A Simulation Experiment to Counter a Rudder Controller Attack." In 2024 International Conference on Applied Mathematics & Computer Science (ICAMCS). IEEE, 2024. https://doi.org/10.1109/icamcs62774.2024.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inman, Maria, Ashwani K. Rawat, E. Jennings Taylor, and Patrick J. Moran. "Detection of Crevice Corrosion under an O-Ring by Polarization Resistance Measurements Using Electrodes Embedded in the O-Ring." In CORROSION 1997. NACE International, 1997. https://doi.org/10.5006/c1997-97312.

Full text
Abstract:
Abstract An electrochemical sensor which incorporates a counter electrode (CE) and a reference electrode (RE) into an o-ring has been developed for in situ monitoring of crevice corrosion initiation and propagation. It is applicable to crevice corrosion situations where the crevice is created by a gasket or an o-ring and the attack occurs in that crevice. It is shown that polarization resistance (Rp) values calculated from in situ electrochemical impedance measurements correlate with the onset of crevice attack and with its propagation for crevice corrosion of alloy 625 (UNS N06625) in 3.5% Na
APA, Harvard, Vancouver, ISO, and other styles
4

Gregorio, Fabrizio. "Heavy Class Helicopter Fuselage Model Performance Improvement using Vortex Generators." In Vertical Flight Society 80th Annual Forum & Technology Display. The Vertical Flight Society, 2024. http://dx.doi.org/10.4050/f-0074-2018-12695.

Full text
Abstract:
Wind-tunnel tests of a heavy-class helicopter model were carried out to evaluate the effectiveness of passive flow control system in alleviating the fuselage parasite drag. An array of counter rotating vortex generators was selected to reduce/remove the flow separation occurring on the rear loading ramp responsible of the high pressure drag. Different technical solution for the VGs design and location were selected with respect to previous work. The basic fuselage geometrically scaled 1:7 of a heavy class helicopter was investigated with and without passive flow control system. The comprehensi
APA, Harvard, Vancouver, ISO, and other styles
5

Litzenburger, Achim K. E. "Performance of Polypropylene Dual Laminates in Waste Incineration Plants." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09313.

Full text
Abstract:
Abstract In view of the restrictive environmental protection and shrinking landfill capacities in Western Europe, the controlled incineration of industrial and municipal waste in conceived plants points out a chance to take care of natural resources. Such plants include subsequent units to treat the – probably catalytically oxidized – hot flue gases. Counter current scrubbers using water or caustic soda solution free the cooled flue gases from hazardous compounds. The simultaneous demand of an acidic atmosphere and a circulating alkaline brine to the whole construction requires a careful mater
APA, Harvard, Vancouver, ISO, and other styles
6

Hernandez, M. A., J. Genesca, and J. Uruchurtu. "Electrochemical Characterization of an Al-Zn-In Galvanic Anode." In CORROSION 2002. NACE International, 2002. https://doi.org/10.5006/c2002-02022.

Full text
Abstract:
Abstract The electrochemical behavior of an Al-Zn-In anode was studied by means of the following techniques: Polarization Curve Measurements, Electrochemical Noise and Electrochemical Impedance, using two different electrochemical cell arrangements. The Electrochemical cell arrangements were: Al-Zn-In anode, saturated calomel electrode and platinum wire as the working electrode, reference and counter electrode, respectively (First System)Two identical Al-Zn-In as a working electiode (Second System) At different concentration levels of sodium chloride (NaCl), from 3% wt to 0.001% wt, the dissol
APA, Harvard, Vancouver, ISO, and other styles
7

Sakai, T., K. Aoki, K. Matsumoto, and F. Nakayasu. "Study on Oxide Thin Film of Alloy 600." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89490.

Full text
Abstract:
Abstract Several pressurized water reactor nuclear plants around the world have experienced intergranular attack (IGA) on the secondary surface of the steam generator tubes in the hot leg crevices. The most common explanation for this type of tube defect is caustic attack. Boric acid is sometimes added to the secondary water as a counter measure for this problem. However, the exact cause of the IGA is not always positively identified and thus the boric acid additions may not ameliorate the problem. Therefore, an alternate approach to identify the causative agent is suggested. When a metal is p
APA, Harvard, Vancouver, ISO, and other styles
8

Giovanetti, Eli, and Kenneth Hall. "Optimal Design of Compound Helicopters Using Higher Harmonic Control." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9553.

Full text
Abstract:
We investigate the optimal design of a compound helicopter comprised of counter-rotating coaxial rotors, a propeller, and optionally a fixed wing. We determine the blade geometry, azimuthal blade pitch inputs, optimal shaft angle (rotor angle of attack), and division of propulsive and lifting forces among the components that minimize the total power for a given flight condition. The optimal design problem is cast as a variational statement that minimizes the sum of induced and viscous power losses for a prescribed lift, propulsive force, and vehicle trim condition. The rotor, propeller, and wi
APA, Harvard, Vancouver, ISO, and other styles
9

Takada, Masaru, Yuki Osada, and Masakatu Morii. "Counter Attack Against the Bus-Off Attack on CAN." In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2019. http://dx.doi.org/10.1109/asiajcis.2019.00004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tienteu, Marcial, Edmund Smith, Edgar Mateos Santillan, et al. "Template Attack Against AES in Counter Mode With Unknown Initial Counter." In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2023. http://dx.doi.org/10.1109/ccwc57344.2023.10099238.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Counter attack"

1

Berger, J. M. A Paler Shade of White: Identity & In-group Critique in James Mason’s Siege. RESOLVE Network, 2021. http://dx.doi.org/10.37805/remve2021.1.

Full text
Abstract:
Discussions of extremist ideologies naturally focus on how in-groups criticize and attack out-groups. But many important extremist ideological texts are disproportionately focused criticizing their own in-group. This research report will use linkage-based analysis to examine Siege, a White nationalist tract that has played an important role shaping modern neo-Nazi movements, including such violent organizations as Atomwaffen Division and The Base. While Siege strongly attacks out-groups, including Jewish and Black people, the book is overwhelmingly a critique of how the White people of its in-
APA, Harvard, Vancouver, ISO, and other styles
2

Yilmaz, Ihsan, Zahid Ahmed, Galib Bashirov, Nicholas Morieson, and Kainat Shakil. Islamist Populists in Power: Promises, Compromises and Attacks on Democratic Institutions. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/pp0013.

Full text
Abstract:
This paper comparatively examines the ruling religious populist governments in Turkey and Pakistan through a theoretical framework that focuses on populists’ promises, their compromises, and their attacks on democratic institutions. Through our three-legged framework, we examine how these religious populists behave in power and how strategic necessities, the realities of governing, and structural constraints shape their policies. Similar to the other populists in other parts of the world, before coming to power, Islamist populists make sweeping promises to the people and quick fixes to major p
APA, Harvard, Vancouver, ISO, and other styles
3

Minovi, Darya, Kristie Ellickson, Jules Barbati-Dajches, and Rachel Cleetus. Science and Democracy Under Siege Documenting Six Months of the Trump Administration’s Destructive Actions. Union of Concerned Scientists, 2025. https://doi.org/10.47923/2025.15927.

Full text
Abstract:
Between January 20 and June 30 of this year, we documented 402 attacks on science. We define “attacks on science” as actions, statements, or decisions that originate from an elected official or political appointee in a federal agency that results in the censoring, manipulation, forging, or misinforming on scientific data, results, or conclusions conducted within the government or with federal funds. When science is sidelined, people are harmed. In this report, we document the ways this administration has targeted the public science that we all depend on, and offer recommendations and resources
APA, Harvard, Vancouver, ISO, and other styles
4

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report a
APA, Harvard, Vancouver, ISO, and other styles
5

Rosand, Eric. 20 Years After 9/11: Why Cities Matter More Than Ever When It Comes to Preventing and Countering Violent Extremism. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.20.

Full text
Abstract:
With the 20th anniversary of the September 11, 2001, terrorist attacks upon us there is no shortage of reflections on two decades of global counterterrorism practice. Much of the commentary is focusing on the situation in Afghanistan and the Taliban’s return to power. While understandable, this potentially obscures some of the important developments that have taken place during the period, including those related to our understanding of the threat and how best to counter and prevent it. Three important ones point to the growing relevance of cities in preventing and countering violent extremism
APA, Harvard, Vancouver, ISO, and other styles
6

Demuynck, Méryl, and Thomas Renard. Conceptualising and Addressing the Migration-Terrorism Nexus: Literature Review, Case Studies, and Policy Recommendations. International Centre for Counter Terrorism, 2025. https://doi.org/10.19165/2025.6672.

Full text
Abstract:
The nexus between migration and terrorism is a contentious subject. Attacks conducted by immigrants or by terrorists infiltrated within migration flows have raised legitimate concerns among the population and policy-makers. Yet, reductive narratives and political ideology have resulted in a simplistic and biased perception of this phenomenon. As a result, public immigration and counter-terrorism policies are poorly informed. This research, conducted by the International Centre for Counter-Terrorism (ICCT), seeks to offer a robust, evidence-based analysis of the migration-terrorism nexus. Throu
APA, Harvard, Vancouver, ISO, and other styles
7

Iffat, Idris. Effectiveness of Different Methods to the Counter Financing of Terrorism. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.091.

Full text
Abstract:
Countering financing of terrorism (CFT) has been a core component of counter terrorism strategies since the 9/11 attacks on the US in 2001. Key CFT measures are criminalisation of terrorism financing; sanctions and assets freezing/seizure; and use of financial intelligence. CFT assessments focus on implementation of these measures, rather than on impact in terms of preventing terrorist activity. This rapid review therefore looks at the effectiveness of different CFT measures. It draws on a mixture of academic and grey literature, including policy papers and reports from agencies involved in CF
APA, Harvard, Vancouver, ISO, and other styles
8

Bottura, Beatrice, Paris O’Keeffe-Johnston, Pinelopi Gkampeta, et al. Anticipating the Trump Effect: Strengthening the EU Pact on Migration and Asylum Amid Populist Pressures. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0001.

Full text
Abstract:
This policy paper explores the potential impact of the 2024 U.S. presidential election on EU politics, particularly the EU Pact on Migration and Asylum. Through horizon scanning, it highlights that a Trump victory could boost Euroscepticism and restrictive migration policies in the EU, especially among Trump’s European allies. Conversely, a Trump loss may lead to events akin to the 2021 Capitol attack, undermining trust in electoral processes in both the U.S. and EU. The paper suggests introducing regular in-depth country reviews (ICRs) to create tailored migration strategies, fostering greate
APA, Harvard, Vancouver, ISO, and other styles
9

Molas, Bàrbara. The Insurrection Wave: A Comparative Assessment of Anti-Government Attacks in Germany, the US, and Brazil. ICCT, 2023. http://dx.doi.org/10.19165/2023.2.03.

Full text
Abstract:
The storming in Berlin of the Reichstag in August 2020, the US Capitol in January 2021, and the Brazilian Supreme Court in Brazil in January 2023 were all violent events where individuals and groups attempted to overthrow or challenge democratically elected governments. While the specific circumstances and motivations of each case differ, there are common action triggers, including: the widespread presence of conspiracy theories; the successful misuse of social media for anti-government mobilisation; and the mainstreaming of extremist and antidemocratic rhetoric through political legitimisatio
APA, Harvard, Vancouver, ISO, and other styles
10

Baek, Chung-Ah, Deepta Chopra, Jerker Edström, et al. Building Solidarities: Gender Justice in a Time of Backlash. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.041.

Full text
Abstract:
Significant progress on gender equality has been made in past decades, but in recent years gender and sexual rights are increasingly under threat from a global wave of gender backlash. This is not new. Feminists have long faced resistance while building strategic steps towards greater gender justice and equality. But today, diverse anti-gender actors have gained in strength, funding and impact, amid wider global political shifts, which has resulted in a new and complex political landscape. Gender advocates face explicit violence, harassment, intimidation or threats of violence offline, and new
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!