Journal articles on the topic 'Counter attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Counter attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
W., B. "Counter attack." Canadian Medical Association Journal 174, no. 2 (2006): 211–12. http://dx.doi.org/10.1503/cmaj.051546.
Full textCho, Jonghyeon, Taehun Kim, Soojin Kim, Miok Im, Taehyun Kim, and Youngjoo Shin. "Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor." Applied Sciences 10, no. 3 (2020): 984. http://dx.doi.org/10.3390/app10030984.
Full textBarth, R. L. "Sassoon’s Counter-Attack." Explicator 49, no. 2 (1991): 117–18. http://dx.doi.org/10.1080/00144940.1991.11484030.
Full textInnis, Jack. "Corrosion Counter-Attack!" CoatingsPro 12, no. 3 (2012): 36–85. https://doi.org/10.5006/cp2012_12_3-36.
Full textMcLaughlin, Kevin L. "Cyber Attack! Is a Counter Attack Warranted?" Information Security Journal: A Global Perspective 20, no. 1 (2011): 58–64. http://dx.doi.org/10.1080/19393555.2010.544705.
Full textTin, Derrick, Dennis G. Barten, Harald De Cauwer, and Gregory R. Ciottone. "Transport Terrorism: A Counter-Terrorism Medicine Analysis." Prehospital and Disaster Medicine 37, no. 2 (2022): 217–22. http://dx.doi.org/10.1017/s1049023x22000371.
Full textZegzhda, Dmitry, Evgeny Pavlenko, and Elena Aleksandrova. "Modelling Artificial Immunization Processes to Counter Cyberthreats." Symmetry 13, no. 12 (2021): 2453. http://dx.doi.org/10.3390/sym13122453.
Full textParvin, Sazia, Farookh Khadeer Hussain, and Sohrab Ali. "A Methodology to Counter DoS Attacks in Mobile IP Communication." Mobile Information Systems 8, no. 2 (2012): 127–52. http://dx.doi.org/10.1155/2012/268781.
Full textBarten, Dennis G., Derrick Tin, Harald De Cauwer, Robert G. Ciottone, and Gregory R. Ciottone. "A Counter-Terrorism Medicine Analysis of Drone Attacks." Prehospital and Disaster Medicine 37, no. 2 (2022): 192–96. http://dx.doi.org/10.1017/s1049023x22000139.
Full textMrs.Ashvinee, N.Kharat* Prof.Mr.(Dr.).B.D.Phulpagar. "SURVEY ON METHODS FOR EVASION ATTACK DETECTION." INTERNATIONAL JOURNALOFRESEARCH SCIENCE& MANAGEMENT 4, no. 7 (2017): 54–60. https://doi.org/10.5281/zenodo.831440.
Full textYonita, Delvira, Iman Sulaiman, and Yasep Setiakarna Wijaya. "Model Latihan Counter Attack Atlet Kumite Cabang Olahraga Karate." Jurnal Terapan Ilmu Keolahragaan 4, no. 2 (2019): 99–106. http://dx.doi.org/10.17509/jtikor.v4i2.18971.
Full textTin, Derrick, Dennis G. Barten, Harald De Cauwer, Luc JM Mortelmans, and Gregory R. Ciottone. "Terrorist Attacks in Western Europe: A Counter-Terrorism Medicine Analysis." Prehospital and Disaster Medicine 37, no. 1 (2022): 19–24. http://dx.doi.org/10.1017/s1049023x21001370.
Full textPeng, Yi-Kun, and Shih-Chung Cheng. "Analysis of Critical Determinant Factors for Beach Volleyball Winning in Elite Men and Women Teams." European Journal of Sport Sciences 2, no. 4 (2023): 1–12. http://dx.doi.org/10.24018/ejsport.2023.2.4.89.
Full textjain, Rupal, and Rajneesh Pachouri. "DETECTING AND ISOLATING BLACK-HOLE ATTACKS IN MANET USING COUNTER BASED TROLLING TECHNIQUE." International Journal of Advanced Research in Computer Science 11, no. 6 (2020): 36–45. http://dx.doi.org/10.26483/ijarcs.v11i6.6679.
Full textSamer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.
Full textPincevičius, Albertas, Rimantas-Jonas Rakauskas, Gintautas Misevičius, and Svajonė Vašterienė. "The mathematical modeling of counter-attack." Lietuvos matematikos rinkinys 41 (December 17, 2001): 542–47. http://dx.doi.org/10.15388/lmr.2001.34644.
Full textDr., Janaki Sivakumar, Smitha Nayak Ms., and Amala Nirmal Doss Dr. "IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks." International Journal of Engineering and Management Research 10, no. 1 (2020): 72–78. https://doi.org/10.31033/ijemr.10.1.13.
Full textAbdulqadir, Ziyad. "Migration controls and counter-terrorism in Europe: a discussion of challenges and policies." Journal of Scientific Papers "Social development and Security" 11, no. 2 (2021): 18–25. http://dx.doi.org/10.33445/sds.2021.11.2.3.
Full textSiddiqi, Murtaza Ahmed, Wooguil Pak, and Moquddam A. Siddiqi. "A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures." Applied Sciences 12, no. 12 (2022): 6042. http://dx.doi.org/10.3390/app12126042.
Full textViktorov, D., D. Sevostianov, V. Shklyaev, and Yu Yarushev. "METHOD FOR IMPROVING PRICK ACCURACY IN YOUNG FENCERS." Human Sport Medicine 19, no. 2 (2019): 86–91. http://dx.doi.org/10.14529/hsm190211.
Full textDohrenwend, Robert E. "Animales peligrosos y artes marciales asiáticas." Revista de Artes Marciales Asiáticas 5, no. 1 (2012): 127. http://dx.doi.org/10.18002/rama.v5i1.141.
Full textK., Thamizhmaran. "Enhanced Secure Technique for Detecting Attacks in Network." Journal of Advancement in Electronics Design 3, no. 3 (2020): 1–6. https://doi.org/10.5281/zenodo.4223718.
Full textIsberg, R. "Host microbe interactions: bacteria Innate immune response: attack and counter-attack." Current Opinion in Microbiology 3, no. 1 (2000): 13–15. http://dx.doi.org/10.1016/s1369-5274(99)00044-2.
Full textZhao, Jian Xun. "Research and Design on an Improved TOTP Authentication." Applied Mechanics and Materials 411-414 (September 2013): 595–99. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.595.
Full textKhan, Israr, William Farrelly, and Kevin Curran. "A Demonstration of Practical DNS Attacks and their Mitigation Using DNSSEC." International Journal of Wireless Networks and Broadband Technologies 9, no. 1 (2020): 56–78. http://dx.doi.org/10.4018/ijwnbt.2020010104.
Full textLasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." International Journal of Information Security and Privacy 5, no. 1 (2011): 33–49. http://dx.doi.org/10.4018/jisp.2011010103.
Full textJiao, Jiajia, Ran Wen, and Yulian Li. "T-Smade: A Two-Stage Smart Detector for Evasive Spectre Attacks Under Various Workloads." Electronics 13, no. 20 (2024): 4090. http://dx.doi.org/10.3390/electronics13204090.
Full textSarmento, H., A. Marques, J. Martins, T. Anguera, J. Campanico, and J. Leitao. "Tactical analysis of the Barcelona counter-attack." British Journal of Sports Medicine 45, no. 15 (2011): A4. http://dx.doi.org/10.1136/bjsports-2011-090606.12.
Full textDebatin, Klaus-Michael. "CD95 System Counter Attack and Prognostic Impact." Oncology Research and Treatment 29, no. 8-9 (2006): 358–59. http://dx.doi.org/10.1159/000094698.
Full textBraimah, Joseph Odunayo, Tendai Makoni, and Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria." F1000Research 13 (September 2, 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.
Full textKaur, Ramanpreet, Amrit Lal Sangal, and Krishan Kumar. "A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/5191405.
Full textMartin, Brian. "Preparing for advocacy, resisting attack." Pacific Conservation Biology 25, no. 1 (2019): 105. http://dx.doi.org/10.1071/pc17015.
Full textJeong, Yeuncheol. "THE OPERATION DESERT STORM AND THE PATRIOT MISSILE DEFENSE SYSTEM [4] -THE PATRIOT’S INDIRECT SUCCESS." International Journal of Applied Science and Engineering Review 05, no. 03 (2024): 24–26. http://dx.doi.org/10.52267/ijaser.2024.5305.
Full textRustamov, S., K. Sharipov, and T. Pulatov. "VULNERABILITY ANALYSIS OF EMERGENCY RESPONSE SYSTEM BASED ON NAVIGATIONAL UNITS IN CASE OF VEHICLE ACCIDENTS." Technical science and innovation 2020, no. 2 (2020): 14–18. http://dx.doi.org/10.51346/tstu-01.20.2-77-0058.
Full textChauahn, Devendra, Manish Patel, Bhavik Prajapati, and Gaurang Patel. "Intrusion Detection Approach Using AI & ML Classifiers." SPU Journal of Science, Technology and Management Research 1, no. 2 (2024): 40–50. https://doi.org/10.63766/spujstmr.24.000015.
Full textNisa, Khalimatu. "HUMOUR AS A COUNTER ISLAMIST DISCOURSE." Epistemé: Jurnal Pengembangan Ilmu Keislaman 18, no. 1 (2023): 1–25. http://dx.doi.org/10.21274/epis.2023.18.1.1-25.
Full textT, Mr Umesh. "SECURITY IN SOCIAL MEDIA: AWARNESS OF PHISHING ATTACKS TECHNIQUES AND COUNTER MEASURES." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31435.
Full textPfisterer, Valentin. "The Second SWIFT Agreement Between the European Union and the United States of America — An Overview." German Law Journal 11, no. 10 (2010): 1173–90. http://dx.doi.org/10.1017/s2071832200020174.
Full textAbdul, Khadar A., Shrishail Math Dr., Brahmananda S. H. Dr., and Shivamurthy G. Dr. "Website Vulnerability Detection: Inception of Mitigation of Advanced Persistent Threats." Solid State Technology 63, no. 6 (2020): 7902. https://doi.org/10.5281/zenodo.7549581.
Full textPingua, Bhagyajit, Deepak Murmu, Meenakshi Kandpal, et al. "Mitigating adversarial manipulation in LLMs: a prompt-based approach to counter Jailbreak attacks (Prompt-G)." PeerJ Computer Science 10 (October 22, 2024): e2374. http://dx.doi.org/10.7717/peerj-cs.2374.
Full textDr. P. S. AITHAL, Dr K. SAI MANOJ,. "CYBER SECURITY AND PRIVACY INTERNAL ATTACKS MEASUREMENTS THROUGH BLOCK CHAIN." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 1033–44. http://dx.doi.org/10.17762/itii.v9i1.236.
Full textDougan, Timothy, and Kevin Curran. "Man in the Browser Attacks." International Journal of Ambient Computing and Intelligence 4, no. 1 (2012): 29–39. http://dx.doi.org/10.4018/jaci.2012010103.
Full textQi, B., C. H. F. Fung, H. K. Lo, and F. X. Ma. "Time-shift attack in practical quantum cryptosystems." Quantum Information and Computation 7, no. 1&2 (2007): 73–82. http://dx.doi.org/10.26421/qic7.1-2-3.
Full textYankson, Samuel, and Mahdi Ghamkhari. "Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems." Future Internet 12, no. 1 (2019): 4. http://dx.doi.org/10.3390/fi12010004.
Full textKubayi, Alliance. "The Creation of Goal-Scoring Opportunities at the 2019 FIFA Women’s World Cup." Journal of Human Kinetics 82, no. 1 (2022): 165–72. http://dx.doi.org/10.2478/hukin-2022-0043.
Full textCummings, Brian. "Nietzsche and Luther: Reading, Counter-Text, Hermeneutics." CounterText 7, no. 1 (2021): 90–105. http://dx.doi.org/10.3366/count.2021.0217.
Full textKshirsagar, Prof Prakash. "Defend Predict: Forecasting Innovations in Cyber Attack Detection." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2858–67. http://dx.doi.org/10.22214/ijraset.2024.60466.
Full textAdi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.
Full textK.S, Poornima, and Nandhni J.P. "Enhanced RRED to Counter LDoS Attacks." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 08 (2013): 252–55. https://doi.org/10.5281/zenodo.14613317.
Full textFauzi, Muhammad, and Dikdik Zafar Sidik. "Efektivitas Distribusi Lemparan Kiper terhadap Hasil Counter Attack dalam Final Four Profesional 2018." Jurnal Kepelatihan Olahraga 11, no. 1 (2019): 12–20. http://dx.doi.org/10.17509/jko-upi.v11i1.16781.
Full text