Academic literature on the topic 'Data replacement attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data replacement attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data replacement attack"
Ganesh, Dagadu Puri, and Haritha D. "Framework to Avoid Similarity Attack in Big Streaming Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2920–25. https://doi.org/10.11591/ijece.v8i5.pp2920-2925.
Full textGu, Rui, Jian Wang, Benpeng Li, Di Qi, Xiaohu Gao, and Zhiyong Yang. "Experimental Study on Mechanical Properties and Compressive Constitutive Model of Recycled Concrete under Sulfate Attack Considering the Effects of Multiple Factors." Buildings 14, no. 9 (2024): 2761. http://dx.doi.org/10.3390/buildings14092761.
Full textSunderi, Pranata, and Tri Nugroho Hargyo. "2FYSH: two-factor authentication you should have for password replacement." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 693–702. https://doi.org/10.12928/TELKOMNIKA.v17i2.9187.
Full textWang, Qi, Lin Qiao, and Peng Song. "Effect of Fly Ash and Slag on the Resistance to H2S Attack of Oil Well Cement." Advanced Materials Research 79-82 (August 2009): 71–74. http://dx.doi.org/10.4028/www.scientific.net/amr.79-82.71.
Full textXi, Peng, Shaoliang Peng, and Wenjuan Tang. "IBAS:Imperceptible Backdoor Attacks in Split Learning with Limited Information." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 26 (2025): 27715–22. https://doi.org/10.1609/aaai.v39i26.34986.
Full textWang, Guilin, Hua Shen, Liquan Chen, Jinguang Han, and Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks." Electronics 12, no. 23 (2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Full textFu, Xiaopeng, Zhaoquan Gu, Weihong Han, Yaguan Qian, and Bin Wang. "Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks." Wireless Communications and Mobile Computing 2021 (September 27, 2021): 1–9. http://dx.doi.org/10.1155/2021/9969867.
Full textPuri, Ganesh Dagadu, and D. Haritha. "Framework to Avoid Similarity Attack in Big Streaming Dat." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2920. http://dx.doi.org/10.11591/ijece.v8i5.pp2920-2925.
Full textBagui, Sikha S., Dustin Mink, Subhash C. Bagui, and Sakthivel Subramaniam. "Resampling to Classify Rare Attack Tactics in UWF-ZeekData22." Knowledge 4, no. 1 (2024): 96–119. http://dx.doi.org/10.3390/knowledge4010006.
Full textPrudhvi, E., and Sujatha Reddy. "A Study on Partial Replacement of Cement using Natural Zeolite." Journal of Physics: Conference Series 2779, no. 1 (2024): 012055. http://dx.doi.org/10.1088/1742-6596/2779/1/012055.
Full textDissertations / Theses on the topic "Data replacement attack"
Erfani, Yousof. "Applications of perceptual sparse representation (Spikegram) for copyright protection of audio signals." Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9859.
Full textBook chapters on the topic "Data replacement attack"
Cui, Xu, Ruiqiang Ma, Haoran Yang, and Yanan Guo. "Research on Privacy Preservation and Identification Algorithms for Personal Information Data." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2025. https://doi.org/10.3233/faia250185.
Full textRowley-Conwy, Peter. "The Three Age System as Predator: Copenhagen and Lund 1836–1850." In From Genesis to Prehistory. Oxford University Press, 2007. http://dx.doi.org/10.1093/oso/9780199227747.003.0007.
Full textPal, Koushik, Goutam Ghosh, and Mahua Bhattacharya. "Biomedical Watermarking." In Biomedical Engineering. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3158-6.ch027.
Full textPal, Koushik, Goutam Ghosh, and Mahua Bhattacharya. "Biomedical Watermarking." In Research Developments in Computer Vision and Image Processing. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4558-5.ch012.
Full textSivanandan N, Dr. "SMART HELMET USING PICMICRO CONTROLLER." In Futuristic Trends in Electronics & Instrumentation Engineering Volume 3 Book 1. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bdei1p5ch2.
Full textVaxevanopoulos, Markos, James Ross, Konstantinos Soukis, Panagiotis Voudouris, and Vasilios Melfos. "Mapping the shafts of Laurion – Contribution to a new geological stratigraphy." In Der Anschnitt, Beihefte. Deutsches Bergbau-Museum Bochum, 2023. https://doi.org/10.46586/dbm.264.390.
Full textConference papers on the topic "Data replacement attack"
Licina, George J., and George Nekoksa. "Monitoring Biofilm Formation in a Brackish Water Cooled Power Plant Environment." In CORROSION 1997. NACE International, 1997. https://doi.org/10.5006/c1997-97222.
Full textMishra, Ajit, John Doyle, and Vinay Deodeshmukh. "Application of a Highly Corrosion-Resistant Nickel-Alloy in the Chemical Industry." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19183.
Full textMacha, Erica N., Erin DeCarlo, and James F. Dante. "Development of a Methodology to Predict Atmospheric Corrosion Severity Using Corrosion Sensor Technologies." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13389.
Full textDownie, R. L., and O. C. Dias. "Localized U-Bend Attack in 1 ¼ Cr - ½ Mo Reformer Heater Tubes." In CORROSION 1999. NACE International, 1999. https://doi.org/10.5006/c1999-99386.
Full textRomano, Peter, Michael Seifert, and Michael Smith. "The 505 Low Vibration Solution." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12028.
Full textPlumley, A. L., D. J. Hollenbach, and J. F. Henry. "The Protection of Critical Recovery Boiler Components - The Case for Chromizing." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93251.
Full textChen, Pengpeng, Yongqiang Yang, Dingqi Yang, Hailong Sun, Zhijun Chen, and Peng Lin. "Black-Box Data Poisoning Attacks on Crowdsourcing." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/332.
Full textTsuda, Takuji, Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio. "Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs." In 2014 15th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2014. http://dx.doi.org/10.1109/mdm.2014.40.
Full textPalese, Joseph W., Allan M. Zarembski, and Kyle Ebersole. "Stochastic Analysis of Transit Wheel Wear and Optimized Forecasting of Wheel Maintenance Requirements." In 2019 Joint Rail Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/jrc2019-1305.
Full textTsuda, Takuji, Yuka Komai, Takahiro Hara, and Shojiro Nishio. "Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs." In 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, 2015. http://dx.doi.org/10.1109/srds.2015.34.
Full textReports on the topic "Data replacement attack"
Castro, Rubén, Leonardo González, Ignacio Schiappacasse, and Juan Tapia. The Impact of Covid-19 on Pensions due to Early Withdrawals of Pension Savings. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004517.
Full text