Journal articles on the topic 'Defacement'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Defacement.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hoang, Xuan Dau, and Ngoc Tuong Nguyen. "Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures." Computers 8, no. 2 (May 8, 2019): 35. http://dx.doi.org/10.3390/computers8020035.
Full textBergadano, Francesco, Fabio Carretto, Fabio Cogno, and Dario Ragno. "Defacement Detection with Passive Adversaries." Algorithms 12, no. 8 (July 29, 2019): 150. http://dx.doi.org/10.3390/a12080150.
Full textYoung, Kevin. "Defacement." Callaloo 20, no. 2 (1997): 292–93. http://dx.doi.org/10.1353/cal.1997.0067.
Full textBarber, Charles. "Defacement." Yearbook of Comparative Literature 56, no. 1 (2010): 104–15. http://dx.doi.org/10.1353/cgl.2010.0011.
Full textHariyadi, Dedy. "Analisis Serangan Web Defacement pada Situs Web Pemerintah Menggunakan ELK Stack." JISKA (Jurnal Informatika Sunan Kalijaga) 4, no. 1 (November 16, 2019): 1. http://dx.doi.org/10.14421/jiska.2019.41-01.
Full textAlbalawi, Mariam, Rasha Aloufi, Norah Alamrani, Neaimh Albalawi, Amer Aljaedi, and Adel R. Alharbi. "Website Defacement Detection and Monitoring Methods: A Review." Electronics 11, no. 21 (November 1, 2022): 3573. http://dx.doi.org/10.3390/electronics11213573.
Full textAryapranata, Ariawan, Sigit Hermanto, Yogi Priya Agsena, Yuliansyah Al Rasyid, and Fachrul Husain Habibie. "Pencegahan Web Defacement." Jurnal Esensi Infokom : Jurnal Esensi Sistem Informasi dan Sistem Komputer 8, no. 1 (May 31, 2024): 10–19. http://dx.doi.org/10.55886/infokom.v8i1.816.
Full textMantzios, George. "Cold War image-myths: A crime scene ethnography of defacement and historical redress from Athens, Greece." International Journal of Cultural Studies 24, no. 5 (March 5, 2021): 749–66. http://dx.doi.org/10.1177/1367877921996371.
Full textZayid, Elrasheed, Ibrahim Isah, Nadir Farah, Yagoub Adam, and Omar Alshehri. "Exploiting the Capabilities of Classifiers to Examine a Website Defacement Data Set." International Journal of Computers and Informatics 3, no. 3 (March 31, 2024): 9–41. http://dx.doi.org/10.59992/ijci.2024.v3n3p1.
Full textDavidson, Tonya. "Mica, Pedagogy, and Defacement." Public Historian 38, no. 2 (May 1, 2016): 42–61. http://dx.doi.org/10.1525/tph.2016.38.2.42.
Full textSoetomo, Mohammad Amin, and Rio Asepta. "Risks Mitigation of Defacement Attack Vectors on Educational Institution Websites by Using OWASP and Risk IT Frameworks." ACMIT Proceedings 3, no. 1 (March 18, 2019): 14–23. http://dx.doi.org/10.33555/acmit.v3i1.22.
Full textMondragón, Oscar, Andrés Felipe Mera Arcos, Christian Urcuqui, and Andrés Navarro Cadavid. "Security control for website defacement." Sistemas y Telemática 15, no. 41 (August 1, 2017): 45–55. http://dx.doi.org/10.18046/syt.v15i41.2442.
Full textK Das, Ashish, Quynh Thi Nguyen, and Susan Thomas. "Entertaining Whilst Defacing Websites: Psychological Games for Hackers." Issues in Informing Science and Information Technology 14 (2017): 219–27. http://dx.doi.org/10.28945/3801.
Full textMarschall, Sabine. "Targeting Statues: Monument “Vandalism” as an Expression of Sociopolitical Protest in South Africa." African Studies Review 60, no. 3 (August 7, 2017): 203–19. http://dx.doi.org/10.1017/asr.2017.56.
Full textLerer, Seth. "Devotion and Defacement: Reading Children's Marginalia." Representations 118, no. 1 (2012): 126–53. http://dx.doi.org/10.1525/rep.2012.118.1.126.
Full textYusuf Raharja. "Implementasi Metode Osint untuk Mengidentifikasi Serangan Judi Online pada Website." Jurnal Informatika Polinema 10, no. 3 (May 31, 2024): 359–64. http://dx.doi.org/10.33795/jip.v10i3.4847.
Full textHan, Mee Lan, Byung Il Kwak, and Huy Kang Kim. "CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis." Security and Communication Networks 2019 (December 20, 2019): 1–21. http://dx.doi.org/10.1155/2019/1901548.
Full textMajkut, Paul. "Media Structural Defacement and Its Philosophical Implications." Glimpse 21 (2020): 97–107. http://dx.doi.org/10.5840/glimpse20202111.
Full textGoodyear, Anne Collins. "Digitization, Genetics, and the Defacement of Portraiture." American Art 23, no. 2 (June 2009): 28–31. http://dx.doi.org/10.1086/605708.
Full textNjoku, Jonathan. "Defacement of bank going concern public secrecy." International Journal of Critical Accounting 5, no. 3 (2013): 229. http://dx.doi.org/10.1504/ijca.2013.055477.
Full textJain, Palak, Nikhil Kumar Singh, and Dr Deepak Singh Tomar. "Defacement of Colluding Attack Using Blowfish Algorithm." International Journal of Engineering and Technology 9, no. 3 (June 30, 2017): 2420–34. http://dx.doi.org/10.21817/ijet/2017/v9i3/1709030233.
Full textUrcuqui, Christian Camilo, Melisa García Peña, José Luis Osorio Quintero, and Andrés Navarro Cadavid. "Antidefacement." Sistemas y Telemática 14, no. 39 (December 1, 2016): 9–27. http://dx.doi.org/10.18046/syt.v14i39.2341.
Full textBurton, Laura L. "Defacement: Indigenous Patients' Experiences in Baja Verapaz, Guatemala." Howard Journal of Communications 23, no. 2 (April 2012): 119–35. http://dx.doi.org/10.1080/10646175.2012.667723.
Full textHens, H. L. S. C. "Fungal Defacement in Buildings: A Performance Related Approach." HVAC&R Research 5, no. 3 (July 1, 1999): 265–80. http://dx.doi.org/10.1080/10789669.1999.10391237.
Full textKung, Ren-Yi, Nai-Hsin Pan, Charles C. N. Wang, and Pin-Chan Lee. "Application of Deep Learning and Unmanned Aerial Vehicle on Building Maintenance." Advances in Civil Engineering 2021 (April 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/5598690.
Full textCho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms." Electronics 8, no. 11 (November 13, 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.
Full textKaulingfreks, Ruud, and René ten Bos. "On faces and defacement: the case of Kate Moss." Business Ethics: A European Review 16, no. 3 (July 2007): 302–12. http://dx.doi.org/10.1111/j.1467-8608.2007.00501.x.
Full textDavanzo, G., E. Medvet, and A. Bartoli. "Anomaly detection techniques for a web defacement monitoring service." Expert Systems with Applications 38, no. 10 (September 2011): 12521–30. http://dx.doi.org/10.1016/j.eswa.2011.04.038.
Full textIndah Septiani, Nurina, Agung Sediyono, and Abdul Rochman. "PERANCANGAN WEB DEFACEMENT MONITORING DENGAN MENGGUNAKAN METODE KOMPARASI NILAI HASH1." JIKO (Jurnal Informatika dan Komputer) 5, no. 2 (August 8, 2022): 150–55. http://dx.doi.org/10.33387/jiko.v5i2.4852.
Full textR, Newlin Shebiah, and Arivazhagan S. "Versatile Defacement Detection by Monitoring Video Sequences Using Deep Learning." European Journal of Engineering Research and Science 4, no. 7 (July 19, 2019): 37–41. http://dx.doi.org/10.24018/ejers.2019.4.7.1396.
Full textR, Newlin Shebiah, and Arivazhagan S. "Versatile Defacement Detection by Monitoring Video Sequences Using Deep Learning." European Journal of Engineering and Technology Research 4, no. 7 (July 19, 2019): 37–41. http://dx.doi.org/10.24018/ejeng.2019.4.7.1396.
Full textSchwyzer, Philip. "Fallen idols, broken noses: Defacement and memory after the Reformation." Memory Studies 11, no. 1 (January 2018): 21–35. http://dx.doi.org/10.1177/1750698017736835.
Full textBrook, Scott. "Touring the Phantom Agent: Recognition, Defacement and the Vietnamese Australian War Memorial." Journal of Intercultural Studies 27, no. 1-2 (February 2006): 133–49. http://dx.doi.org/10.1080/07256860600607900.
Full textAshby, Richard. "Face-off: defacement, ethics and the ‘neighbour’ in The Comedy of Errors." Textual Practice 32, no. 8 (January 20, 2017): 1255–75. http://dx.doi.org/10.1080/0950236x.2016.1275757.
Full textRamos, N. M. M., E. Barreira, M. L. Simões, and J. M. P. Q. Delgado. "Probabilistic Risk Assessment Methodology of Exterior Surfaces Defacement Caused by Algae Growth." Journal of Construction Engineering and Management 140, no. 12 (December 2014): 05014012. http://dx.doi.org/10.1061/(asce)co.1943-7862.0000909.
Full textCollins, Katie. "“Her Ruined Head”: Defacement and Bodyminds in Jean Stafford’s Life and Work." Journal of Modern Literature 45, no. 1 (January 2021): 121–36. http://dx.doi.org/10.2979/jmodelite.45.1.08.
Full textKavyashree, K., C. N. Sowmyarani, and P. Dayananda. "Transmission Control Protocol Off Path Exploits in Web." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 3995–98. http://dx.doi.org/10.1166/jctn.2020.9006.
Full textEssien, D. "Economic implications of superstition and the defacement of the currency notes: Nigeria experience." African J. of Economic and Sustainable Development 3, no. 1 (2014): 65. http://dx.doi.org/10.1504/ajesd.2014.061635.
Full textPowell, M. A., R. A. Eaton, and J. F. Webber. "The role of micro-arthropods in the defacement of sawn lumberby sapstain and mould fungi." Canadian Journal of Forest Research 25, no. 7 (July 1, 1995): 1148–56. http://dx.doi.org/10.1139/x95-127.
Full textHuang, Wenzhi. "“Defacing the Leader’s Portrait and Quotations”: An Archival Study of Four Cases." Rural China 16, no. 2 (October 7, 2019): 243–92. http://dx.doi.org/10.1163/22136746-01602004.
Full textBreen, Colin, and John Raven. "Archaeological investigations at Kinbane Castle, County Antrim and its Scottish connections." Proceedings of the Society of Antiquaries of Scotland 144 (November 30, 2015): 311–22. http://dx.doi.org/10.9750/psas.144.311.322.
Full textMeskill, Lynn S. "Jonson and the Alchemical Economy of Desire: Creation, Defacement and Castration in The Alchemist." Cahiers Élisabéthains: A Journal of English Renaissance Studies 62, no. 1 (October 2002): 47–63. http://dx.doi.org/10.7227/ce.62.1.6.
Full textHowell, C. Jordan, George W. Burruss, David Maimon, and Shradha Sahani. "Website defacement and routine activities: considering the importance of hackers’ valuations of potential targets." Journal of Crime and Justice 42, no. 5 (October 20, 2019): 536–50. http://dx.doi.org/10.1080/0735648x.2019.1691859.
Full textJennings, Margaret, and Francis P. Kilcoyne. "Defacement: Practical Theology, Politics, or Prejudice: The Case of the North Portal of Bourges." Church History 72, no. 2 (June 2003): 276–303. http://dx.doi.org/10.1017/s0009640700099856.
Full textMitchell, Beverly Eileen. "The Struggle for Human Dignity in a Consumer-Oriented Culture." Anglican Theological Review 98, no. 1 (September 2016): 111–23. http://dx.doi.org/10.1177/000332861609800109.
Full textMoneva, Asier, E. Rutger Leukfeldt, Steve G. A. Van De Weijer, and Fernando Miró-Llinares. "Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective." Computers in Human Behavior 126 (January 2022): 106984. http://dx.doi.org/10.1016/j.chb.2021.106984.
Full textSclocchi, Maria Carla, Lucia Kraková, Flavia Pinzari, Piero Colaizzi, Marina Bicchieri, Nikoleta Šaková, and Domenico Pangallo. "Microbial Life and Death in a Foxing Stain: a Suggested Mechanism of Photographic Prints Defacement." Microbial Ecology 73, no. 4 (December 15, 2016): 815–26. http://dx.doi.org/10.1007/s00248-016-0913-7.
Full textPatta, Abd Rahman, and Suhartono Suhartono. "PENGEMBANGAN SISTEM INFORMASI ABSENSI GURU DAN SISWA BERBASIS WEB DI SMA NEGERI 1 TELLULIMPOE KABUPATEN SINJAI." Jurnal Teknologi Elekterika 1, no. 1 (July 9, 2022): 76. http://dx.doi.org/10.31963/elekterika.v1i1.1216.
Full textPatta, Abd Rahman, and Suhartono Suhartono. "PENGEMBANGAN SISTEM INFORMASI ABSENSI GURU DAN SISWA BERBASIS WEB DI SMA NEGERI 1 TELLULIMPOE KABUPATEN SINJAI." Jurnal Teknologi Elekterika 14, no. 1 (May 31, 2017): 76. http://dx.doi.org/10.31963/elekterika.v14i1.1216.
Full textCapps†, Donald. "Stephen Pattison , Saving Face: Defacement, Shame, Theology (Farnham and Burlington, VT: Ashgate, 2013), pp. 210. £17.99." Scottish Journal of Theology 69, no. 3 (July 26, 2016): 344–47. http://dx.doi.org/10.1017/s0036930614000660.
Full text