Academic literature on the topic 'DIS attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DIS attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "DIS attack"
Christopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.
Full textMitchel, Christopher, Baraq Ghaleb, Safwan M. Ghaleb, Zakwan Jaroucheh, and Bander Ali Saleh Al-rimy. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 66–72. http://dx.doi.org/10.35940/ijeat.b1962.1210220.
Full textYildirim, D., R. C. Kardaş, B. Ozkiziltas, et al. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER." Annals of the Rheumatic Diseases 81, Suppl 1 (2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.
Full textGarcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.
Full textYildirim, D., E. Tahta, R. C. Kardaş, et al. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN." Annals of the Rheumatic Diseases 81, Suppl 1 (2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.
Full textVidal-Jordana, Angela, Alex Rovira, Georgina Arrambide, et al. "Optic Nerve Topography in Multiple Sclerosis Diagnosis." Neurology 96, no. 4 (2020): e482-e490. http://dx.doi.org/10.1212/wnl.0000000000011339.
Full textMedjek, Faiza, Djamel Tandjaoui, Nabil Djedjig, and Imed Romdhani. "Multicast DIS attack mitigation in RPL-based IoT-LLNs." Journal of Information Security and Applications 61 (September 2021): 102939. http://dx.doi.org/10.1016/j.jisa.2021.102939.
Full textRamani, Sagar, and Rutvij H. Jhaveri. "ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks." Sensors 22, no. 18 (2022): 6958. http://dx.doi.org/10.3390/s22186958.
Full textVolokyta, Artem, and Mykyta Melenchukov. "NEURAL NETWORKS IN DETECTING ATTACKS ON DISTRIBUTED SYSTEMS." TECHNICAL SCIENCES AND TECHNOLOGIES, no. 1(35) (2024): 135–45. http://dx.doi.org/10.25140/2411-5363-2024-1(35)-135-145.
Full textRajasekar, V. R., and S. Rajkumar. "A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network." Microprocessors and Microsystems 94 (October 2022): 104675. http://dx.doi.org/10.1016/j.micpro.2022.104675.
Full textDissertations / Theses on the topic "DIS attack"
Hedgren, Per Olof. "Dead wood retention and the risk of bark beetle attack /." Uppsala : Swedish University of Agricultural Sciences, 2002. http://diss-epsilon.slu.se/archive/00000188/.
Full textGürkaynak, Frank Kağan. "GALS system design side channel attack secure cryptographic accelerators." Konstanz Hartung-Gorre, 2006. http://e-collection.ethbib.ethz.ch/ecol-pool/diss/fulltext/eth16351.pdf.
Full textJouannet, Christopher. "Model based aircraft design : high angle of attack aerodynamics and weight estimation methods /." Linköping : Dept. of Mechanical Engineering, Linköping University, 2005. http://www.bibl.liu.se/liupubl/disp/disp2005/tek968s.pdf.
Full textCorzine, Larry M. "Communication breakdown DHS operations during a cyber attack." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4987.
Full textMunro, Cameron. "Water tunnel validation and experiments at high angles of attack for aircraft conceptual design /." Linköping : Univ, 2003. http://www.bibl.liu.se/liupubl/disp/disp2002/tek847s.pdf.
Full textKöpf, Boris Alexander. "Formal approaches to countering side-channel attacks /." Zürich : ETH, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17500.
Full textBeaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.
Full textYermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.
Full textMensah, Pernelle. "Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0011.
Full textOuladj, Maamar. "Optimisations des attaques par canaux cachés." Electronic Thesis or Diss., Paris 8, 2020. http://www.theses.fr/2020PA080019.
Full textBooks on the topic "DIS attack"
Scheerer, Sebastian. Die Zukunft des Terrorismus: Drei Szenarien. Zu Klampen!, 2002.
Find full text1944-, Blair John D., Fottler Myron D, and Zapanta Albert C, eds. Bioterrorism, preparedness, attack and response. Elsevier JAI, 2004.
Find full textReinig, Christa. Attac: Was wollen die Globalisierungskritiker? Rowohlt Verlag, 2002.
Find full textFischer, Joschka. Die Rückkehr der Geschichte: Die Welt nach dem 11. September und die Erneuerung des Westens. Kiepenheuer & Witsch, 2005.
Find full textUllrich, Stefan. Touring 9/11: Was ist nun die Wahrheit? : die Prüfung der Verschwörungstheorien zum 11. September 2001, die Kritik des US-Abschlussberichts, die Suche nach Osama bin Laden. Books on Demand, 2005.
Find full textNiemeyer, Katharina. Die Mediasphären des Terrorismus: Eine mediologische Betrachtung des 11. September. Avinus, 2006.
Find full textThevessen, Elmar. Schläfer mitten unter uns: Das Netzwerk des Terrors und der hilflose Aktionismus des Westens. Droemer, 2002.
Find full textChomsky, Noam. September 11 und die Folgen: Wohin steuert die Welt. Organisation Socialiste Libertaire, 2001.
Find full textChomsky, Noam. September 11 und die Folgen: Wohin steuert die Welt. Organisation Socialiste Libertaire, 2001.
Find full textBook chapters on the topic "DIS attack"
Alsabbagh, Wael, and Peter Langendoerfer. "A Remote Attack Tool Against Siemens S7-300 Controllers: A Practical Report." In Technologien für die intelligente Automation. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64283-2_1.
Full textSeaman, Jim. "Payment Channel Attack Vectors." In PCI DSS. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5808-8_10.
Full textMagazzini, Tina, Marina Eleftheriadou, and Anna Triandafyllidou. "Navigating Shifting Narratives of Terrorism and Resilience: The Spanish Case." In Rethinking Political Violence. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-71996-7_4.
Full textFradenburg, L. O. Aranye, and Eileen A. Joy. "Unlearning." In The Pedagogics of Unlearning. punctum books, 2016. https://doi.org/10.21983/p3.0140.1.08.
Full textMonthei, Dean L. "Die Attach Issues." In Electronic Packaging and Interconnects Series. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5111-9_15.
Full textReinhardt, Ilka, Felix Knauer, Micha Herdtfelder, Gesa Kluth, and Petra Kaczensky. "Wie lassen sich Nutztierübergriffe durch Wölfe nachhaltig minimieren? – Eine Literaturübersicht mit Empfehlungen für Deutschland." In Evidenzbasiertes Wildtiermanagement. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-65745-4_9.
Full textSchifman, Richard S., Stefan van As, Joseph Ganci, Phillip Kerman, Jeff McGuire, and Wade Wells. "Entwickeln für das Web." In Authorware Attain Praxis. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-59579-0_7.
Full textHendessi, Faramarz, and Mohammad R. Aref. "A successful attack against the DES." In Information Theory and Applications. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-57936-2_32.
Full textWintrobe, Ronald. "Why Did Japan Attack Pearl Harbor?" In Power and Responsibility. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23015-8_15.
Full textRoth, Bradley J. "Did Cuba Attack America with Microwaves?" In Are Electromagnetic Fields Making Me Ill? Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98774-9_8.
Full textConference papers on the topic "DIS attack"
Zamanzadeh, M., and Huiping Xu. "Fusion Bonded Epoxy Coatings (FBE) and Disbondment." In CORROSION 2016. NACE International, 2016. https://doi.org/10.5006/c2016-07246.
Full textAmri, Jamel, Egil Gulbrandsen, and Ricardo P. Nogueira. "Effect of Acetic Acid on Propagation and Stifling of Localized Attacks in CO2 Corrosion of Carbon Steel." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09284.
Full textScott, P. J. B., A. Al-Hashem, and J. Carew. "Experiments on MIC of Steel and FRP Downhole Tubulars in West Kuwait Brines." In CORROSION 2007. NACE International, 2007. https://doi.org/10.5006/c2007-07113.
Full textHarper, S. L., P. L. Daniel, D. L. Van Petten, and P. M. Winegar. "Corrosion Evaluation of Alternate Nuclear Steam Generator Tubing Materials." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86256.
Full textChen, Dake, Shiduo Li, Yuke Zhang, Chenghao Li, Souvik Kundu, and Peter A. Beerel. "DIA: Diffusion based Inverse Network Attack on Collaborative Inference." In 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2024. http://dx.doi.org/10.1109/cvprw63382.2024.00017.
Full textCasado-Galán, A., F. E. Potestad-Ordóñez, A. J. Acosta, and E. Tena-Sánchez. "Electromagnetic Fault Injection Attack Methodology against AES Hardware Implementation." In 2024 39th Conference on Design of Circuits and Integrated Systems (DCIS). IEEE, 2024. https://doi.org/10.1109/dcis62603.2024.10769137.
Full textShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Full textAndo, A., Y. Hattori, N. Hatanaka, and T. Kittaka. "Development of Aluminum Coated Stainless Steel Sheet - Material for Automotive Exhaust Systems." In CORROSION 1991. NACE International, 1991. https://doi.org/10.5006/c1991-91384.
Full textShaw, Mark, Daniele Simoncini, Roseanne Duca, et al. "Die Attach Material Choice for MEMS Cavity Packages." In 2024 IEEE 26th Electronics Packaging Technology Conference (EPTC). IEEE, 2024. https://doi.org/10.1109/eptc62800.2024.10909794.
Full textBerger, Saria, Frederic A. Banville, Catherine Marsan-Loyer, David Danovitch, David Gendron, and Serge Ecoffey. "Bio-Sourced Unfilled Epoxy for Die-Attach Applications." In 2025 IEEE 75th Electronic Components and Technology Conference (ECTC). IEEE, 2025. https://doi.org/10.1109/ectc51687.2025.00081.
Full textReports on the topic "DIS attack"
de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textKirichek, Galina, Vladyslav Harkusha, Artur Timenko, and Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3743.
Full textOvrebo, Gregory K. Thermal Simulation of Four Die-Attach Materials. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada477276.
Full textGuo, Ge, Jiageng Liu, and Guangheng Liu. Multi-sensor Fusion-based Vehicle Localization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024023.
Full textTreadwell, Jonathan R., Amy Y. Tsou, Benjamin Rouse, et al. Behavioral Interventions for Migraine Prevention. Agency for Healthcare Research and Quality (AHRQ), 2024. http://dx.doi.org/10.23970/ahrqepccer270.
Full textKemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.
Full textWeinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/gmax3657.
Full textDevereux, Stephen. Was There a Famine in Gaza in 2024? Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.042.
Full textDoo, Johnny. Beyond Aviation: Embedded Gaming, Artificial Intelligence, Training, and Recruitment for the Advanced Air Mobility Industry. SAE International, 2024. https://doi.org/10.4271/epr2024028.
Full textRobles, Miguel, Hugo R. Ñopo, and Jaime Saavedra-Chanduví. Occupational Training to Reduce Gender Segregation: The Impacts of ProJoven. Inter-American Development Bank, 2007. http://dx.doi.org/10.18235/0011273.
Full text