Academic literature on the topic 'DIS attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DIS attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "DIS attack"

1

Christopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.

Full text
Abstract:
With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (I
APA, Harvard, Vancouver, ISO, and other styles
2

Mitchel, Christopher, Baraq Ghaleb, Safwan M. Ghaleb, Zakwan Jaroucheh, and Bander Ali Saleh Al-rimy. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 66–72. http://dx.doi.org/10.35940/ijeat.b1962.1210220.

Full text
Abstract:
With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (I
APA, Harvard, Vancouver, ISO, and other styles
3

Yildirim, D., R. C. Kardaş, B. Ozkiziltas, et al. "AB1272 FACTORS AFFECTING PATIENT-ACCEPTABLE SYMPTOM STATES IN FAMILIAL MEDITERRANEAN FEVER." Annals of the Rheumatic Diseases 81, Suppl 1 (2022): 1744.1–1744. http://dx.doi.org/10.1136/annrheumdis-2022-eular.386.

Full text
Abstract:
BackgroundFamilial Mediterranean fever (FMF) is an autoinflammatory disease characterized by recurrent attacks of fever, serositis, and musculoskeletal symptoms (1, 2). Arthritis is the most common musculoskeletal symptom of attacks and also included in diagnostic criteria of FMF (3). If it is specifically queried, myalgia may be detected in up to 20-25% of the patients with FMF.(4,5).ObjectivesIn our study, we aim to assess the localization of attack-related myalgia and associated parameters in patients with FMF.MethodsA total of 349 consecutive patients followed by FMF in our clinic were enr
APA, Harvard, Vancouver, ISO, and other styles
4

Garcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.

Full text
Abstract:
The Internet of Things (IoT) has become very popular during the last decade by providing new solutions to modern industry and to entire societies. At the same time, the rise of the industrial Internet of Things (IIoT) has provided various benefits by linking infrastructure around the world via sensors, machine learning, and data analytics. However, the security of IoT devices has been proven to be a major concern. Almost a decade ago, the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was designed to handle routing in IoT and IIoT. Since then, numerous types of attacks on RPL hav
APA, Harvard, Vancouver, ISO, and other styles
5

Yildirim, D., E. Tahta, R. C. Kardaş, et al. "POS1364 ATTACKS OF MYALGIA IN PATIENTS WITH FAMILIAL MEDITERRANEAN FEVER: OTHER THAN CALF PAIN." Annals of the Rheumatic Diseases 81, Suppl 1 (2022): 1021.1–1021. http://dx.doi.org/10.1136/annrheumdis-2022-eular.4246.

Full text
Abstract:
BackgroundFamilial Mediterranean fever (FMF) is an autoinflammatory disease characterized by recurrent attacks of fever, serositis, and musculoskeletal symptoms [1, 2]. Arthritis is the most common musculoskeletal symptom of attacks and also included in diagnostic criteria of FMF [3]. If it is specifically queried, myalgia may be detected in up to 20-25% of the patients with FMF. [4, 5].ObjectivesIn our study, we aim to assess the localization of attack-related myalgia and associated parameters in patients with FMF.MethodsA total of 349 consecutive patients followed by FMF in our clinic were e
APA, Harvard, Vancouver, ISO, and other styles
6

Vidal-Jordana, Angela, Alex Rovira, Georgina Arrambide, et al. "Optic Nerve Topography in Multiple Sclerosis Diagnosis." Neurology 96, no. 4 (2020): e482-e490. http://dx.doi.org/10.1212/wnl.0000000000011339.

Full text
Abstract:
ObjectiveTo assess the added value of the optic nerve region (by using visual evoked potentials [VEPs]) to the current diagnostic criteria.MethodsFrom the Barcelona clinically isolated syndrome (CIS) cohort, patients with complete information to assess dissemination in space (DIS), the optic nerve region, and dissemination in time at baseline (n = 388) were selected. Modified DIS (modDIS) criteria were constructed by adding the optic nerve to the current DIS regions. The DIS and modDIS criteria were evaluated with univariable Cox proportional hazard regression analyses with the time to the sec
APA, Harvard, Vancouver, ISO, and other styles
7

Medjek, Faiza, Djamel Tandjaoui, Nabil Djedjig, and Imed Romdhani. "Multicast DIS attack mitigation in RPL-based IoT-LLNs." Journal of Information Security and Applications 61 (September 2021): 102939. http://dx.doi.org/10.1016/j.jisa.2021.102939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramani, Sagar, and Rutvij H. Jhaveri. "ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks." Sensors 22, no. 18 (2022): 6958. http://dx.doi.org/10.3390/s22186958.

Full text
Abstract:
Traditional security mechanisms find difficulties in dealing with intelligent assaults in cyber-physical systems (CPSs) despite modern information and communication technologies. Furthermore, resource consumption in software-defined networks (SDNs) in industrial organizations is usually on a larger scale, and the present routing algorithms fail to address this issue. In this paper, we present a real-time delay attack detection and isolation scheme for fault-tolerant software-defined industrial networks. The primary goal of the delay attack is to lower the resilience of our previously proposed
APA, Harvard, Vancouver, ISO, and other styles
9

Volokyta, Artem, and Mykyta Melenchukov. "NEURAL NETWORKS IN DETECTING ATTACKS ON DISTRIBUTED SYSTEMS." TECHNICAL SCIENCES AND TECHNOLOGIES, no. 1(35) (2024): 135–45. http://dx.doi.org/10.25140/2411-5363-2024-1(35)-135-145.

Full text
Abstract:
Modern challenges in processing vast amounts of data are solved with the help of complex distributed systems, which in turn require cyber protection, that has the instruments for managing security riskssuch as information acquisition, espionage, reduction of system productivity, etc. This article provides an overview of some approaches to detecting cyberattacks, which in particular use machine learning. Their advantages, disadvantages, work methods, vulnerabilities, and approaches to their protection are given. Approaches to using various machine learning modelsfor pre-processing input data, w
APA, Harvard, Vancouver, ISO, and other styles
10

Rajasekar, V. R., and S. Rajkumar. "A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network." Microprocessors and Microsystems 94 (October 2022): 104675. http://dx.doi.org/10.1016/j.micpro.2022.104675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "DIS attack"

1

Hedgren, Per Olof. "Dead wood retention and the risk of bark beetle attack /." Uppsala : Swedish University of Agricultural Sciences, 2002. http://diss-epsilon.slu.se/archive/00000188/.

Full text
Abstract:
Thesis (doctoral)--Swedish University of Agricultural Sciences, 2002.<br>Thesis statement in Swedish and English abstract inserted. Appendix reprints four papers and manuscripts, three co-authored with others. Includes bibliographical references. Also issued electronically via World Wide Web in PDF format; online version lacks appendix.
APA, Harvard, Vancouver, ISO, and other styles
2

Gürkaynak, Frank Kağan. "GALS system design side channel attack secure cryptographic accelerators." Konstanz Hartung-Gorre, 2006. http://e-collection.ethbib.ethz.ch/ecol-pool/diss/fulltext/eth16351.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jouannet, Christopher. "Model based aircraft design : high angle of attack aerodynamics and weight estimation methods /." Linköping : Dept. of Mechanical Engineering, Linköping University, 2005. http://www.bibl.liu.se/liupubl/disp/disp2005/tek968s.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Corzine, Larry M. "Communication breakdown DHS operations during a cyber attack." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4987.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Department of Homeland Security (DHS) leverages information technology to increase the effectiveness of first responders during disaster recovery. At the same time, cyber attacks against these information technologies have significantly increased. Unfortunately, cyber attacks have grown faster than the technologies used to defend them. The reliance on technology coupled with the difficulty of defending it makes it unrealistic to assume that communications will always be available when needed. Therefore, it is critical that first res
APA, Harvard, Vancouver, ISO, and other styles
5

Munro, Cameron. "Water tunnel validation and experiments at high angles of attack for aircraft conceptual design /." Linköping : Univ, 2003. http://www.bibl.liu.se/liupubl/disp/disp2002/tek847s.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Köpf, Boris Alexander. "Formal approaches to countering side-channel attacks /." Zürich : ETH, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Beaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.

Full text
Abstract:
L’Internet des Objects (IoT) est un modèle qui évolue rapidement et qui permet à des utilisateursd’utiliser et contrôler une large variété d’objets connectés entre eux. Ces environnementsconnectés augmentent la surface d’attaque d’un système puisque les risques sont multipliés parle nombre d’appareils connectés. Ces appareils sont responsables de tâches plus ou moinscritiques, et peuvent donc être la cible d’utilisateurs malveillants. Dans ce travail de thèse nousprésentons une méthodologie pour évaluer la sécurité de systèmes IoT. Nous proposons unemanière de représenter les systèmes IoT, cou
APA, Harvard, Vancouver, ISO, and other styles
8

Yermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.

Full text
Abstract:
L’utilisation de l’information est étroitement liée à sa sécurité. Le fait d’exploiter des vulnérabilités permet à une tierce personne de compromettre la sécurité d’un système d’information. La modélisation des menaces aide à prévoir les attaques les plus probables visant une infrastructure donnée afin de mieux les contrer. Le projet de recherche proposé « Estimation des risques et prédiction des cyber-attaques » vise la combinaison de différentes techniques de prédiction de cyber-attaques pour mieux protéger un système informatique. Il est nécessaire de trouver les paramètres les plus informa
APA, Harvard, Vancouver, ISO, and other styles
9

Mensah, Pernelle. "Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0011.

Full text
Abstract:
Dans les infrastructures traditionnelles, les graphes d’attaque permettent de brosser un tableau de la sécurité, car ils sont un modèle décrivant les différentes étapes suivies par un attaquant dans le but de compromettre un actif du réseau. Ces graphes peuvent ainsi servir de base à l’évaluation automatisée des risques, en s’appuyant sur l’identification et l’évaluation des actifs essentiels. Cela permet de concevoir des contre-mesures proactives et réactives pour la réduction des risques et peut être utilisé pour la surveillance et le renforcement de la sécurité du réseau.Cette thèse vise à
APA, Harvard, Vancouver, ISO, and other styles
10

Ouladj, Maamar. "Optimisations des attaques par canaux cachés." Electronic Thesis or Diss., Paris 8, 2020. http://www.theses.fr/2020PA080019.

Full text
Abstract:
L’ère numérique d’aujourd’hui relie tous les objets entre eux grâce à l’Internet des objets (IoT). Cela conduit à une omniprésence des systèmes embarqués, qui sont dotés de protocoles cryptographiques. Néanmoins, les implémentations de ces protocoles, entraînent des fuites d’informations sensibles pendant leur exécution. Les attaques par canaux auxiliaires (SCA) est un domaine dont l’objectif est l’analyse de ces fuites d’informations, afin de récupérer les paramètres secrets des protocoles.En fonction des habilités de l’adversaire, l’attaque optimale est soit l’analyse par corrélation de la c
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "DIS attack"

1

Scheerer, Sebastian. Die Zukunft des Terrorismus: Drei Szenarien. Zu Klampen!, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1944-, Blair John D., Fottler Myron D, and Zapanta Albert C, eds. Bioterrorism, preparedness, attack and response. Elsevier JAI, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reinig, Christa. Attac: Was wollen die Globalisierungskritiker? Rowohlt Verlag, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fischer, Joschka. Die Rückkehr der Geschichte: Die Welt nach dem 11. September und die Erneuerung des Westens. Kiepenheuer & Witsch, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ullrich, Stefan. Touring 9/11: Was ist nun die Wahrheit? : die Prüfung der Verschwörungstheorien zum 11. September 2001, die Kritik des US-Abschlussberichts, die Suche nach Osama bin Laden. Books on Demand, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Niemeyer, Katharina. Die Mediasphären des Terrorismus: Eine mediologische Betrachtung des 11. September. Avinus, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thevessen, Elmar. Schläfer mitten unter uns: Das Netzwerk des Terrors und der hilflose Aktionismus des Westens. Droemer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Greiner, Bernd. 9/11: Der Tag, die Angst, die Folgen. C.H. Beck, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chomsky, Noam. September 11 und die Folgen: Wohin steuert die Welt. Organisation Socialiste Libertaire, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chomsky, Noam. September 11 und die Folgen: Wohin steuert die Welt. Organisation Socialiste Libertaire, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "DIS attack"

1

Alsabbagh, Wael, and Peter Langendoerfer. "A Remote Attack Tool Against Siemens S7-300 Controllers: A Practical Report." In Technologien für die intelligente Automation. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64283-2_1.

Full text
Abstract:
AbstractThis paper presents a series of attacks against Siemens S7-300 programmable logic controllers (PLCs), using our remote IHP-Attack tool. Due to the lack of integrity checks in S7-300 PLCs, such controllers execute commands whether or not they are delivered from a legitimate user. Thus, they were exposed to various kind of cyber-attacks over the last years such as reply, bypass authentication and access control attacks. In this work, we build up our tool to carry out a series of attacks based on the existing reported vulnerabilities of S7-300 PLCs in the research community. For real worl
APA, Harvard, Vancouver, ISO, and other styles
2

Seaman, Jim. "Payment Channel Attack Vectors." In PCI DSS. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5808-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Magazzini, Tina, Marina Eleftheriadou, and Anna Triandafyllidou. "Navigating Shifting Narratives of Terrorism and Resilience: The Spanish Case." In Rethinking Political Violence. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-71996-7_4.

Full text
Abstract:
AbstractSpain was the first European country to suffer a large-scale jihadist attack on its territory—the 2004 train bombings in Madrid claimed by Al-Qaeda. Yet Spanish society’s response at that time, as well as in 2017 following the terrorist attacks in Barcelona, did not embrace a traditional securitised ‘War on Terror’ approach, but rather invested significant resources in engaging civil society in its P/CVE programmes. This chapter investigates why this is so and how we can understand the relatively low polarisation levels in Spain between the institutions, majority society, and Muslim mi
APA, Harvard, Vancouver, ISO, and other styles
4

Fradenburg, L. O. Aranye, and Eileen A. Joy. "Unlearning." In The Pedagogics of Unlearning. punctum books, 2016. https://doi.org/10.21983/p3.0140.1.08.

Full text
Abstract:
Probably most of us would agree that, however expert we might become in this or that specialty, we are not richly educated until we have experience of a wide range of disciplines and method-ologies — a range that includes critique and creativity, analysis and immersion, learning and unlearning. To our sorrow, this conception of education is rapidly losing favor with the citizen-ry. There are, of course, pushbacks. San Francisco took to the courts to defend the nature of its City College’s (CCSF) course offerings from the so-called “student success” movement, which preaches efficiency and “prog
APA, Harvard, Vancouver, ISO, and other styles
5

Monthei, Dean L. "Die Attach Issues." In Electronic Packaging and Interconnects Series. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5111-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reinhardt, Ilka, Felix Knauer, Micha Herdtfelder, Gesa Kluth, and Petra Kaczensky. "Wie lassen sich Nutztierübergriffe durch Wölfe nachhaltig minimieren? – Eine Literaturübersicht mit Empfehlungen für Deutschland." In Evidenzbasiertes Wildtiermanagement. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-65745-4_9.

Full text
Abstract:
ZusammenfassungMit dem anwachsenden Wolfsbestand nehmen auch die Übergriffe auf Nutztiere in Deutschland von Jahr zu Jahr zu. In einem Punkt sind sich Landwirtschaft, Naturschutz und Politik einig: Wolfsübergriffe auf Nutztiere sollen nachhaltig minimiert werden. Darüber, wie dieses Ziel am besten erreicht werden kann, gibt es jedoch unterschiedliche Ansichten. In der öffentlichen Debatte werden Forderungen nach einem vereinfachten Abschuss von Wölfen oder einer generellen Bejagung immer lauter. Dabei wird davon ausgegangen, dass durch solche Maßnahmen Nutztierschäden durch Wölfe nachhaltig mi
APA, Harvard, Vancouver, ISO, and other styles
7

Schifman, Richard S., Stefan van As, Joseph Ganci, Phillip Kerman, Jeff McGuire, and Wade Wells. "Entwickeln für das Web." In Authorware Attain Praxis. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-59579-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hendessi, Faramarz, and Mohammad R. Aref. "A successful attack against the DES." In Information Theory and Applications. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-57936-2_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wintrobe, Ronald. "Why Did Japan Attack Pearl Harbor?" In Power and Responsibility. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23015-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roth, Bradley J. "Did Cuba Attack America with Microwaves?" In Are Electromagnetic Fields Making Me Ill? Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98774-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "DIS attack"

1

Zamanzadeh, M., and Huiping Xu. "Fusion Bonded Epoxy Coatings (FBE) and Disbondment." In CORROSION 2016. NACE International, 2016. https://doi.org/10.5006/c2016-07246.

Full text
Abstract:
Abstract Fusion Bonded Epoxy (FBE) coating has been used for corrosion protection of underground pipe lines since the 1960’s. FBE provides protection of pipeline under cathodic protection even though there may be dis-bondment or blistering. FBE does not shield cathodic protection current under normal conditions, a characteristic which likewise distinguishes FBE coating from all other coating. In this paper failure analysis methodology will be applied to the principal mechanisms by which FBE coatings fail during long term service; with specific application to case studies involving blistering.
APA, Harvard, Vancouver, ISO, and other styles
2

Amri, Jamel, Egil Gulbrandsen, and Ricardo P. Nogueira. "Effect of Acetic Acid on Propagation and Stifling of Localized Attacks in CO2 Corrosion of Carbon Steel." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09284.

Full text
Abstract:
Abstract The presence of acetic acid (HAc) has been identified as one factor that may contribute to enhance localized top-of-line corrosion attacks in gas condensate pipelines. The role of HAc on the growth of localized attacks in CO2 corrosion of carbon steel pipelines was studied by means of a pre-initiated localized attack electrode assembly (“artificial pit electrode”). The current flowing between the localized attack and the outer surface was measured with a zero resistance ammeter. It is shown that the corrosion potential increases with increasing HAc concentration. Depletion of HAc insi
APA, Harvard, Vancouver, ISO, and other styles
3

Scott, P. J. B., A. Al-Hashem, and J. Carew. "Experiments on MIC of Steel and FRP Downhole Tubulars in West Kuwait Brines." In CORROSION 2007. NACE International, 2007. https://doi.org/10.5006/c2007-07113.

Full text
Abstract:
Abstract The candidate waters available for secondary recovery of oil in West Kuwait oil fields are all high in salt. Total dissolved solids (TDS) of an aquifer water is 239,000 ppm (chloride, 146,000 ppm). Effluent water varies, but TDS can reach 241,000 ppm (chloride, 151,000 ppm). Candidate materials for tubulars for secondary injection were tested for MIC attack at high salt concentrations. N-80 and L-80 steels, and three FRPs - phenolic, vinyl ester and epoxy resin were tested in the two water types. A mixed bacterial consortium (including SRB) from a natural Mediterranean marine environm
APA, Harvard, Vancouver, ISO, and other styles
4

Harper, S. L., P. L. Daniel, D. L. Van Petten, and P. M. Winegar. "Corrosion Evaluation of Alternate Nuclear Steam Generator Tubing Materials." In CORROSION 1986. NACE International, 1986. https://doi.org/10.5006/c1986-86256.

Full text
Abstract:
Abstract Several materials were evaluated for use in nuclear steam generators (NSG). These materials were exposed to corrosive conditions representative of those found in nuclear steam generators. The materials evaluated were gold, titanium, tantalum, niobium, Hastelloy C-276, Hastelloy G, Nickel 200, nickel- base Alloy 625, and heat-treated nickel- base Alloy 600. The test environments simulated acid pitting attack, caustic stress corrosion cracking and reduced sulfur attack. In the pitting environment, the monolithic materials did well, however Nickel 200, nickel-base Alloy 600 and Hastelloy
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Dake, Shiduo Li, Yuke Zhang, Chenghao Li, Souvik Kundu, and Peter A. Beerel. "DIA: Diffusion based Inverse Network Attack on Collaborative Inference." In 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2024. http://dx.doi.org/10.1109/cvprw63382.2024.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Casado-Galán, A., F. E. Potestad-Ordóñez, A. J. Acosta, and E. Tena-Sánchez. "Electromagnetic Fault Injection Attack Methodology against AES Hardware Implementation." In 2024 39th Conference on Design of Circuits and Integrated Systems (DCIS). IEEE, 2024. https://doi.org/10.1109/dcis62603.2024.10769137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.

Full text
Abstract:
Abstract A system-in-package (SiP) design takes advantage of cutting-edge packaging technology and heterogeneous integration (HI) in response to the growing need for aggressive time-to-market, high-performance, less expensive, and smaller systems. However, aggregating dies with different functionalities introduces new attack vectors with fault-injection attacks (FIA) that can effectively alter a circuit's data and control flow maliciously to cause disruptions of secure communication or sensitive information leakage. Additionally, traditional threat models associated with FIA on a 2D monolithic
APA, Harvard, Vancouver, ISO, and other styles
8

Ando, A., Y. Hattori, N. Hatanaka, and T. Kittaka. "Development of Aluminum Coated Stainless Steel Sheet - Material for Automotive Exhaust Systems." In CORROSION 1991. NACE International, 1991. https://doi.org/10.5006/c1991-91384.

Full text
Abstract:
Abstract A hot-dip aluminum coated stainless steel sheet (Al coated stainless steel sheet) have been newly developed as a material for automotive exhaust systems. The Al coated stainless steel exhibited excellent corrosion resistance in accelerated laboratory tests closely simulating actual service conditions. Under very severe test conditions, type 430 stainless steel sheet and Al coated low carbon steel sheet were remarkably attacked. On the contrary, Al coated type 409 stainless steel sheet had no red-rust even on the base steel such as cut edges and cross-scribes, and also had no attack of
APA, Harvard, Vancouver, ISO, and other styles
9

Shaw, Mark, Daniele Simoncini, Roseanne Duca, et al. "Die Attach Material Choice for MEMS Cavity Packages." In 2024 IEEE 26th Electronics Packaging Technology Conference (EPTC). IEEE, 2024. https://doi.org/10.1109/eptc62800.2024.10909794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Berger, Saria, Frederic A. Banville, Catherine Marsan-Loyer, David Danovitch, David Gendron, and Serge Ecoffey. "Bio-Sourced Unfilled Epoxy for Die-Attach Applications." In 2025 IEEE 75th Electronic Components and Technology Conference (ECTC). IEEE, 2025. https://doi.org/10.1109/ectc51687.2025.00081.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "DIS attack"

1

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under
APA, Harvard, Vancouver, ISO, and other styles
2

Kirichek, Galina, Vladyslav Harkusha, Artur Timenko, and Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3743.

Full text
Abstract:
In this article realization method of attacks and anomalies detection with the use of training of ordinary and attacking packages, respectively. The method that was used to teach an attack on is a combination of an uncontrollable and controlled neural network. In an uncontrolled network, attacks are classified in smaller categories, taking into account their features and using the self- organized map. To manage clusters, a neural network based on back-propagation method used. We use PyBrain as the main framework for designing, developing and learning perceptron data. This framework has a suffi
APA, Harvard, Vancouver, ISO, and other styles
3

Ovrebo, Gregory K. Thermal Simulation of Four Die-Attach Materials. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada477276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guo, Ge, Jiageng Liu, and Guangheng Liu. Multi-sensor Fusion-based Vehicle Localization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024023.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Multi-sensor fusion (MSF) is believed to be a promising tool for vehicular localization in urban environments. Due to the differences in principles and performance of various onboard vehicle sensors, MSF inevitably suffers from heterogeneous sources and vulnerability to cyber-attacks. Therefore, an essential requirement of MSF is the capability of providing a consumer-grade solution that operates in real-time, is accurate, and immune to abnormal conditions with guaranteed performance and quality of service for location-b
APA, Harvard, Vancouver, ISO, and other styles
5

Treadwell, Jonathan R., Amy Y. Tsou, Benjamin Rouse, et al. Behavioral Interventions for Migraine Prevention. Agency for Healthcare Research and Quality (AHRQ), 2024. http://dx.doi.org/10.23970/ahrqepccer270.

Full text
Abstract:
Objectives. Behavioral interventions for migraine prevention can offer an important alternative or complement to medications. An updated systematic review is needed to support evidencebased guidance for clinicians and identify evidence gaps for future research. Data Sources. MEDLINE, Embase, PsycINFO, PubMed, the Cochrane Database of Systematic Reviews, clinicaltrials.gov, and grey literature sources for randomized trials published from January 1, 1975, to August 24, 2023. Review Methods. A multidisciplinary expert panel including adult and pediatric clinical psychologists, adult and pediatric
APA, Harvard, Vancouver, ISO, and other styles
6

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-sou
APA, Harvard, Vancouver, ISO, and other styles
7

Weinschenk, Craig, Keith Stakes та Robin Zevotek. Impact of Fire Attack Utilizing Interior and Exterior Streams on Firefighter Safety and Occupant Survival: Air Entrainment. UL Firefighter Safety Research Institute, 2017. http://dx.doi.org/10.54206/102376/gmax3657.

Full text
Abstract:
As research continues into how fire department interventions affect fire dynamics in the modern fire environment, questions continue to arise on the impact and implications of interior versus exterior fire attack on both firefighter safety and occupant survivability. Previous research into various types of fire ground ventilation, flow paths, and exterior fire streams has provided the fire service with an increased understanding of fire dynamics. However, in some instances, the information from the studies did not support current, experience-based practices. This gap between the research to da
APA, Harvard, Vancouver, ISO, and other styles
8

Devereux, Stephen. Was There a Famine in Gaza in 2024? Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ids.2024.042.

Full text
Abstract:
The blockade that Israel imposed on the Gaza Strip, after the attack by Hamas on 7 October 2023, drastically reduced commercial and humanitarian deliveries of food. Together with heavy bombing that damaged more than half the farmland in Gaza, all sources of access to food were systematically undermined, and the population was exposed to several months of catastrophic food insecurity. Three assessments by the international community concluded that there was ‘a risk of famine’ in December 2023, that a famine was ‘imminent’ in March 2024, but that this threat had receded by June 2024 as restricti
APA, Harvard, Vancouver, ISO, and other styles
9

Doo, Johnny. Beyond Aviation: Embedded Gaming, Artificial Intelligence, Training, and Recruitment for the Advanced Air Mobility Industry. SAE International, 2024. https://doi.org/10.4271/epr2024028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Recent advancements in electric vertical take-off and landing (eVTOL) aircraft and the broader advanced air mobility (AAM) movement have generated significant interest within and beyond the traditional aviation industry. Many new applications have been identified and are under development, with considerable potential for market growth and exciting potential. However, talent resources are the most critical parameters to make or break the AAM vision, and significantly more talent is needed than the traditional aviation ind
APA, Harvard, Vancouver, ISO, and other styles
10

Robles, Miguel, Hugo R. Ñopo, and Jaime Saavedra-Chanduví. Occupational Training to Reduce Gender Segregation: The Impacts of ProJoven. Inter-American Development Bank, 2007. http://dx.doi.org/10.18235/0011273.

Full text
Abstract:
This paper discusses program evaluation for ProJoven, the Peruvian youth labor training program. Complementing detailed fieldwork, the econometric work implements a two-stage matching procedure on propensity scores, gender and labor income. This allows identification of differentiated program impacts on males and females and attacks the problem of Ashenfelter's Dips. The evaluation shows substantial differences in ProJoven's impact for males and females. Eighteen months after participation in the program, employment rates for females improve by about 15 percent (while employment for males redu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!