Journal articles on the topic 'Malicious damage to property'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malicious damage to property.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textWang, Zhenhua, Wei Xie, Baosheng Wang, Jing Tao, and Enze Wang. "A Survey on Recent Advanced Research of CPS Security." Applied Sciences 11, no. 9 (2021): 3751. http://dx.doi.org/10.3390/app11093751.
Full textKRÓL, Marcin, Wojciech KOPERSKI, Jan BŁASZCZYK, Ryszard WOŹNIAK, and Paweł M. BŁASZCZYK. "SAN: an Integrated Unmanned Air Vehicles Interdictor System Concept." Problems of Mechatronics Armament Aviation Safety Engineering 8, no. 4 (2017): 79–94. http://dx.doi.org/10.5604/01.3001.0010.7319.
Full textZhang, Yanan. "Punitive damages in trademark infringement disputes in China: challenges and prospects." Queen Mary Journal of Intellectual Property 11, no. 3 (2021): 362–85. http://dx.doi.org/10.4337/qmjip.2021.03.05.
Full textMitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Full textKhalifa, Nasser AL-Dosari. "CYBERCRIME: THEORETICAL DETERMINANTS, CRIMINAL POLICIES, PREVENTION & CONTROL MECHANISMS." International Journal of Technology and Systems 5, no. 1 (2020): 34–63. http://dx.doi.org/10.47604/ijts.1133.
Full textPedzisai, Nemerai, Edmore Nhamo, and Simbarashe Magonde. "Football Spectator Violence During Matches at the Zimbabwe Football Association Division One Level in Gweru District." International Journal of Sport, Exercise and Health Research 3, no. 1 (2021): 19–23. http://dx.doi.org/10.31254/sportmed.3105.
Full textZhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Full textHaraty, Ramzi Ahmed, Sanaa Kaddoura, and Ahmed Zekri. "Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 74–86. http://dx.doi.org/10.4018/ijswis.2017040105.
Full textВакулина, Галина. "Voluntary property damage insurance." Известия Иркутской государственной экономической академии 26, no. 4 (2016): 635–42. http://dx.doi.org/10.17150/2500-2759.2016.26(4).635-642.
Full textZhao, Jianyu, Anzhi Bai, Xi Xi, Yining Huang, and Shanshan Wang. "Impacts of malicious attacks on robustness of knowledge networks: a multi-agent-based simulation." Journal of Knowledge Management 24, no. 5 (2020): 1079–106. http://dx.doi.org/10.1108/jkm-10-2019-0531.
Full textBazarkina, Darya Yu, and Evgeny N. Pashentsev. "Malicious Use of Artificial Intelligence." Russia in Global Affairs 18, no. 4 (2020): 154–77. http://dx.doi.org/10.31278/1810-6374-2020-18-4-154-177.
Full textKaddoura, Sanaa, Ramzi A. Haraty, Karam Al Kontar, and Omar Alfandi. "A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems." Future Internet 13, no. 4 (2021): 90. http://dx.doi.org/10.3390/fi13040090.
Full textLi, Peng, Xiaotian Yu, He Xu, Jiewei Qian, Lu Dong, and Huqing Nie. "Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6102780.
Full textMalik, Sania Zahra, and Jahanzaib Ismat Malhi. "Envy at Workplace: Examining its Sequential Effect on Cyberbullying, Organizational Politics and Job Satisfaction in University Teachers in Pakistan." International Journal of Innovation in Teaching and Learning (IJITL) 6, no. 2 (2021): 128–45. http://dx.doi.org/10.35993/ijitl.v6i2.1123.
Full textWang, Pu, Marta C. González, Ronaldo Menezes, and Albert-László Barabási. "Understanding the spread of malicious mobile-phone programs and their damage potential." International Journal of Information Security 12, no. 5 (2013): 383–92. http://dx.doi.org/10.1007/s10207-013-0203-z.
Full textAlotaibi, Bandar, and Munif Alotaibi. "A Stacked Deep Learning Approach for IoT Cyberattack Detection." Journal of Sensors 2020 (September 18, 2020): 1–10. http://dx.doi.org/10.1155/2020/8828591.
Full textCandal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks." Sensors 20, no. 18 (2020): 5054. http://dx.doi.org/10.3390/s20185054.
Full textLiu, Xi, Jun Liu, and Chun Yan Zhu. "P2P Incentive Mechanism Based on Static Game of Incomplete Information." Applied Mechanics and Materials 138-139 (November 2011): 1234–38. http://dx.doi.org/10.4028/www.scientific.net/amm.138-139.1234.
Full textAlfs, Emily, Doina Caragea, Nathan Albin, and Pietro Poggi-Corradini. "Identifying Android Malware Using Network-Based Approaches." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9911–12. http://dx.doi.org/10.1609/aaai.v33i01.33019911.
Full textPratomo, Baskoro A., Pete Burnap, and George Theodorakopoulos. "BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks." Security and Communication Networks 2020 (August 4, 2020): 1–15. http://dx.doi.org/10.1155/2020/8826038.
Full textV.Manjula, Dr, Mrs Shanmuga Priya, V. Divyaprabha, and S. Jayasurya. "Detecting Malicious Users and Remove Rumors from Social Network." International Journal of Engineering & Technology 7, no. 3.34 (2018): 283. http://dx.doi.org/10.14419/ijet.v7i3.34.19208.
Full textLi, Song, Jian Liu, Guannan Yang, and Jinguang Han. "A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors." Wireless Communications and Mobile Computing 2020 (October 2, 2020): 1–13. http://dx.doi.org/10.1155/2020/8841711.
Full textJohnson, Bankole A., and Lynda T. Wells. "2. Viruses – prevention, detection, and removal." Psychiatric Bulletin 16, no. 12 (1992): 771–73. http://dx.doi.org/10.1192/pb.16.12.771.
Full textMorrison, Linda Bondi. "2002 BODILY INJURY AND PROPERTY DAMAGE UPDATE." Environmental Claims Journal 15, no. 2 (2003): 143–69. http://dx.doi.org/10.1080/713609444.
Full textBromley, Daniel W. "Property rights and natural resource damage assessments." Ecological Economics 14, no. 2 (1995): 129–35. http://dx.doi.org/10.1016/0921-8009(95)00027-7.
Full textRodriguez, Miranda. "All Your IP Are Belong to Us." Texas A&M Law Review 3, no. 3 (2016): 663–89. http://dx.doi.org/10.37419/lr.v3.i3.7.
Full textHaraty, Ramzi A., Mirna Zbib, and Mehedi Masud. "Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems." Peer-to-Peer Networking and Applications 9, no. 5 (2015): 812–23. http://dx.doi.org/10.1007/s12083-015-0361-z.
Full textKhan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "Multifractal Singularity Spectrum for Cognitive Cyber Defence in Internet Time Series." International Journal of Software Science and Computational Intelligence 7, no. 3 (2015): 17–45. http://dx.doi.org/10.4018/ijssci.2015070102.
Full textTettenborn, Andrew. "Property Damage and Economic Loss: Should Claims by Property Owners Themselves Be Limited?" Common Law World Review 34, no. 2 (2005): 128–43. http://dx.doi.org/10.1350/clwr.34.2.128.65367.
Full textRhoades, David A., and David J. Dowrick. "Variability of Damage Ratios for Property in Earthquakes." Earthquake Spectra 15, no. 2 (1999): 297–316. http://dx.doi.org/10.1193/1.1586042.
Full textLai, Chun-Ming, Hung-Jr Shiu, and Jon Chapman. "Quantifiable Interactivity of Malicious URLs and the Social Media Ecosystem." Electronics 9, no. 12 (2020): 2020. http://dx.doi.org/10.3390/electronics9122020.
Full textGupta, Siddhant, Siddharth Sethi, Srishti Chaudhary, and Anshul Arora. "Blockchain Based Detection of Android Malware using Ranked Permissions." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 68–75. http://dx.doi.org/10.35940/ijeat.e2593.0610521.
Full textMcKay, Robert B. "Asbestos Property Damage Settlement in a Bankruptcy Setting." Law and Contemporary Problems 53, no. 4 (1990): 37. http://dx.doi.org/10.2307/1191949.
Full textGillarduzzi, Andrea. "Investigating property damage along Dublin Port Tunnel alignment." Proceedings of the Institution of Civil Engineers - Forensic Engineering 167, no. 3 (2014): 119–30. http://dx.doi.org/10.1680/feng.13.00024.
Full textKhludeneva, Natalya. "Legal Limits of Property Liability for Environmental Damage." Journal of Russian Law 7, no. 3 (2019): 1. http://dx.doi.org/10.12737/art_2019_3_14.
Full textObeng, Kofi, and Mark Burkey. "Explaining Property Damage from Crashes at Signalized Intersections." Transportation Planning and Technology 29, no. 3 (2006): 217–31. http://dx.doi.org/10.1080/03081060600810972.
Full textBrown, Tanya M., William H. Pogorzelski, and Ian M. Giammanco. "Evaluating Hail Damage Using Property Insurance Claims Data." Weather, Climate, and Society 7, no. 3 (2015): 197–210. http://dx.doi.org/10.1175/wcas-d-15-0011.1.
Full textSun, Fanglin, and Richard T. Carson. "Coastal wetlands reduce property damage during tropical cyclones." Proceedings of the National Academy of Sciences 117, no. 11 (2020): 5719–25. http://dx.doi.org/10.1073/pnas.1915169117.
Full textLusvardi, Wayne C., and Charles B. Warren. "Daubert—compliant research design or property damage valuations." Environmental Claims Journal 13, no. 2 (2000): 33–52. http://dx.doi.org/10.1080/10406020109355161.
Full textKaneoka, Kyoko. "Automated Driving System and Property Damage Liability Insurance." Hokengakuzasshi (JOURNAL of INSURANCE SCIENCE) 2020, no. 651 (2020): 651_25–651_50. http://dx.doi.org/10.5609/jsis.2020.651_25.
Full textMishra, Bimal Kumar, and Aditya Kumar Singh. "Two Quarantine Models on the Attack of Malicious Objects in Computer Network." Mathematical Problems in Engineering 2012 (2012): 1–13. http://dx.doi.org/10.1155/2012/407064.
Full textShamseddine, Maha, Wassim Itani, Ali Chehab, and Ayman Kayssi. "Network Programming and Probabilistic Sketching for Securing the Data Plane." Security and Communication Networks 2018 (June 28, 2018): 1–23. http://dx.doi.org/10.1155/2018/2905730.
Full textLI Chao, 李超, and 聂敏 NIE Min. "Damage Model of Quantum Signaling of Multi-user Based on Malicious Attack and Repair Strategy." ACTA PHOTONICA SINICA 41, no. 10 (2012): 1256–60. http://dx.doi.org/10.3788/gzxb20124110.1256.
Full textIaiani, Matteo, Alessandro Tugnoli, Paolo Macini, and Valerio Cozzani. "Outage and asset damage triggered by malicious manipulation of the control system in process plants." Reliability Engineering & System Safety 213 (September 2021): 107685. http://dx.doi.org/10.1016/j.ress.2021.107685.
Full textLong, Susan. "Repairing the damage: wishful, defensive, or restorative?" Twentieth Anniversary Special Issue 21, no. 1 (2021): 28–39. http://dx.doi.org/10.33212/osd.v21n1.2021.28.
Full textDong, Chen, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, and Yuzhong Chen. "Hardware Trojans in Chips: A Survey for Detection and Prevention." Sensors 20, no. 18 (2020): 5165. http://dx.doi.org/10.3390/s20185165.
Full textRaman, M. R. Gauthama, K. Kannan, S. K. Pal, and V. S. Shankar Sriram. "Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems." Defence Science Journal 66, no. 6 (2016): 612. http://dx.doi.org/10.14429/dsj.66.10802.
Full textLink, Michael, Stefan Stöhr, and Matthias Weiland. "Identification of Structural Property Degradations by Computational Model Updating." Key Engineering Materials 347 (September 2007): 19–34. http://dx.doi.org/10.4028/www.scientific.net/kem.347.19.
Full textKATOGI, Hideaki, Kazunori UEMATSU, Yoshinobu SHIMAMURA, Keiichiro TOHGO, Tomoyuki FUJII, and Kenichi TAKEMURA. "Fatigue Property and Fatigue Damage Accumulation of Jute Monofilament." Journal of the Japan Society for Composite Materials 41, no. 1 (2015): 25–32. http://dx.doi.org/10.6089/jscm.41.25.
Full text