Academic literature on the topic 'Method of "intelligent attack"'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Method of "intelligent attack".'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Method of "intelligent attack""
Qiu, Ling, and Cai Ming Liu. "An Intelligent Detection Method for Network Security." Applied Mechanics and Materials 530-531 (February 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.
Full textSun, Lei, Xiaoqin Wang, Youhuan Yang, and Xiuqing Mao. "D-UAP: Initially Diversified Universal Adversarial Patch Generation Method." Electronics 12, no. 14 (2023): 3080. http://dx.doi.org/10.3390/electronics12143080.
Full textZhang, Mingjiang, Junfei Bi, Tao Xie, Na Zhang, and Weihu Zhao. "Adversarial Patch Attack Method for Vehicle Target Detection." Journal of Physics: Conference Series 2717, no. 1 (2024): 012026. http://dx.doi.org/10.1088/1742-6596/2717/1/012026.
Full textWang, Yafei, Shengqiang Han, Nan Zhang, and Peng Hu. "Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle." E3S Web of Conferences 268 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202126801010.
Full textKarthiga, B., Danalakshmi Durairaj, Nishad Nawaz, Thiruppathy Kesavan Venkatasamy, Gopi Ramasamy, and A. Hariharasudan. "Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches." Wireless Communications and Mobile Computing 2022 (October 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/5069104.
Full textWang, Tianxiao, Yingtao Niu, and Zhanyang Zhou. "Adversarial attacks against intelligent anti-jamming communication: An adaptive gray-box attack method." Physical Communication 72 (October 2025): 102716. https://doi.org/10.1016/j.phycom.2025.102716.
Full textLi, Kailong, Ke Pan, Weijie Xiu, Min Li, Zhonghe He, and Li Wang. "Research on Attack Detection for Traffic Signal Systems Based on Game Theory and Generative Adversarial Networks." Applied Sciences 14, no. 21 (2024): 9709. http://dx.doi.org/10.3390/app14219709.
Full textXiang, Yingxiao, Wenjia Niu, Endong Tong, et al. "Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods." Security and Communication Networks 2021 (October 31, 2021): 1–17. http://dx.doi.org/10.1155/2021/1632825.
Full textYao, Qian, Yongjie Wang, Xinli Xiong, Peng Wang, and Yang Li. "Adversarial Decision-Making for Moving Target Defense: A Multi-Agent Markov Game and Reinforcement Learning Approach." Entropy 25, no. 4 (2023): 605. http://dx.doi.org/10.3390/e25040605.
Full textDr.R.Venkatesh, Kavitha S, Dr Uma Maheswari N,. "Network Anomaly Detection for NSL-KDD Dataset Using Deep Learning." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (2021): 821–27. http://dx.doi.org/10.17762/itii.v9i2.419.
Full textDissertations / Theses on the topic "Method of "intelligent attack""
Ratnayake, Deepthi N. "Probe request attack detection in wireless LANs using intelligent techniques." Thesis, London Metropolitan University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590106.
Full textLiu, Rongrong. "A Novel Attack Method Against Split Manufactured Circuits." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1573812230926837.
Full textO, Kit Hong. "Intelligent Web pre-fetching method." Thesis, University of Macau, 1999. http://umaclib3.umac.mo/record=b1636985.
Full textPrathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.
Full textShaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.
Full textJosyula, Sai Prashanth. "On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10820.
Full textHarayama, Tomohiro. "A method of Weil sum in multivariate quadratic cryptosystem." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5938.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textMondoloni, Stéphane Lucien. "A numerical method for modelling wings with sharp edges maneuvering at high angles of attack." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/49922.
Full textLiu, Chongyang, and 刘重阳. "A distinct region based method for visual object tracking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587111.
Full textBooks on the topic "Method of "intelligent attack""
Wilson, Robert Mills. Programmed word attack for teachers. 5th ed. Macmillan, 1990.
Find full textL, Rogers James. DeMAID: A design manager's aide for intelligent decomposition user's guide. National Aeronautics and Space Administration, Langley Research Center, 1989.
Find full textHoneker, Kenneth S. An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN). Naval Postgraduate School, 1997.
Find full textHwang, Danny P. A numerical analysis applied to high angle of attack three-dimensional inlets. National Aeronautics and Space Administration, Lewis Research Center, 1986.
Find full textB, Davidson John, Murphy Patrick C, and Langley Research Center, eds. A method for integrating thrust-vectoring and actuated forebody strakes with conventional aerodynamic controls on a high-performance fighter airplane. National Aeronautics and Space Administration, Langley Research Center, 1998.
Find full textB, Davidson John, Murphy Patrick C, and Langley Research Center, eds. A method for integrating thrust-vectoring and actuated forebody strakes with conventional aerodynamic controls on a high-performance fighter airplane. National Aeronautics and Space Administration, Langley Research Center, 1998.
Find full textKang, Shu Gang. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control: Method, Software and Industrial Application. Springer London, 2013.
Find full textH, Sharaf El-Din Hazem, Liu C. H. 1941-, and United States. National Aeronautics and Space Administration., eds. Three dimensional solution of pneumatic active control of forebody vortex asymmetry. American Institute of Aeronautics and Astronautics, 1995.
Find full textCenter, Langley Research, and United States. National Aeronautics and Space Administration., eds. Euler technology assessment: SPLITFLOW code applications for stability and control analysis on an advanced fighter model employing innovative control concepts. National Aeronautics and Space Administration, Langley Research Center, 1998.
Find full textBook chapters on the topic "Method of "intelligent attack""
Sharma, Swedika, and Vishal Bharti. "Misdirection Attack in Wireless Sensor Network Using Threshold Method." In Intelligent Systems Design and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64650-8_1.
Full textRohini, K., K. Kasturi, and R. Vignesh. "Method for Simulating SQL Injection and DOS Attack." In Intelligent Computing and Innovation on Data Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3284-9_91.
Full textDiamah, Aodah, Masoud Mohammadian, and Bala M. Balachandran. "Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps." In Intelligent Decision Technologies. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29920-9_44.
Full textWang, Kai, Liyun Chen, and Xingkai Chen. "Website Fingerprinting Attack Method Based on DNS Resolution Sequence." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98776-7_151.
Full textCheng, Jieren, Jianping Yin, Chengkun Wu, Boyun Zhang, and Yun Liu. "DDoS Attack Detection Method Based on Linear Prediction Model." In Emerging Intelligent Computing Technology and Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04070-2_106.
Full textLe, Chengli, and Xiufeng Gao. "Attack Net Modeling Method for Mobile Ad Hoc Network." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_41.
Full textBingbing, Xu, Meng Guanglei, Wang Yingnan, and Zhao Runnan. "Guidance Method for UAV to Occupy Attack Position at Close Range." In Intelligent Robotics and Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13835-5_64.
Full textAhmad, Syed Jalal, V. S. K. Reddy, A. Damodaram, and P. Radha Krishna. "Detection of Black Hole Attack Using Code Division Security Method." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_34.
Full textMarathe, Nilesh R., and Subhash K. Shinde. "Improved ITCA Method to Mitigate Network-Layer Attack in MANET." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0132-6_16.
Full textTalmale, Girish, and Urmila Shrawankar. "Multiple Clustering Method for Real-Time Distributed Denial-of-Service Attack Detection." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6307-6_58.
Full textConference papers on the topic "Method of "intelligent attack""
Li, Lu, Fengming Zhu, and Zichen Yang. "A transfer-based adversarial attack method." In 2024 6th International Conference on Robotics, Intelligent Control and Artificial Intelligence (RICAI). IEEE, 2024. https://doi.org/10.1109/ricai64321.2024.10911455.
Full textLiu, Yanhua, Yijie Xu, Yuting Han, and Zhihuang Liu. "An Intelligent Analysis Method for Multi-Stage Web Attack Forensics." In 2024 20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2024. http://dx.doi.org/10.1109/icnc-fskd64080.2024.10702307.
Full textElsersy, Wael Farouk, Moataz Samy, and Ahmed ElShamy. "XSS Attack Detection Using Machine Learning." In 2024 Intelligent Methods, Systems, and Applications (IMSA). IEEE, 2024. http://dx.doi.org/10.1109/imsa61967.2024.10652622.
Full textLiao, Fenggui, Yongli Wang, and Dongmei Liu. "Poisoning Attack Detection Method Based on Adaptive Statistical Features." In 2024 4th International Conference on Digital Society and Intelligent Systems (DSInS). IEEE, 2024. https://doi.org/10.1109/dsins64146.2024.10992065.
Full textMohamed, Saifeldin Nasser, Ahmed Amr Ahmed, and Wael Elsersy. "FGSM Adversarial Attack Detection On Deepfake Videos." In 2024 Intelligent Methods, Systems, and Applications (IMSA). IEEE, 2024. http://dx.doi.org/10.1109/imsa61967.2024.10652708.
Full textYan, Hongbo, Xing Yang, Haoqi Gao, Haiyuan Yu, Zhiyang Hu, and Hanpei Xiao. "A survey of physical-domain adversarial attack methods against object detection models." In Seventh Global Intelligent Industry Conference (GIIC 2024), edited by Xingjun Wang. SPIE, 2024. http://dx.doi.org/10.1117/12.3032331.
Full textZhao, Liang, Haining Cai, Guoqing Fan, and Yulong Hu. "A Query-less Adversarial Attack Method Against Time Series Forecasting." In 2024 5th International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE). IEEE, 2024. http://dx.doi.org/10.1109/icbase63199.2024.10762166.
Full textUs Sholikha, Nia Nisa, Bety Hayat Susanti, and Sepha Siswantyo. "Fixed-Point and Multi-Collision Attack on 5-Round SLIM: Sparse Linear Method Algorithm with Davies Meyer-Scheme." In 2024 7th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2024. https://doi.org/10.1109/isriti64779.2024.10963405.
Full textFeng, Weidong, Chunjie Zhang, and Xiaolong Zheng. "Adversarial attack method with adaptive step size for ID card text recognition." In 2024 IEEE 4th International Conference on Digital Twins and Parallel Intelligence (DTPI). IEEE, 2024. https://doi.org/10.1109/dtpi61353.2024.10778639.
Full textSharma, Vikrant, N. T. Velusudha, Roopa Traisa, Vishwesh Deshmukh, N. V. Balaji, and Siddharth Sriram. "Denial-of-Service Attack Detection in Wireless Sensor Networks: A Simple Artificial Intelligence Method." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862270.
Full textReports on the topic "Method of "intelligent attack""
McInville, Roy M., and Frank G. Moore. A New Method for Calculating Wing Along Aerodynamics to Angle of Attack 180 deg. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada277965.
Full textTayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.
Full textIffat, Idris. Effectiveness of Different Methods to the Counter Financing of Terrorism. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.091.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textAcosta, Jaime C. From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks and Efficient Attack Survivability Analysis. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada564943.
Full textBlinov, D. O., A. I. Fomin, A. A. Chibin, I. A. Fedorov, I. A. Denisova, and A. S. Maslova. Software prototype of an intelligent method for automatic distribution of air objects between controlled facilities in a complex organizational and technical system. OFERNiO, 2021. http://dx.doi.org/10.12731/ofernio.2021.24805.
Full textKirichek, Galina, Vladyslav Harkusha, Artur Timenko, and Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3743.
Full textRosenblat, Sruly, Tim O'Reilly, and Ilan Strauss. Beyond Public Access in LLM Pre-Training Data: Non-public book content in OpenAI’s Models. AI Disclosures Project, Social Science Research Council, 2025. https://doi.org/10.35650/aidp.4111.d.2025.
Full textTsidylo, Ivan M., Serhiy O. Semerikov, Tetiana I. Gargula, Hanna V. Solonetska, Yaroslav P. Zamora, and Andrey V. Pikilnyak. Simulation of intellectual system for evaluation of multilevel test tasks on the basis of fuzzy logic. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4370.
Full textZhao, George, Grang Mei, Bulent Ayhan, Chiman Kwan, and Venu Varma. DTRS57-04-C-10053 Wave Electromagnetic Acoustic Transducer for ILI of Pipelines. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0012049.
Full text