Dissertations / Theses on the topic 'Method of "intelligent attack"'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Method of "intelligent attack".'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ratnayake, Deepthi N. "Probe request attack detection in wireless LANs using intelligent techniques." Thesis, London Metropolitan University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590106.
Full textLiu, Rongrong. "A Novel Attack Method Against Split Manufactured Circuits." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1573812230926837.
Full textO, Kit Hong. "Intelligent Web pre-fetching method." Thesis, University of Macau, 1999. http://umaclib3.umac.mo/record=b1636985.
Full textPrathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.
Full textShaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.
Full textJosyula, Sai Prashanth. "On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10820.
Full textHarayama, Tomohiro. "A method of Weil sum in multivariate quadratic cryptosystem." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5938.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textMondoloni, Stéphane Lucien. "A numerical method for modelling wings with sharp edges maneuvering at high angles of attack." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/49922.
Full textLiu, Chongyang, and 刘重阳. "A distinct region based method for visual object tracking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587111.
Full textTam, Kin Seng. "Intelligent power factor controller with new measuring method and fuzzy logic control." Thesis, University of Macau, 1998. http://umaclib3.umac.mo/record=b1447758.
Full textGuo, Ran. "Intelligent method for collecting vital signals in versatile distributed e-home healthcare." Thesis, University of Macau, 2017. http://umaclib3.umac.mo/record=b3691807.
Full textBUFFAGNI, ALESSIA. "Intelligent clothing for the ageing body : The pursuit of a design method." Doctoral thesis, Università IUAV di Venezia, 2021. http://hdl.handle.net/11578/306340.
Full textLi, Yongchang. "An Intelligent, Knowledge-based Multiple Criteria Decision Making Advisor for Systems Design." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14559.
Full textHoneker, Kenneth S. "An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341330.
Full textBakhsh, Kelarestaghi Kaveh. "A Risk Based Approach to Intelligent Transportation Systems Security." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91421.
Full textPurchase, Helen Christine. "The use of an educational computer system embodying a schematic method of knowledge representation." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241135.
Full textAlani, Shayma. "Design of intelligent ensembled classifiers combination methods." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/12793.
Full textMangan, S. J. "Development of an intelligent road gradient estimation method using vehicle CAN bus data." Thesis, University of Liverpool, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406640.
Full textSARDINHA, JOSE ALBERTO RODRIGUES PEREIRA. "MAS-SCHOOL E ASYNC: A METHOD AND A FRAMEWORK FOR BUILDING INTELLIGENT AGENTS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6681@1.
Full textEl, Hachem Jamal. "A Model Driven Method to Design and Analyze Secure System-of-Systems Architectures : Application to Predict Cascading Attacks in Smart Buildings." Thesis, Pau, 2017. http://www.theses.fr/2017PAUU3026/document.
Full textHuss, Joar. "Optimizing the slag system for phosphorus removal in a DRI-based EAF-process using the dictionary attack method." Thesis, KTH, Materialvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229743.
Full textChong, Samuel Y. C. "DEON : a semiotic method for the design of agent-based e-commerce systems." Thesis, Staffordshire University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390946.
Full textCho, Gunhyung. "Hybrid Nested Partition method with intelligent greedy search for solving Weapon Target Assignment problem." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1468072.
Full textDavis, Stefan J., William R. Wise, A. D. Covington, J. Petter, and P. Reip. "Development of a Novel Method to Reduce the Impact of Cutaneous chemical attacks - 159." Verein für Gerberei-Chemie und -Technik e. V, 2019. https://slub.qucosa.de/id/qucosa%3A34332.
Full textNguyen-Minh, Huong. "Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks." Thesis, Avignon, 2016. http://www.theses.fr/2016AVIG0212/document.
Full textPiepmeier, Jenelle Armstrong. "A dynamic quasi-newton method for model independent visual servoing." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/18391.
Full textTeng, Po-Ching, and 鄧博慶. "Attack analysis of intelligent control system." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/45053143426516874277.
Full textChen, Yu-Hung, and 陳昱宏. "Intelligent Hybrid Learning Architecture for Cyber-Phishing Attack." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/6w29rj.
Full textLin, Chung-Yin, and 林崇頤. "Intelligent Attack Graph Generator Adapting to Large Vulnerability Information." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/4n7f8w.
Full textShih, Hsiao-Yu, and 施筱瑜. "A Generic Web Application Attack Generation Method." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/kcr3f7.
Full textSu, Cheng-Yu, and 蘇正育. "DDoS Attack Detection Method Research on the Splunk." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/57930675069976481509.
Full textHuang, hsingwen, and 黃幸雯. "A Study of Method to avoid DoS Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/77081947637667880077.
Full textYen, Chia-Yung, and 嚴家勇. "A Study of Method to avoid DoS Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/58095931822897192880.
Full textWang, Yi-Ta, and 王藝達. "The Research on the Development of an Intelligent Vulnerability Attack Prevention Mechanism." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/01663651757623926103.
Full textYu, Sheng-Han, and 余昇瀚. "A Fast Attack Paths Reconstruction Method using SD-FEMM." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52601665835129245480.
Full textChen, Kuei-Ming, and 陳癸名. "Timetabling Research Via Artificial Intelligent Method." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/65517017570586464578.
Full textChen, Xin-chang, and 陳信菖. "Study of Intelligent Routing Method for Advanced Vehicles inSafety Intelligent Transportation System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/9jpue9.
Full textHuang, Tun-ling, and 黃敦麟. "Design and Implementation of an Intelligent SIP User Agent to Avoid “Invite/Bye” Attack." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/4bvp2q.
Full textLee, Chien-Shyong, and 李劍雄. "An Intelligent Retrieval Method for Software Components." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/73915615996786349088.
Full textPeng, Sheng-Pao, and 彭勝寶. "Extended Attack Tree Analysis Method to Assess the Website Security Risks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/18698861701866533315.
Full textZong-HanYu and 余宗翰. "False Data Injection Attack Using PCA Approximation Method in Smart Grid." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/27281861886127354515.
Full textChang, Jr-Ming, and 張志銘. "Applying the Intelligent monitoring method for Aircraft Engine." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/10626844808258553329.
Full textSu, Chien-Hsing, and 蘇建興. "Performance Improvement for Nonlinear Systems Using Intelligent Method." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/y5wh3p.
Full textYe, Hao-Jie, and 葉皓傑. "A hierarchical reinforcement learning method to intelligent systems." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/38860968209411504214.
Full textChou, Chih-Feng, and 周志峰. "An Intelligent Method for Solving Data Clustering Problems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/09971856286517914293.
Full textTseng, Yung-Chu, and 曾詠筑. "An Intelligent Context-Aware Chinese Phonetic Input Method." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/49193466189580170762.
Full textNaik, Sobhini. "Comparative study of PID controller Tuning method." Thesis, 2017. http://ethesis.nitrkl.ac.in/8844/1/2017_MT_SNaik.pdf.
Full textChung, Ming-Shen, and 鍾明伸. "An Efficient and Secure RFID Security Method against Denial-of-Service Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/79215184017726368388.
Full textPing, Chen-Chieh, and 平震傑. "Adaptive filtering method for DDoS attack based on Reinforcement Learning and Autoencoder." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8wyg38.
Full text