Academic literature on the topic 'Mitigating techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mitigating techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mitigating techniques"
Alqurashi, Fahad, Mohammed AL-Hashimi, Mostafa Saleh, and Osama Abulnaja. "Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction." Computers 14, no. 2 (2025): 71. https://doi.org/10.3390/computers14020071.
Full textChaki, Emmanuel Sibusiso, and Mthulisi Velempini. "Implementing a Machine Learning based Hybrid Model to Counter Attacks in Mobile Edge Computing." International Conference on Artificial Intelligence and its Applications 2023 (November 9, 2023): 59–64. http://dx.doi.org/10.59200/icarti.2023.008.
Full textNaresh Babu Kilaru. "Mitigating Market Volatility Using Machine Learning Techniques." Darpan International Research Analysis 12, no. 2 (2024): 223–34. http://dx.doi.org/10.36676/dira.v12.i2.151.
Full textHeverin, Thomas, Michael Cordano, Andy Zeyher, Matthew Lashner, and Sanjana Suresh. "Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 72–80. http://dx.doi.org/10.34190/iccws.17.1.32.
Full textAyodeji, A. I., O. S. I. Fayomi, K. O. Babaremu, P. O. Abioye, O. Agboola, and A. A. Daniyan. "Corrosion mitigating techniques and the mechanisms: Comment." IOP Conference Series: Materials Science and Engineering 1107, no. 1 (2021): 012055. http://dx.doi.org/10.1088/1757-899x/1107/1/012055.
Full textSuleiman, Naziru, and Aidi Ahmi. "Mitigating Corruption Using Forensic Accounting Investigation Techniques." Indian-Pacific Journal of Accounting and Finance 2, no. 1 (2018): 4–25. http://dx.doi.org/10.52962/ipjaf.2018.2.1.38.
Full textGuo, You, Hector Marco-Gisbert, and Paul Keir. "Mitigating Webshell Attacks through Machine Learning Techniques." Future Internet 12, no. 1 (2020): 12. http://dx.doi.org/10.3390/fi12010012.
Full textMd, Badrul Islam Palash, Fahim Islam Md, and Ahamed Foysal. "Mitigating Cybersickness in Virtual Reality: Challenges and Solutions." International Journal of Novel Research in Computer Science and Software Engineering 12, no. 1 (2025): 12–23. https://doi.org/10.5281/zenodo.14608484.
Full textAntony Jose, Subin, Merbin John, Manoranjan Misra, and Pradeep L. Menezes. "Peening Techniques for Mitigating Chlorine-Induced Stress Corrosion Cracking of Dry Storage Canisters for Nuclear Applications." Materials 18, no. 2 (2025): 438. https://doi.org/10.3390/ma18020438.
Full textRader, Marc A., and Syed (Shawon) M. Rahman. "Phishing Techniques and Mitigating the Associated Security Risks." International Journal of Network Security & Its Applications 5, no. 4 (2013): 23–41. http://dx.doi.org/10.5121/ijnsa.2013.5402.
Full textDissertations / Theses on the topic "Mitigating techniques"
Hedman, Anna. "Browsing techniques for mitigating display-size constraints." Licentiate thesis, Luleå : Luleå University of Technology, 2007. http://epubl.ltu.se/1402-1757/2007/70/.
Full textHull, Bret Warren 1980. "Techniques for mitigating congestion in wireless sensor networks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/30170.
Full textLorilla, Lorenzo M. 1981. "Filtering techniques for mitigating microwave oven interference on 802.11b wireless local area networks." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/16980.
Full textMcCormick, Angela D. (Angela Dorothy). "Selected growth management techniques for use in mitigating traffic congestion in Masssachusetts [sic] suburban corridors." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/75990.
Full textRewaskar, Sushant Kaur Jasleen. "Real world evaluation of techniques for mitigating the impact of packet losses on TCP performance." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2121.
Full textGuo, Liwen. "Advanced techniques for mitigating the effects of temporal distortions in human in the loop control systems." Diss., Online access via UMI:, 2005.
Find full textNisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.
Full textAku, Anizizo. "Role of Middle Managers in Mitigating Employee Cyberloafing in the Workplace." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3967.
Full textPowell, Keith. "Next generation wavefront controller for the MMT adaptive optics system: Algorithms and techniques for mitigating dynamic wavefront aberrations." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/222838.
Full textWang, Rujiang. "Mitigating error propagation of decision feedback equalization in boradband communications." Doctoral thesis, Université Laval, 2008. http://www.theses.ulaval.ca/.
Full textBooks on the topic "Mitigating techniques"
Dong, Shuning, Wanfang Zhou, Qisheng Liu, Hao Wang, and Yadong Ji. Methods and Techniques for Preventing and Mitigating Water Hazards in Mines. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67059-7.
Full textSingh, Bhim, Ambrish Chandra, and Kamal Al-Haddad, eds. Power Quality Problems and Mitigation Techniques. John Wiley & Sons Ltd, 2015. http://dx.doi.org/10.1002/9781118922064.
Full textLindeman, W. Effectiveness of mitigation techniques at the Alafia River crossing. s.n, 1988.
Find full textSalkuti, Surender Reddy, Papia Ray, and Arvind R. Singh, eds. Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2.
Full textAndrea, Giorgetti, ed. Cognitive radio techniques: Spectrum sensing, interference mitigation, and localization. Artech House, 2012.
Find full textRainsford, Richard Adams. The adjuster's guide to property loss mitigation procedures and techniques. The Bureau, 1985.
Find full textCrawford, Jason A. Handbook of selected congestion mitigation techniques in the United States. Texas Transportation Institute, Texas A&M University System, 1998.
Find full textSteel Construction Institute (Great Britain). Fire and Blast Information Group. Explosion mitigation systems. Steel Construction Institute, 1994.
Find full textRyan, Brooke J., and Darnall E. Anderson. Carbon sequestration: Technology, measurement techniques, and environmental effects. Nova Science Publishers, 2011.
Find full textJ, Gadsby Kenneth, Reddy T. A, and Air and Energy Engineering Research Laboratory., eds. Natural basement ventilation as a radon mitigation technique: Project summary. U.S. Environmental Protection Agency, Air and Energy Engineering Research Laboratory, 1992.
Find full textBook chapters on the topic "Mitigating techniques"
Kato, Takahiko, and Yukiko Mizuguchi. "Characterization Techniques for Film Characteristics." In Mitigating Tin Whisker Risks. John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781119011965.ch5.
Full textSobti, RC, Apurav Sharma, and Sanjeev Kumar Soni. "Applications of Biotechnological Techniques in Mitigating Environmental Concerns." In Genomic, Proteomics, and Biotechnology. CRC Press, 2022. http://dx.doi.org/10.1201/9781003220831-17.
Full textMishra, Bharati, and Debasish Jena. "Mitigating Cloud Computing Cybersecurity Risks Using Machine Learning Techniques." In Algorithms for Intelligent Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5243-4_48.
Full textOladapo, Kayode Abiodun, Jide Ebenezer Taiwo Akinsola, Moruf Adeagbo, Fathia Onipede, Samuel Ayomikun Akinseinde, and Adebola Abdulwaheed Yusuf. "Intelligent Optimization and Computational Learning Techniques for Mitigating Pandemics." In Emerging Technologies for Combatting Pandemics. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003324447-8.
Full textHaidar, Elissa, Cedric Mhasseb, Jana Khalil, et al. "A Journey through Peanut Processing Techniques for Mitigating Allergenicity." In Food Allergies. CRC Press, 2024. http://dx.doi.org/10.1201/9781003433781-6.
Full textHalabi, Marwan. "Limits of Waste Materials on Concrete Mixture Base Using Digital Design and Fabrication Techniques." In Renewable Energy for Mitigating Climate Change. CRC Press, 2021. http://dx.doi.org/10.1201/9781003240129-6.
Full textAguiar, Ygor Quadros de, Frédéric Wrobel, Jean-Luc Autran, and Rubén García Alía. "Analysis of Layout-Based RHBD Techniques." In Single-Event Effects, from Space to Accelerator Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-71723-9_5.
Full textChaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Risks of Data Breaches and Mitigating Controls in Financial Sector." In Intelligent Computing Techniques for Smart Energy Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0252-9_64.
Full textKomatsu, Takanori, and Akira Namatame. "Distributed Consensus and Mitigating Risk Propagation in Evolutionary Optimized Networks." In Advanced Methods, Techniques, and Applications in Modeling and Simulation. Springer Japan, 2012. http://dx.doi.org/10.1007/978-4-431-54216-2_22.
Full textHaroon-Sulyman, Shakirat Oluwatosin, Siti Sakira Kamaruddin, Farzana Kabir Ahmad, Shuzlina Abdul-Rahman, and Nor Idalaila Aziz. "Techniques for Mitigating the Vanishing Gradient Problem in Deep Neural Networks." In Information Systems Engineering and Management. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-91485-0_33.
Full textConference papers on the topic "Mitigating techniques"
Bin Rahman, Asadullah, Masud Ibn Afjal, and Md Abdulla Al Mamun. "Mitigating Noise from Biomedical Images Using Wavelet Transform Techniques." In 2025 International Conference on Electrical, Computer and Communication Engineering (ECCE). IEEE, 2025. https://doi.org/10.1109/ecce64574.2025.11013062.
Full textS, Thamizhiniyan C., Chiranjeevi Sai Kapuluru, and Balakiruthiga B. "Mitigating NoSQL Injection Vulnerabilities: Techniques, Examples, and Best Practices." In 2025 International Conference on Emerging Systems and Intelligent Computing (ESIC). IEEE, 2025. https://doi.org/10.1109/esic64052.2025.10962645.
Full textGiri, Rakesh Kumar, Arpit Arora, Renuka Pappu, U. M. Netravati, Kuldeep Sharma, and Devansh Desai. "Mitigating Interferences with Error Resilience Techniques for Optimal Electromagnetic Compatibility." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726254.
Full textLever, Emma, Justin Roessler, Charles Baylis, et al. "Mitigating Notch Filtering: Compensation Techniques for Notching a Received Waveform." In 2025 IEEE International Radar Conference (RADAR). IEEE, 2025. https://doi.org/10.1109/radar52380.2025.11032030.
Full textLakshmikanthan, Govindarajan, Sreejith Sreekandan Nair, J. Partha Sarathy, Sachin Singh, S. Santiago, and B. Jegajothi. "Mitigating IoT Botnet Attacks: Machine Learning Techniques for Securing Connected Devices." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895253.
Full textGujar, Shantanu Sudhir, and Prithvi Aiyattira Kishor Kumar. "Mitigating Rogue Switch Attacks in Software-Defined Networking: Techniques and Countermeasures." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862080.
Full textSidana, Sagar, Sujata Negi Thakur, Sandeep Kumar, et al. "Mitigating Racial Bias in Facial Expression Recognition Using Enhanced Data Diversification Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723863.
Full textDas Adhikary, Dibya Ranjan, Paramjit Baxi, Lakshmi Sevukamoorthy, E. Annadevi, Dhananjay Kumar Yadav, and Prateek Garg. "Mitigating DDoS Attacks in Software-Defined Networks (SDN) Using Machine Learning Techniques." In 2025 International Conference on Automation and Computation (AUTOCOM). IEEE, 2025. https://doi.org/10.1109/autocom64127.2025.10957665.
Full textAsim, Nadia, Jude Osamor, Funminiyi Olajide, Celestine Iwendi, and Njideka Okeke. "Detecting and Mitigating Anti-Forensic Techniques: A Comprehensive Framework for Digital Investigators." In 2025 AI-Driven Smart Healthcare for Society 5.0. IEEE, 2025. https://doi.org/10.1109/ieeeconf64992.2025.10963229.
Full textHannan, Nasif, Md Ismail Hossain, Abu Shufian, Sadman Shahriar Alam, S. M. Tanvir Hassan Shovon, and Protik Parvez Sheikh. "Advanced Control Strategy for Mitigating Imbalances in Centralized Microgrids Using Grid-Forming Converters." In 2025 4th International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). IEEE, 2025. https://doi.org/10.1109/icrest63960.2025.10914396.
Full textReports on the topic "Mitigating techniques"
Rahman, Mohammad, Ahmed Ibrahim, and Riyadh Hindi. Bridge Decks: Mitigation of Cracking and Increased Durability—Phase III. Illinois Center for Transportation, 2020. http://dx.doi.org/10.36501/0197-9191/20-022.
Full textBrousseau, R., and Mr Bob Gummow. CR-6352 Research into Methods of Mitigating External Corrosion Underneath Unbonded Dielectric Coating. Pipeline Research Council International, Inc. (PRCI), 1992. http://dx.doi.org/10.55274/r0011776.
Full textAuthor, Unknown. L51752 Water Crossing Design and Installation Manual. Pipeline Research Council International, Inc. (PRCI), 1996. http://dx.doi.org/10.55274/r0010323.
Full textSancio, Rodolfo. PR-616-164506-R01 Management of Geohazards Affecting Engineering and Construction of Pipelines. Pipeline Research Council International, Inc. (PRCI), 2018. http://dx.doi.org/10.55274/r0011484.
Full textDietiker, B., A. J.-M. Pugin, H. Crow, K. Brewer, and H. A. J. Russell. Geophysical data interpretation for the York University ATES site investigation, Ontario. Natural Resources Canada/CMSS/Information Management, 2024. http://dx.doi.org/10.4095/332366.
Full textMcKinley, Richard L. Bone Conducted Noise and Mitigation Techniques. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada501586.
Full textSmith, Kyle K., and Jason R. Foley. A Review of Shock Mitigation Techniques (Briefing Charts). Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada627176.
Full textDeal, Brian M., Donald F. Fournier, Diane M. Timlin, and Elisabeth M. Jenicek. An Assessment of Encroachment Mitigation Techniques for Army Lands. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada409139.
Full textSaulnier, Gary J., and Catalina A. Silva. Comparison of Time and Transform Domain Interference Mitigation Techniques. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada351524.
Full textGiovando, Jeremy, Chandler Engel, Daniel Vandevort, and Christina Chow. Summary of ice jams and mitigation techniques in Alaska. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47069.
Full text