Academic literature on the topic 'Prediction of attacks in wild'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Prediction of attacks in wild.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Prediction of attacks in wild"
Bilen, Abdulkadir, and Ahmet Bedri Özer. "Cyber-attack method and perpetrator prediction using machine learning algorithms." PeerJ Computer Science 7 (April 9, 2021): e475. http://dx.doi.org/10.7717/peerj-cs.475.
Full textSiswanto, Joko, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Number of Cyber Attacks Predicted With Deep Learning Based LSTM Model." JUITA : Jurnal Informatika 12, no. 1 (2024): 39. http://dx.doi.org/10.30595/juita.v12i1.20210.
Full textZuzcák, Matej, and Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks." Computer Science and Information Systems, no. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Full textKadiri, Padmaja, and Seshadri Ravala. "Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks." International Journal of e-Collaboration 17, no. 4 (2021): 75–88. http://dx.doi.org/10.4018/ijec.2021100106.
Full textLi, Zhong, Xianke Wu, and Changjun Jiang. "Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems." Security and Safety 1 (2022): 2022003. http://dx.doi.org/10.1051/sands/2022003.
Full textRuda, Aleš, Jaromír Kolejka, and Thakur Silwal. "GIS-Assisted Prediction and Risk Zonation of Wildlife Attacks in the Chitwan National Park in Nepal." ISPRS International Journal of Geo-Information 7, no. 9 (2018): 369. http://dx.doi.org/10.3390/ijgi7090369.
Full textYuan, Guotao, Hong Huang, and Xin Li. "Self-supervised learning backdoor defense mixed with self-attention mechanism." Journal of Computing and Electronic Information Management 12, no. 2 (2024): 81–88. http://dx.doi.org/10.54097/7hx9afkw.
Full textHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Full textTibble, Holly, Athanasios Tsanas, Elsie Horne, et al. "Predicting asthma attacks in primary care: protocol for developing a machine learning-based prediction model." BMJ Open 9, no. 7 (2019): e028375. http://dx.doi.org/10.1136/bmjopen-2018-028375.
Full textGazzan, Mazen, and Frederick T. Sheldon. "Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems." Future Internet 15, no. 4 (2023): 144. http://dx.doi.org/10.3390/fi15040144.
Full textDissertations / Theses on the topic "Prediction of attacks in wild"
Yermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.
Full textArthur, Jacob D. "Enhanced Prediction of Network Attacks Using Incomplete Data." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1020.
Full textHarshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.
Full textNuñez, del Prado Cortez Miguel. "Inference attacks on geolocated data." Thesis, Toulouse, INSA, 2013. http://www.theses.fr/2013ISAT0028/document.
Full textFedderwitz, Frauke. "Protecting dogs against attacks by wolves (Canis lupus), with comparison to African wild dogs (Lycaon pictus) and dholes (Cuon alpinus)." Thesis, Linköpings universitet, Institutionen för fysik, kemi och biologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-56817.
Full textLuke, Mark Elden. "Predicting Drag Polars For Micro Air Vehicles." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd297.pdf.
Full textBourgeois, Luc. "ACCase inhibitor resistant wild oat in Manitoba : prediction, identification, and characterization." 1997. http://hdl.handle.net/1993/7393.
Full textChao, Jenny C. "Attachment style, anxiety sensitivity and personality in the prediction of panic attacks : response to a symptom-provocation test." 2004. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=94843&T=F.
Full textJiang, Jun. "Detection of network anomalies and novel attacks in the internet via statistical network traffic separation and normality prediction." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-027.
Full textGonçalves, Hélia Marisa do Vale. "Analysis and prediction of the occurrence of leptospirosis in wild boars (Sus scrofa Linnaeus, 1758) of the Trás-os-Montes Region." Master's thesis, 2016. http://hdl.handle.net/10348/5395.
Full textBooks on the topic "Prediction of attacks in wild"
C, Jorgensen Charles, Ross James C, and Ames Research Center, eds. Neural network prediction of new aircraft design coefficients. National Aeronautics and Space Administration, Ames Research Center, 1997.
Find full textCampbell, Doug. The Campbell prediction system: A wild land fire prediction system and language. s.n., 1993.
Find full textCampbell, Doug. The Campbell prediction system: A wild land fire prediction and communication system. D. Campbell, 1991.
Find full textUnited States. National Aeronautics and Space Administration., ed. Prediction of wind tunnel effects on the installed F/A-18A inlet flow field at high angles-of-attack. National Aeronautics and Space Administration, 1995.
Find full textUnited States. National Aeronautics and Space Administration., ed. Aerothermodynamic measurement and prediction for modified orbiter at Mach 6 and 10. American Institute of Aeronautics and Astronautics, 1995.
Find full textCopyright Paperback Collection (Library of Congress), ed. Trailsman 329: Bayou Trackdown. Signet, 2009.
Find full textVaillant, John. The tiger: A true story of vengeance and survival. Vintage Books, 2011.
Find full textVaillant, John. Le tigre: Une histoire de survie dans la taïga : récit. Libretto, 2013.
Find full textVaillant, John. The tiger: A true story of vengeance and survival. Alfred A. Knopf, 2010.
Find full textBook chapters on the topic "Prediction of attacks in wild"
Rebeiro, Chester, Debdeep Mukhopadhyay, and Sarani Bhattacharya. "Branch Prediction Attacks." In Timing Channels in Cryptography. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12370-7_9.
Full textRyckelynck, David, Fabien Casenave, and Nissrine Akkari. "Error Estimation." In Manifold Learning. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-52764-7_3.
Full textVovk, Vladimir. "Competing with Wild Prediction Rules." In Learning Theory. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11776420_41.
Full textCao, Yulong, Chaowei Xiao, Anima Anandkumar, Danfei Xu, and Marco Pavone. "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20065-6_3.
Full textAakaash, N., K. Akshaya Bala, Veerabrahmam Pranathi, and Meenakshi S. Arya. "Prediction of Network Attacks Using Connection Behavior." In Machine Learning for Predictive Analysis. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7106-0_30.
Full textChen, Jinyin, Ximin Zhang, and Haibin Zheng. "Backdoor Attack on Dynamic Link Prediction." In Attacks, Defenses and Testing for Deep Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0425-5_7.
Full textAbusnaina, Ahmed, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, and David Mohaisen. "Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks." In Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_27.
Full textArumugam, Chamundeswari, Varsha Bhargavi Dwarakanathan, S. Gnanamary, et al. "Prediction of SQL Injection Attacks in Web Applications." In Computational Science and Its Applications – ICCSA 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24305-0_37.
Full textLiu, Mingqian, and Hongyi Zhang. "Poisoning Attacks on Deep Learning Based Spectrum Prediction." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-97-7770-9_31.
Full textSubramani, Karthika, Roberto Perdisci, and Maria Konte. "Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_3.
Full textConference papers on the topic "Prediction of attacks in wild"
Yang, Tianming, Runhai Jiao, Junqiang Wei, and Xuejie Wu. "A Markov Matrix Based Method for Prediction Direction in Wind Power Forecasting Attacks." In 2024 6th International Conference on Energy, Power and Grid (ICEPG). IEEE, 2024. https://doi.org/10.1109/icepg63230.2024.10775482.
Full textNguyen, Hoang Dai, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, and Phani Vadrevu. "C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00200.
Full textTan, Yicong, Xinyue Shen, Yun Shen, Michael Backes, and Yang Zhang. "On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00120.
Full textSaiganesh, Marati, Kiran L. N. Eranki, Mahankali Koushik, and Peddi Shashi Preetham. "Prediction of Intrusion Attacks Using Machine Learning Approach." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10717035.
Full textZhang, Zifan, Minghong Fang, Jiayuan Huang, and Yuchen Liu. "Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction." In 2024 IFIP Networking Conference (IFIP Networking). IEEE, 2024. http://dx.doi.org/10.23919/ifipnetworking62109.2024.10619763.
Full textAlemerien, Khalid, Sadeq Al-Suhemat, Fadi Alsuhimat, and Enshirah Altarawneh. "Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks." In 2024 14th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2024. http://dx.doi.org/10.1109/acit62333.2024.10712474.
Full textAl-Turk, Aynoor, Kasim M. Al-Aubidy, and Mustafa A. Al-Khawaldeh. "Prediction of Asthma Attacks Using ANFIS and Mobile Technologies." In 2024 17th International Conference on Development in eSystem Engineering (DeSE). IEEE, 2024. https://doi.org/10.1109/dese63988.2024.10912035.
Full textAl-Turk, Aynoor, Kasim M. Al-Aubidy, and Mustafa A. Al-Khawaldeh. "Prediction of Asthma Attacks Using ANFIS and Mobile Technologies." In 2024 17th International Conference on Development in eSystem Engineering (DeSE). IEEE, 2024. https://doi.org/10.1109/dese63988.2024.10911899.
Full textSubrmanian, Kayalvizhi, Gunasekar Thangarasu, Zhao Yanyan, and K. Nattar Kannan. "Enhancing Detection and Prediction of DDoS Attacks Through Regression Modeling." In 2024 IEEE 6th Symposium on Computers & Informatics (ISCI). IEEE, 2024. http://dx.doi.org/10.1109/isci62787.2024.10668039.
Full textFaradilla, Arnes, and Taufik Djatna. "The Prevention Stroke for High-Risk Patients Using Prediction and Treatment Based on Adaptive Neuro-Fuzzy Inference System (ANFIS)." In 14th International Seminar on Industrial Engineering and Management. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-qk2n23.
Full textReports on the topic "Prediction of attacks in wild"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textHatada, Mitsuhiro, and Matthew Scholl. An Empirical Study on Flow-based Botnet Attacks Prediction. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.tn.2111.
Full textGranot, David, Richard Amasino, and Avner Silber. Mutual effects of hexose phosphorylation enzymes and phosphorous on plant development. United States Department of Agriculture, 2006. http://dx.doi.org/10.32747/2006.7587223.bard.
Full textFagúndez, Jaime, Laura Lagos, José Antonio Cortés Vázquez, and Flávia Canastra. Galician Wild Ponies. Socio-Economic Context and Environmental Benefits: Galicia Area Report and Case Study for GrazeLIFE (LIFE18 PRE NL 002). Publishing Service-University of A Coruña, 2022. http://dx.doi.org/10.17979/spudc.9788497498234.
Full textFagúndez, Jaime, Laura Lagos, José Antonio Cortés Vázquez, and Flávia Canastra. Galician Wild Ponies. Socio-Economic Context and Environmental Benefits: Galicia Area Report and Case Study for GrazeLIFE (LIFE18 PRE NL 002). Publishing Service-University of A Coruña, 2022. http://dx.doi.org/10.17979/spudc.9788497498241.
Full textGriswold, Jim. Monitoring and Evaluation of Smolt Migration in the Columbia Basin, Volume XIV; Evaluation of 2006 Prediction of the Run-Timing of Wild and Hatchery-Reared Salmon and Steelhead at Rock Island, Lower Granite, McNary, John Day and Bonneville Dams using Program Real Time, Technical Report 2006. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/963283.
Full text