Journal articles on the topic 'Quick attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Quick attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Singh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full textAbdullayeva, Fargana, and Orkhan Valikhanli. "Development of a method for detecting GPS spoofing attacks on unmanned aerial vehicles." Problems of Information Technology 13, no. 1 (2022): 3–8. http://dx.doi.org/10.25045/jpit.v13.i1.01.
Full textYe, Zhe, Wenjie Zhang, Ying Ren, et al. "Speed Master: Quick or Slow Play to Attack Speaker Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 21 (2025): 22137–45. https://doi.org/10.1609/aaai.v39i21.34367.
Full textDoult, Bill. "NHS Direct under attack as a quick-fix gimmick." Nursing Standard 14, no. 2 (1999): 8. http://dx.doi.org/10.7748/ns.14.2.8.s20.
Full textSingh, Har Preet. "Survey of new attack models on Cloud Infrastructure." International Journal Of Engineering And Computer Science 7, no. 03 (2018): 23742–52. http://dx.doi.org/10.18535/ijecs/v7i3.15.
Full textStaddon, Edward, Valeria Loscri, and Nathalie Mitton. "Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey." Applied Sciences 11, no. 16 (2021): 7228. http://dx.doi.org/10.3390/app11167228.
Full textJosephine Reenamary, S., and Rev Sr ArockiaValan Rani. "Heart Disease Detection -A Machine Learning Approach." Data Analytics and Artificial Intelligence 3, no. 2 (2023): 59–63. http://dx.doi.org/10.46632/daai/3/2/12.
Full textMartins, Joao Bernardo, Jose Afonso, Patrícia Coutinho, Ricardo Fernandes, and Isabel Mesquita. "The Attack in Volleyball from the Perspective of Social Network Analysis: Refining Match Analysis through Interconnectivity and Composite of Variables." Montenegrin Journal of Sports Science and Medicine 10, no. 1 (2021): 45–54. http://dx.doi.org/10.26773/mjssm.210307.
Full textMT, Suryadi, Achmad Eriza Aminanto, and Muhamad Erza Aminanto. "Empowering Digital Resilience: Machine Learning-Based Policing Models for Cyber-Attack Detection in Wi-Fi Networks." Electronics 13, no. 13 (2024): 2583. http://dx.doi.org/10.3390/electronics13132583.
Full textYuliswar, Teddy, Ikhwana Elfitri, and Onno W purbo. "Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server." INOVTEK Polbeng - Seri Informatika 10, no. 1 (2025): 367–76. https://doi.org/10.35314/vem9da98.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of DDoS Attacks Using Machine Learning Classification Algorithms." International Journal of Computer Network and Information Security 14, no. 6 (2022): 89–97. http://dx.doi.org/10.5815/ijcnis.2022.06.07.
Full textGhasabi, Mozhgan, and Mahmood Deypir. "Using optimized statistical distances to confront distributed denial of service attacks in software defined networks." Intelligent Data Analysis 25, no. 1 (2021): 155–76. http://dx.doi.org/10.3233/ida-194796.
Full textRamkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.
Full textYuni Fitriyah Ningsih, Andri Wahyu Utomo, and Himawan Fajar Arafat. "ANALISIS SERANGAN PERMAINAN BOLAVOLI (STUDI PADA TIM PUTRA KABUPATEN MAGETAN, KEJURPROV BOLAVOLI JUNIOR JAWA TIMUR TAHUN 2022)." Jurnal Kejaora (Kesehatan Jasmani dan Olah Raga) 8, no. 1 (2023): 103–10. http://dx.doi.org/10.36526/kejaora.v8i1.2704.
Full textUtomo, Andri Wahyu, and Himawan Fajar Arafat. "Analisis serangan permainan bolavoli." Bima Loka: Journal of Physical Education 2, no. 1 (2023): 32–39. http://dx.doi.org/10.26740/bimaloka.v2i1.22283.
Full textWang, Ze, Chang Zhou, and Yiran Liu. "Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/8636379.
Full textPratama, Budiman Agung, Sugito Sugito, Slamet Junaidi, Muhammad Akbar Husein Allsabah, and Mokhamad Firdaus. "Analisis serangan bolavoli." Jurnal SPORTIF : Jurnal Penelitian Pembelajaran 6, no. 2 (2020): 483–98. http://dx.doi.org/10.29407/js_unpgri.v6i2.14432.
Full textOfir, Anna, and Rafael Koren. "Cyber-shock and “digital withdrawal”: Organizational lLeadership and Crisis Management During a Hospital-wide Computer Shutdown Following a Ransomware Attack." Prehospital and Disaster Medicine 38, S1 (2023): s98. http://dx.doi.org/10.1017/s1049023x23002728.
Full textSufardy, Devander Benaryanta, and Indrastanti Ratna Widiasari. "The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers." INOVTEK Polbeng - Seri Informatika 9, no. 2 (2024): 765–77. http://dx.doi.org/10.35314/shxy2045.
Full textجبار, نور الهدى ستار, and أ. د. هدى شهاب جاري. "Comparative study of the two-shift fast break velocity index for the first three teams to qualify for the Golden Pistol of the Basketball Premier League (2016-2017)." Modren Sport Journal 20, no. 2 (2021): 0033. http://dx.doi.org/10.54702/msj.2021.20.2.0033.
Full textNamiki, Akio, and Fumiyasu Takahashi. "Motion Generation for a Sword-Fighting Robot Based on Quick Detection of Opposite Player’s Initial Motions." Journal of Robotics and Mechatronics 27, no. 5 (2015): 543–51. http://dx.doi.org/10.20965/jrm.2015.p0543.
Full textAl Afik, Yuni Sufyanti Arif, Abu Bakar, and Riza Fikriana. "Overcoming relapse experience in acute coronary syndrome patients." Bali Medical Journal 12, no. 1 (2023): 510–13. http://dx.doi.org/10.15562/bmj.v12i1.3738.
Full textUgalde-Ramírez, Jose Alexis, and Aldo Vasquez-Bonilla. "Comparison of goal-scoring patterns between the Euro and Copa América 2024 tournaments through a notational analysis." Scientific Journal of Sport and Performance 4, no. 4 (2025): 519–33. https://doi.org/10.55860/tgfb5139.
Full textLiebergall, Michal H., Nava Braverman, Shmuel C. Shapira, Orly Picker Rotem, Irene Soudry, and Shlomo Mor-Yosef. "Role of Nurses in a University Hospital During Mass Casualty Events." American Journal of Critical Care 16, no. 5 (2007): 480–84. http://dx.doi.org/10.4037/ajcc2007.16.5.480.
Full textLuangtrongkit, Suriyon, Pitirat Kongtongkum, and K. Rangubhet. "Offensive Patterns Analysis of Thai Nation Team in Volleyball Women’s Nations League 2022." American Journal of Sports Science 12, no. 2 (2024): 12–19. http://dx.doi.org/10.11648/j.ajss.20241202.11.
Full textBobrov, L. A. ""Among the troops he chose brave warriors, who were battling through ranks...". On Some Peculiar Aspects of Amir Timur's Tactical Art." Universum Humanitarium, no. 1 (July 13, 2021): 17–40. http://dx.doi.org/10.25205/2499-9997-2021-1-17-40.
Full textChinonso Mark, Kingsley. "Russia-United Kingdom Diplomatic Crisis over Salisbury Nerve Agent Attack: An Analysis." International Journal of Law and Public Administration 1, no. 1 (2018): 58. http://dx.doi.org/10.11114/ijlpa.v1i1.3357.
Full textKawthar, Muhammad, and Senthil A. Kumar Dr. "Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations In Software Development: SLR Based Approach." SEKA : JOURNAL OF MULTIDISCIPLINARY STUDIES 1, no. 1 (2024): 1–9. https://doi.org/10.5281/zenodo.13944566.
Full textKim, Si Wan, Hyun Yi Yi, Gun Il Ma, and Jeong Hyun Yi. "Shoulder-Surfing Resistant Smartphone Authentication Scheme Using Virtual Joystick." Applied Mechanics and Materials 284-287 (January 2013): 3497–501. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3497.
Full textMrunal K. Pathak,. "Detecting Cyber-attacks in the Industrial Internet of Things using a Hybrid Deep Random Neural Network." Journal of Electrical Systems 20, no. 1s (2024): 165–74. http://dx.doi.org/10.52783/jes.762.
Full textHriday Banerjee. "Design and Implementation of Security Technique for Selective Forwarding Attack in Wsn." Journal of Information Systems Engineering and Management 10, no. 27s (2025): 796–814. https://doi.org/10.52783/jisem.v10i27s.4555.
Full textBadri, Sahar. "HO-CER: Hybrid-optimization-based convolutional ensemble random forest for data security in healthcare applications using blockchain technology." Electronic Research Archive 31, no. 9 (2023): 5466–84. http://dx.doi.org/10.3934/era.2023278.
Full textLuo, Yuling, Yunqi Liu, Junxiu Liu, Xue Ouyang, Yi Cao, and Xuemei Ding. "ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks." International Journal of Bifurcation and Chaos 29, no. 09 (2019): 1950118. http://dx.doi.org/10.1142/s0218127419501189.
Full textYacovino, Dario A., and John B. Finlay. "Intra-Attack Vestibuloocular Reflex Changes in Ménière’s Disease." Case Reports in Otolaryngology 2016 (2016): 1–4. http://dx.doi.org/10.1155/2016/2427983.
Full textHassan, Karrar Falih, and Mehdi Ebady Manaa. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604–13. http://dx.doi.org/10.11591/eei.v11i3.3643.
Full textKarrar, Falih Hassan, and Ebady Manaa Mehdi. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604~1613. https://doi.org/10.11591/eei.v11i3.3643.
Full textStamm, Raini, Meelis Stamm, Doris Torilo, Kaivo Thomson, and Alexander Jairus. "Comparative analysis of the elements of attack and defence in men’s and women’s games in the Estonian volleyball highest league." Papers on Anthropology 25, no. 1 (2016): 37. http://dx.doi.org/10.12697/poa.2016.25.1.04.
Full textJawad, Muhammad N., Mahmood A. Al-Shareeda, Omar Yawez Mustafa Mustafa, Mohammed Amin Almaiah, and Rami Shehab. "Dynamic key revocation and hybrid cryptographic approaches for secure authentication in the social internet of vehicles." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 3135–51. https://doi.org/10.53894/ijirss.v8i2.5956.
Full textMaleeva, G. А. "Analysis of security of post-quantum algorithm of Rainbow electronic signature against potential attacks." Radiotekhnika, no. 205 (July 2, 2021): 85–93. http://dx.doi.org/10.30837/rt.2021.2.205.08.
Full textYu, Wen-Kai, Ying Yang, Ya-Xin Li, Ning Wei, and Shuo-Fei Wang. "Multi-Party Cryptographic Key Distribution Protocol over a Public Network Based on a Quick-Response Code." Sensors 22, no. 11 (2022): 3994. http://dx.doi.org/10.3390/s22113994.
Full textNiu, Quan Lin, and Nai Qian Feng. "Inhibiting Effect of Mineral Powder on Sulfate Attack of Cement Mortar." Key Engineering Materials 302-303 (January 2006): 73–78. http://dx.doi.org/10.4028/www.scientific.net/kem.302-303.73.
Full textMartín-Ruiz, Julio, Jorge Alarcón-Jiménez, Nieves de Bernardo, Ignacio Tamarit-Grancha, Xavier Iglesias, and Laura Ruiz-Sanchis. "Muscle Changes during Direct Attack under Different Conditions in Elite Wheelchair Fencing." Sports 12, no. 7 (2024): 188. http://dx.doi.org/10.3390/sports12070188.
Full textZheng, Wei, Chunpu Zhang, Dapeng Hou, and Chunguang Cao. "Comparison on different strategies for treatments of hypertensive hemorrhage in the basal ganglia region with a volume of 25 to 35ml." Acta Cirurgica Brasileira 27, no. 10 (2012): 727–31. http://dx.doi.org/10.1590/s0102-86502012001000010.
Full textIwano, Yuki, Koichi Osuka, and Hisanori Amano. "Development of Rescue Support Stretcher System with Stair-Climbing." Journal of Robotics and Mechatronics 25, no. 3 (2013): 567–74. http://dx.doi.org/10.20965/jrm.2013.p0567.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textPartyka, Olha, Bohdan Fihol, and Taras Nakonechnyi. "INTEGRATED APPROACH TO DETECTING BLUETOOTH THREATS USING WIRESHARK AND SPLUNK SIEM." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 223–34. https://doi.org/10.28925/2663-4023.2024.26.684.
Full textDai, Xuan, Jian Mao, Jiawei Li, Qixiao Lin, and Jianwei Liu. "HomeGuardian: Detecting Anomaly Events in Smart Home Systems." Wireless Communications and Mobile Computing 2022 (June 13, 2022): 1–11. http://dx.doi.org/10.1155/2022/8022033.
Full textEhsanpour, Seyed Reza, and Nafiseh Hashempour. "Agroterrorism; Iranian Criminal Policy." International Journal of Multicultural and Multireligious Understanding 5, no. 6 (2019): 232. http://dx.doi.org/10.18415/ijmmu.v5i6.1048.
Full textNiu, Xinyu, Jiandao Zhao, and Bo Tian. "The Security Threat and Precautionary Measures of QR Code of Internet of Things Technology." Advances in Engineering Technology Research 11, no. 1 (2024): 775. http://dx.doi.org/10.56028/aetr.11.1.775.2024.
Full textYang, Ming-Hour, Jia-Ning Luo, Murugesan Vijayalakshmi, and Selvaraj Mercy Shalinie. "Contactless Credit Cards Payment Fraud Protection by Ambient Authentication." Sensors 22, no. 5 (2022): 1989. http://dx.doi.org/10.3390/s22051989.
Full text