Academic literature on the topic 'Violator model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Violator model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Violator model"
Pavlicheva, E. N., F. O. Fedin, A. S. Chiskidov, and N. F. Glybin. "MODEL OF AN INFORMATION SECURITY INTRUDER FOR AN OBJECT OF CRITICAL INFORMATION INFRASTRUCTURE OF A TRANSPORT SERVICES TRADING PLATFORM." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 203 (May 2021): 28–34. http://dx.doi.org/10.14489/vkit.2021.05.pp.028-034.
Full textAn, Shi, Jianxun Cui, Meng Zhao, and Jian Wang. "A Study of Network Violator Interception Based on a Reliable Game Model." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/124343.
Full textBoychenko, Oleg, and Ruslana Ziubina. "THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR." Information systems and technologies security, no. 1 (1) (2019): 19–26. http://dx.doi.org/10.17721/ists.2019.1.19-26.
Full textCui, Jianxun, Shi An, and Meng Zhao. "A Robust Model for the Network Violator Interception Problem." Arabian Journal for Science and Engineering 39, no. 10 (2014): 6871–81. http://dx.doi.org/10.1007/s13369-014-1271-8.
Full textLoginova, A. O. "The Descriptive Model of Social Bot on the Base of American Political Discourse." Herald of the Siberian State University of Telecommunications and Information Science 18, no. 3 (2024): 3–13. https://doi.org/10.55648/1998-6920-2024-18-3-3-13.
Full textSizov, Valerii A., Aleksei D. Kirov, and Viacheslav V. Aleinikov. "Development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach." Journal Of Applied Informatics 18, no. 4 (2023): 76–96. http://dx.doi.org/10.37791/2687-0649-2023-18-4-76-96.
Full textSawicki, Janusz. "Zaniechanie ukarania z art. 16a i 16b k.k.s. — szczególne rodzaje czynnego żalu czy niepotrzebna kazuistyka?" Przegląd Prawa i Administracji 116 (December 20, 2019): 87–101. http://dx.doi.org/10.19195/0137-1134.116.6.
Full textKalashnikov, Andrey, and Konstantin Bugajskij. "A Model for Assessing the Security of a Complex Network (Part 1)." Voprosy kiberbezopasnosti, no. 4(50) (2022): 26–38. http://dx.doi.org/10.21681/2311-3456-2022-4-26-38.
Full textPilkevych, I. A., O. S. Boychenko, and I. V. Humeniuk. "Improvimg the Method of Developing a Logic-Probabilistic Model of an Internal Violator." Èlektronnoe modelirovanie 42, no. 4 (2020): 71–86. http://dx.doi.org/10.15407/emodel.42.04.071.
Full textZhuk, R. "A Method for Determining the Potential of an Information Security Intruder and Realizable Software Vulnerabilities." Proceedings of Telecommunication Universities 7, no. 2 (2021): 95–101. http://dx.doi.org/10.31854/1813-324x-2021-7-2-95-101.
Full textDissertations / Theses on the topic "Violator model"
Швець, Валеріян Анатолійович, та Тетяна Вікторівна Мелешко. "Напрями забезпечення доступності і цілісності інформації глобальних навігаційних супутникових систем". Thesis, RS Global Sp. z O.O. Warsaw, Poland, 2020. http://er.nau.edu.ua/handle/NAU/41256.
Full textEscobar, Lindber Ivan Salas. "Modelos seesaw a baixas energias e modelo de violação mínima de sabor no modelo seesaw tipo III." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/43/43134/tde-26032013-145746/.
Full textColón, Samuel Santana. "Phenomenological model combining flavor symmetry violation and lepton number violation in neutrino physics." [Bloomington, Ind.] : Indiana University, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3334993.
Full textSundu, Hayriye. "Lepton Flavor Violation In The Two Higgs Doublet Model." Phd thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608359/index.pdf.
Full textanderson, David L. "Studies in CPT violation and 331 models." W&M ScholarWorks, 2006. https://scholarworks.wm.edu/etd/1539623495.
Full textCronin, Alexander D. "New techniques for measuring atomic parity violation /." Thesis, Connect to this title online; UW restricted, 1999. http://hdl.handle.net/1773/9766.
Full textGupta, Vivek. "Probability of SLA Violation for Semi-Markov Availability." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1235610777.
Full textHayes, Jonathan Geoffrey. "On lepton flavour violation in realistic supergravity models." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433965.
Full textDent, Thomas Edward. "CP violation and supersymmetry-breaking in superstring models." Thesis, University of Sussex, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.323022.
Full textMagleby, Stephanie Allred. "The Violation of Bell's Inequality in a Deterministic but Nonlocal Model." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1197.pdf.
Full textBooks on the topic "Violator model"
Kaplow, Louis. Any non-individualistic social welfare function violates the Pareto principle. National Bureau of Economic Research, 1999.
Find full textI, Sanda A., and Suzuki S, eds. 1994 International Workshop on B Physics: Physics beyond the standard model at the B factory : Nagoya, Japan, 26-28 October, 1994. World Scientific, 1995.
Find full textTheoretical, Advanced Study Institute in Elementary Particle Physics (1994 University of Colorado Boulder). CP violation and the limits of the standard model: Proceedings of the 1994 Theoretical Advanced Study Institute in Elementary Particle Physics, TASI-94, University of Colorado at Boulder, 29 May - 24 June 1994. World Scientific, 1995.
Find full text-H, Guo X., Sevior M, Thomas A. W. 1949-, National Institute for Theoretical Physics (Australia), and Special Research Centre for the Subatomic Structure of Matter (Australia), eds. Proceedings of the workshop on CP violation: 3-8 July 1998, Adelaide. World Scientific, 2000.
Find full textHillion, Pierre H. "Size-sorted portfolios and the violation of the random walk hypothesis: Additional empirical evidence and implication for tests of asset pricing models". INSEAD, 1986.
Find full textTuzov, Andrey, and Nikolay Stoyko. Verification proceedings in the criminal proceedings of the Czech Republic. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2056731.
Full textLevchenko, Boris. Criteria for testing hypotheses about uniformity. Application manual. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/986695.
Full textBlaha, Stephen. The origin of the standard model: The genesis of four quark and lepton species, parity violation, the electro weak sector, color SU(3), three visible generations of fermions, and one generation of dark matter with dark energy ; Quantum theory of the third kind : a new type of divergence-free quantum field theory supporting a unified standard model of elementary particles and quantum gravity based on a new method in the calculus of variations. Pingree-Hill Publishing, 2006.
Find full textDent, Thomas Edward. CP violation and supersymmetry-breaking in superstring models. 2000.
Find full textCP Violation and the Limits of the Standard Model: Proceedings of the 1994 Theoretical Advanced Study Institute in Elementary Particle Physics Tasi-. World Scientific Pub Co Inc, 1995.
Find full textBook chapters on the topic "Violator model"
Khalil, Shaaban, and Stefano Moretti. "CP Violation." In Standard Model Phenomenology. CRC Press, 2022. http://dx.doi.org/10.1201/9780429443015-11.
Full textMandritsa, I. V., V. I. Petrenko, O. V. Mandritsa, and T. V. Minkina. "Mathematical Concept of a Model for Processing Metadata of Employee’s Psycho-States for Identifying Him as an Internal Violator (Insider)." In Current Problems in Applied Mathematics and Computer Science and Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34127-4_19.
Full textCoenen, Norine, Raimund Dachselt, Bernd Finkbeiner, et al. "Explaining Hyperproperty Violations." In Computer Aided Verification. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_20.
Full textZeng, Reng, Zhuo Sun, Su Liu, and Xudong He. "McPatom: A Predictive Analysis Tool for Atomicity Violation Using Model Checking." In Model Checking Software. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31759-0_14.
Full textKleinknecht, Konrad. "Models of CP Violation." In Springer Tracts in Modern Physics. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-44916-4_4.
Full textGiudice, Gian Francesco. "Physics Beyond the Standard Model." In CP Violation in Particle, Nuclear and Astrophysics. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47895-7_8.
Full textKleinknecht, Konrad. "10.4 Models of CP Violation." In Theory and Experiments. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-74203-6_13.
Full textBeyer, Dirk, and Sudeep Kanav. "An Interface Theory for Program Verification." In Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61362-4_9.
Full textBorgohain, Happy, and Mrinal Kumar Das. "Lepton Number Violation and Lepton Flavour Violation in Left-Right Symmetric Model." In XXII DAE High Energy Physics Symposium. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73171-1_164.
Full textKleinknecht, Konrad. "Weak Mixing, CP Violation and the Standard Model." In Physics for a New Generation. Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-642-75567-5_5.
Full textConference papers on the topic "Violator model"
Romanova, Nadezhda, and Vitaly Gryzunov. "OSINT Model of Privacy Violator." In 2025 International Russian Smart Industry Conference (SmartIndustryCon). IEEE, 2025. https://doi.org/10.1109/smartindustrycon65166.2025.10985976.
Full textM, Prathilothamai, Sujan K, Ganapathi G, Nandagopal B, and Varnika Ramkumar. "Traffic Rules Violation Detection System using YOLO v8 Model." In 2024 10th International Conference on Electrical Energy Systems (ICEES). IEEE, 2024. https://doi.org/10.1109/icees61253.2024.10776906.
Full textFridell, Kåre, Lukas Graf, Julia Harz, and Chandan Hati. "Simplified models of $d=7$ lepton number violation." In 42nd International Conference on High Energy Physics. Sissa Medialab, 2024. https://doi.org/10.22323/1.476.0187.
Full textLee, Hosuk, Gennady A. Smolyakov, and Marek Osiński. "Reciprocity Principle and Structure-Induced Asymmetry between Counterpropagating Modes in Whistle-Geometry Ring Lasers." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.37.
Full textЕрышов, Вадим Георгиевич, and Никита Вадимович Ерышов. "MODEL OF THE PROCESS OF PROTECTING INFORMATION FROM ITS SECRET RECEIPT BY THE VIOLATOR OF INFORMATION SECURITY ON PROTECTED OBJECTS." In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Июль 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt186.2020.12.50.003.
Full textIlina, D. V., and V. G. Eryshov. "Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object." In 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2021. http://dx.doi.org/10.1109/weconf51603.2021.9470745.
Full textFleischer, Robert. "Current issues in CP violation." In Beyond the standard model. American Institute of Physics, 1997. http://dx.doi.org/10.1063/1.54470.
Full textValencia, G. "CP violation in W production and decay." In Beyond the standard model. American Institute of Physics, 1997. http://dx.doi.org/10.1063/1.54508.
Full textFreitas dos Santos, Thiago, Stephen Cranefield, Bastin Tony Roy Savarimuthu, Nardine Osman, and Marco Schorlemmer. "Cross-community Adapter Learning (CAL) to Understand the Evolving Meanings of Norm Violation." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/13.
Full textWang, Jike. "Beyond Standard Model searches at LHC." In Flavor Physics and CP Violation. Sissa Medialab, 2017. http://dx.doi.org/10.22323/1.280.0027.
Full textReports on the topic "Violator model"
Lavoura, L. Superweak-like models of CP violation. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/6949960.
Full textLavoura, L. Superweak-like models of CP violation. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10187704.
Full textChang, Darwin. Ruling out the Weinberg Model of Spontaneous CP Violation. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/784778.
Full textChang, Darwin. Ruling out the Weinberg Model of Spontaneous CP Violation. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/784808.
Full textFaraggi, A. E. R-parity violation in superstring derived models. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/446358.
Full textAthanasiu, Gregory George. Restrictions on Two Higgs Doublet Models and CP Violation at the Unification Scale. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1454027.
Full textAthanasiu, G. G. Restrictions on two Higgs doublet models and CP violation at the unification scale. Office of Scientific and Technical Information (OSTI), 1987. http://dx.doi.org/10.2172/6172237.
Full textWoods, Michael B. A Search for Direct CP Violation in the 2 pi Decay Modes of Neutral Kaons. Office of Scientific and Technical Information (OSTI), 1988. http://dx.doi.org/10.2172/1433212.
Full textLavoura, L. Comment on Flavor-changing processes and CP violation in the S sub 3 times Z sub 3 model''. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/7200442.
Full textLavoura, L. Comment on ``Flavor-changing processes and CP violation in the S{sub 3} {times} Z{sub 3} model``. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10187890.
Full text