Gotowa bibliografia na temat „Data replacement attack”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Data replacement attack”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Data replacement attack"

1

Ganesh, Dagadu Puri, and Haritha D. "Framework to Avoid Similarity Attack in Big Streaming Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2920–25. https://doi.org/10.11591/ijece.v8i5.pp2920-2925.

Pełny tekst źródła
Streszczenie:
The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can process the dat
Style APA, Harvard, Vancouver, ISO itp.
2

Gu, Rui, Jian Wang, Benpeng Li, Di Qi, Xiaohu Gao, and Zhiyong Yang. "Experimental Study on Mechanical Properties and Compressive Constitutive Model of Recycled Concrete under Sulfate Attack Considering the Effects of Multiple Factors." Buildings 14, no. 9 (2024): 2761. http://dx.doi.org/10.3390/buildings14092761.

Pełny tekst źródła
Streszczenie:
To investigate the mechanical properties and a compressive constitutive model of recycled concrete under sulfate attack considering the effects of multiple factors, two waste concrete strengths (i.e., C30 and C40), four replacement ratios of recycled coarse aggregates (i.e., 0, 30%, 50% and 100%), and two water–cement ratios (i.e., 0.50 and 0.60) were considered in this study, and a total of 32 recycled concrete specimens were designed and tested. The results indicated that the failure processes and patterns of recycled concrete were not significantly influenced by the replacement ratio of rec
Style APA, Harvard, Vancouver, ISO itp.
3

Sunderi, Pranata, and Tri Nugroho Hargyo. "2FYSH: two-factor authentication you should have for password replacement." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 693–702. https://doi.org/10.12928/TELKOMNIKA.v17i2.9187.

Pełny tekst źródła
Streszczenie:
Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure sinc
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Qi, Lin Qiao, and Peng Song. "Effect of Fly Ash and Slag on the Resistance to H2S Attack of Oil Well Cement." Advanced Materials Research 79-82 (August 2009): 71–74. http://dx.doi.org/10.4028/www.scientific.net/amr.79-82.71.

Pełny tekst źródła
Streszczenie:
In this paper, the resistance to H2S attack of pastes made from slag-fly ash blended cement used in oil well (SFAOW) was studied, in which fly ash (FA) was used at replacement dosages of 30% to 60% by weight of slag. Samples of SCOW and SFAOW pastes were demoulded and cured by immersion in fresh water with 2 Mp H2S insulfflation under 130oC for 15 days. After this curing period, compression strength and permeability of the samples were investigated. The reaction mechanisms of H2S with the paste were carried out through a microstructure study, which included the use of x-ray diffraction (XRD) p
Style APA, Harvard, Vancouver, ISO itp.
5

Xi, Peng, Shaoliang Peng, and Wenjuan Tang. "IBAS:Imperceptible Backdoor Attacks in Split Learning with Limited Information." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 26 (2025): 27715–22. https://doi.org/10.1609/aaai.v39i26.34986.

Pełny tekst źródła
Streszczenie:
Split learning, as a distributed learning framework, effectively addresses the issue of limited computing resources. However, despite achieving a separation of data and computation, recent studies have pointed out that this framework still faces two major security challenges: privacy leakage and model security. Most current research focuses on the problem of privacy leakage, emphasizing how to prevent malicious servers from recovering or inferring the client's private data. However, the issue of model security in split learning has not received sufficient attention. This paper reveals the vuln
Style APA, Harvard, Vancouver, ISO itp.
6

Wang, Guilin, Hua Shen, Liquan Chen, Jinguang Han, and Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks." Electronics 12, no. 23 (2023): 4865. http://dx.doi.org/10.3390/electronics12234865.

Pełny tekst źródła
Streszczenie:
To achieve flexible sensing coverage with low deployment costs, mobile users need to contribute their equipment as sensors. Data integrity is one of the most fundamental security requirements and can be verified by digital signature techniques. In the mobile crowdsensing (MCS) environment, most sensors, such as smartphones, are resource-limited. Therefore, many traditional cryptographic algorithms that require complex computations cannot be efficiently implemented on these sensors. In this paper, we study the security of certificateless signatures, in particular, some constructions without pai
Style APA, Harvard, Vancouver, ISO itp.
7

Fu, Xiaopeng, Zhaoquan Gu, Weihong Han, Yaguan Qian, and Bin Wang. "Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks." Wireless Communications and Mobile Computing 2021 (September 27, 2021): 1–9. http://dx.doi.org/10.1155/2021/9969867.

Pełny tekst źródła
Streszczenie:
Nowadays, deep learning models play an important role in a variety of scenarios, such as image classification, natural language processing, and speech recognition. However, deep learning models are shown to be vulnerable; a small change to the original data may affect the output of the model, which may incur severe consequences such as misrecognition and privacy leakage. The intentionally modified data is referred to as adversarial examples. In this paper, we explore the security vulnerabilities of deep learning models designed for textual analysis. Specifically, we propose a visual similar wo
Style APA, Harvard, Vancouver, ISO itp.
8

Puri, Ganesh Dagadu, and D. Haritha. "Framework to Avoid Similarity Attack in Big Streaming Dat." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2920. http://dx.doi.org/10.11591/ijece.v8i5.pp2920-2925.

Pełny tekst źródła
Streszczenie:
<span>The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can pro
Style APA, Harvard, Vancouver, ISO itp.
9

Bagui, Sikha S., Dustin Mink, Subhash C. Bagui, and Sakthivel Subramaniam. "Resampling to Classify Rare Attack Tactics in UWF-ZeekData22." Knowledge 4, no. 1 (2024): 96–119. http://dx.doi.org/10.3390/knowledge4010006.

Pełny tekst źródła
Streszczenie:
One of the major problems in classifying network attack tactics is the imbalanced nature of data. Typical network datasets have an extremely high percentage of normal or benign traffic and machine learners are skewed toward classes with more data; hence, attack data remain incorrectly classified. This paper addresses the class imbalance problem using resampling techniques on a newly created dataset, UWF-ZeekData22. This is the first dataset with tactic labels, labeled as per the MITRE ATT&CK framework. This dataset contains about half benign data and half attack tactic data, but specific t
Style APA, Harvard, Vancouver, ISO itp.
10

Prudhvi, E., and Sujatha Reddy. "A Study on Partial Replacement of Cement using Natural Zeolite." Journal of Physics: Conference Series 2779, no. 1 (2024): 012055. http://dx.doi.org/10.1088/1742-6596/2779/1/012055.

Pełny tekst źródła
Streszczenie:
Abstract Because of its superior mechanical and physical qualities, concrete, a composite material, has long been one of the most widely utilized materials in the civil engineering sector. Without a doubt, cement is the component that uses the greatest energy. In addition to being energy-intensive, the manufacture of cement contributes significantly to global CO2 emissions, making up 8% of all greenhouse gas emissions. Concrete’s performance and resilience to harsh environmental stresses are enhanced by the addition of natural zeolite powder to blended cement. Concrete buildings are subject to
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Data replacement attack"

1

Erfani, Yousof. "Applications of perceptual sparse representation (Spikegram) for copyright protection of audio signals." Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9859.

Pełny tekst źródła
Streszczenie:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le si
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Data replacement attack"

1

Cui, Xu, Ruiqiang Ma, Haoran Yang, and Yanan Guo. "Research on Privacy Preservation and Identification Algorithms for Personal Information Data." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2025. https://doi.org/10.3233/faia250185.

Pełny tekst źródła
Streszczenie:
As the scale of data usage continues to expand, the security risks associated with data sharing are gradually increasing. The iPWS Cup, an annual competition held in Japan, focuses on research into data privacy protection, including attack and defense strategies. In this paper, we summarize the data anonymization and re-identification attack methods used by our group in the first international version of the competition. First, we use the K-Nearest Neighbors (KNN) clustering algorithm to cluster the data and construct a k-anonymity model for each cluster. We introduce methods such as noise add
Style APA, Harvard, Vancouver, ISO itp.
2

Rowley-Conwy, Peter. "The Three Age System as Predator: Copenhagen and Lund 1836–1850." In From Genesis to Prehistory. Oxford University Press, 2007. http://dx.doi.org/10.1093/oso/9780199227747.003.0007.

Pełny tekst źródła
Streszczenie:
We saw in the last chapter how Thomsen’s Three Age System was establishing itself as the ancient historical chronology started to fail in the 1830s. The years immediately following its publication in 1836 saw two major developments that Thomsen could never have foreseen. The first development was that three entirely separate chronologies came to maturity, and were grafted by their makers onto Thomsen’s stone–bronze–iron sequence. These chronologies were Sven Nilsson’s economic scheme of hunter-gatherers preceding farmers; Japetus Steenstrup’s environmental scheme of successive forest types; an
Style APA, Harvard, Vancouver, ISO itp.
3

Pal, Koushik, Goutam Ghosh, and Mahua Bhattacharya. "Biomedical Watermarking." In Biomedical Engineering. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3158-6.ch027.

Pełny tekst źródła
Streszczenie:
The proposed chapter describes the need of data security and content protection in the modern health care system. A digital watermarking technique is used as a strong and secure tool to achieve ultimate security. In this chapter the authors discuss some existing watermarking techniques and also describe some new types of data hiding techniques using biomedical watermarking techniques in both spatial and frequency domain which would help keep the authenticity and secure the contents of the hidden biomedical information for accurate tele-diagnosis. These techniques use multiple copies of the sam
Style APA, Harvard, Vancouver, ISO itp.
4

Pal, Koushik, Goutam Ghosh, and Mahua Bhattacharya. "Biomedical Watermarking." In Research Developments in Computer Vision and Image Processing. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4558-5.ch012.

Pełny tekst źródła
Streszczenie:
The proposed chapter describes the need of data security and content protection in the modern health care system. A digital watermarking technique is used as a strong and secure tool to achieve ultimate security. In this chapter the authors discuss some existing watermarking techniques and also describe some new types of data hiding techniques using biomedical watermarking techniques in both spatial and frequency domain which would help keep the authenticity and secure the contents of the hidden biomedical information for accurate tele-diagnosis. These techniques use multiple copies of the sam
Style APA, Harvard, Vancouver, ISO itp.
5

Sivanandan N, Dr. "SMART HELMET USING PICMICRO CONTROLLER." In Futuristic Trends in Electronics & Instrumentation Engineering Volume 3 Book 1. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bdei1p5ch2.

Pełny tekst źródła
Streszczenie:
One way in which bike riding safety has improved is through the usage of "smart helmets," which are a form of protective headgear worn by the rider. This helmet's primary function is to protect the rider from harm. Use of advanced features such as alcohol detection, accident identification, hands-free operation, and fall detection can help bring this about. This paper introduces the intelligent helmet, which prevents the rider from beginning the journey unless they are wearing it. Without this helmet, the bike wouldn't be able to attain the appropriate speed, thanks to a simple cable replaceme
Style APA, Harvard, Vancouver, ISO itp.
6

Vaxevanopoulos, Markos, James Ross, Konstantinos Soukis, Panagiotis Voudouris, and Vasilios Melfos. "Mapping the shafts of Laurion – Contribution to a new geological stratigraphy." In Der Anschnitt, Beihefte. Deutsches Bergbau-Museum Bochum, 2023. https://doi.org/10.46586/dbm.264.390.

Pełny tekst źródła
Streszczenie:
The mining territory of Laurion in Attica-Greece comprises a great number of shafts constructed since antiquity in order to exploit the silver bearing ore deposits. These vertical constructions have presumably served a multipurpose role as artificial conduits for uplifting the extracted material, exploration shafts as well as ventilation chimneys. They are situated in an area of 70 km2 and their depth varies from a few meters to over 100 m. The different contacts of the Laurion rock sequences, where the ore mineralization was deposited, are visible in the majority of the shafts. The main extra
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Data replacement attack"

1

Licina, George J., and George Nekoksa. "Monitoring Biofilm Formation in a Brackish Water Cooled Power Plant Environment." In CORROSION 1997. NACE International, 1997. https://doi.org/10.5006/c1997-97222.

Pełny tekst źródła
Streszczenie:
Abstract Power plants have experienced severe corrosion, including microbiologically influenced corrosion (MIC) in cooling water systems. This attack has resulted in decreased plant availability and significantly increased operations and maintenance costs. Copper base alloys, carbon steels and stainless steels have all been susceptible. In a number of instances, replacement of piping and heat exchangers has been required to alleviate corrosion-related problems. Monitoring is a key element to improved corrosion and fouling control in cooling water systems. On-line methods provide evaluations of
Style APA, Harvard, Vancouver, ISO itp.
2

Mishra, Ajit, John Doyle, and Vinay Deodeshmukh. "Application of a Highly Corrosion-Resistant Nickel-Alloy in the Chemical Industry." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19183.

Pełny tekst źródła
Streszczenie:
Abstract Corrosion-resistant Nickel-alloys containing optimum amounts of chromium (Cr) and molybdenum (Mo) are extensively used in aggressive conditions (like, acidic chloride chemistry) in various industries, including the agrochemical sector. In the similar process conditions, stainless steels which are cheaper alternates to Ni-alloys, can fail from multiple corrosion modes. Among Ni-alloys, one of the commonly used in corrosive media is C-276 (UNS N10276). Despite the versatility of N10276, there has always been a need for alloys with even higher corrosion resistance to acidic chloride solu
Style APA, Harvard, Vancouver, ISO itp.
3

Macha, Erica N., Erin DeCarlo, and James F. Dante. "Development of a Methodology to Predict Atmospheric Corrosion Severity Using Corrosion Sensor Technologies." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13389.

Pełny tekst źródła
Streszczenie:
Abstract The cost of corrosion in the US is estimated to be greater than 3% of the GDP. Much of this cost is associated with maintenance practices related to inspection of structurally critical areas and the treatment or replacement of affected parts. The US Department of Defense is seeking to control these costs by performing corrosion maintenance on an as-needed basis using a Condition Based Maintenance Plus (CBM+) approach. While scheduled maintenance intervals are still required to ensure fleet readiness by reducing unexpected maintenance, a CBM+ approach would provide the basis for select
Style APA, Harvard, Vancouver, ISO itp.
4

Downie, R. L., and O. C. Dias. "Localized U-Bend Attack in 1 ¼ Cr - ½ Mo Reformer Heater Tubes." In CORROSION 1999. NACE International, 1999. https://doi.org/10.5006/c1999-99386.

Pełny tekst źródła
Streszczenie:
Abstract Erosion-corrosion in a very localized section - 6 in (152 mm) x 3 in (76mm) - of two bottom U-bends of a reformer heater led to leakage and subsequent fire damage. The 6.625 in diameter (168 mm) x 0.321 in (8 mm) wall 1¼< Cr - ½ Mo steel tubes were in service for 25 years. The two affected tubes ID’s were in the SE coil section. Visual and metallurgical analyses did not reveal any signs of long term creep damage or overheating. Normal ultrasonic thickness measurements taken during shutdowns did not detect the damage that was located at or just below the refractory interface. Th
Style APA, Harvard, Vancouver, ISO itp.
5

Romano, Peter, Michael Seifert, and Michael Smith. "The 505 Low Vibration Solution." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12028.

Pełny tekst źródła
Streszczenie:
The original 505 Jet Ranger X prototype used a simple hard-mounted focal pylon to attach the transmission to the airframe. In developmental flight tests, the design resulted in 2/rev vibration levels that exceeded program objectives for ride quality in high speed forward flight. To address the vibration levels, a LIVE pylon mount was designed over a 4-month period to serve as a drop-in replacement with minimal impact to existing systems. An overview of the rapid design process is presented with supporting analysis and test data that led to its incorporation on the aircraft. The LIVE pylon desi
Style APA, Harvard, Vancouver, ISO itp.
6

Plumley, A. L., D. J. Hollenbach, and J. F. Henry. "The Protection of Critical Recovery Boiler Components - The Case for Chromizing." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93251.

Pełny tekst źródła
Streszczenie:
Abstract Since the late 1970s, the pulp and paper industry has invested large amounts of time and money to promote the development of effective ways of combatting accelerated corrosion in critical recovery boiler components. Various solutions to this costly problem have been proposed and subsequently tested in both the laboratory and the field. Included among these solutions have been composite tubing (a high alloy outer sheath protecting a low alloy core tube) and both field-applied and shop-applied coatings for the protection of exposed surfaces. At the October, 1988, BLRBAC meeting in Atlan
Style APA, Harvard, Vancouver, ISO itp.
7

Chen, Pengpeng, Yongqiang Yang, Dingqi Yang, Hailong Sun, Zhijun Chen, and Peng Lin. "Black-Box Data Poisoning Attacks on Crowdsourcing." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/332.

Pełny tekst źródła
Streszczenie:
Understanding the vulnerability of label aggregation against data poisoning attacks is key to ensuring data quality in crowdsourced label collection. State-of-the-art attack mechanisms generally assume full knowledge of the aggregation models while failing to consider the flexibility of malicious workers in selecting which instances to label. Such a setup limits the applicability of the attack mechanisms and impedes further improvement of their success rate. This paper introduces a black-box data poisoning attack framework that finds the optimal strategies for instance selection and labeling t
Style APA, Harvard, Vancouver, ISO itp.
8

Tsuda, Takuji, Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio. "Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs." In 2014 15th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2014. http://dx.doi.org/10.1109/mdm.2014.40.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Palese, Joseph W., Allan M. Zarembski, and Kyle Ebersole. "Stochastic Analysis of Transit Wheel Wear and Optimized Forecasting of Wheel Maintenance Requirements." In 2019 Joint Rail Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/jrc2019-1305.

Pełny tekst źródła
Streszczenie:
As transit vehicle wheels accrue mileage, they experience flange and tread wear based on the contact between the railhead and wheel-running surface. When wheels wear excessively, the likelihood of accidents and derailments increases. Thus, regular maintenance is performed on the wheels, until they require replacement. One common maintenance practice is truing; using a specially designed cutting machine to bring a wheel back to an acceptable profile. This process removes metal from the wheel and is often based on wheel flange thickness standards (and sometimes wheel flange angle). Wheel replace
Style APA, Harvard, Vancouver, ISO itp.
10

Tsuda, Takuji, Yuka Komai, Takahiro Hara, and Shojiro Nishio. "Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs." In 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, 2015. http://dx.doi.org/10.1109/srds.2015.34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Data replacement attack"

1

Castro, Rubén, Leonardo González, Ignacio Schiappacasse, and Juan Tapia. The Impact of Covid-19 on Pensions due to Early Withdrawals of Pension Savings. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004517.

Pełny tekst źródła
Streszczenie:
The Chilean pension system was hit hard during 2020-2021 by the withdrawal of 25 per cent of the individual pensions funds accumulated by 2019, an amount equivalent to 20 per cent of Chiles GDP. We estimate here the impact of those withdrawals on new pension allowances, using a combination of official data sets and the IDB model for the actuarial projection of pensions, including its heterogeneity matrix, to simulate the distribution of pension impacts. The withdrawal impact decreases in new retirees of future years until disappearing around the year 2065. We estimate respective impacts of abo
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!