Gotowa bibliografia na temat „Data replacement attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Data replacement attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Data replacement attack"
Ganesh, Dagadu Puri, and Haritha D. "Framework to Avoid Similarity Attack in Big Streaming Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2920–25. https://doi.org/10.11591/ijece.v8i5.pp2920-2925.
Pełny tekst źródłaGu, Rui, Jian Wang, Benpeng Li, Di Qi, Xiaohu Gao, and Zhiyong Yang. "Experimental Study on Mechanical Properties and Compressive Constitutive Model of Recycled Concrete under Sulfate Attack Considering the Effects of Multiple Factors." Buildings 14, no. 9 (2024): 2761. http://dx.doi.org/10.3390/buildings14092761.
Pełny tekst źródłaSunderi, Pranata, and Tri Nugroho Hargyo. "2FYSH: two-factor authentication you should have for password replacement." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 693–702. https://doi.org/10.12928/TELKOMNIKA.v17i2.9187.
Pełny tekst źródłaWang, Qi, Lin Qiao, and Peng Song. "Effect of Fly Ash and Slag on the Resistance to H2S Attack of Oil Well Cement." Advanced Materials Research 79-82 (August 2009): 71–74. http://dx.doi.org/10.4028/www.scientific.net/amr.79-82.71.
Pełny tekst źródłaXi, Peng, Shaoliang Peng, and Wenjuan Tang. "IBAS:Imperceptible Backdoor Attacks in Split Learning with Limited Information." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 26 (2025): 27715–22. https://doi.org/10.1609/aaai.v39i26.34986.
Pełny tekst źródłaWang, Guilin, Hua Shen, Liquan Chen, Jinguang Han, and Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks." Electronics 12, no. 23 (2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Pełny tekst źródłaFu, Xiaopeng, Zhaoquan Gu, Weihong Han, Yaguan Qian, and Bin Wang. "Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks." Wireless Communications and Mobile Computing 2021 (September 27, 2021): 1–9. http://dx.doi.org/10.1155/2021/9969867.
Pełny tekst źródłaPuri, Ganesh Dagadu, and D. Haritha. "Framework to Avoid Similarity Attack in Big Streaming Dat." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 2920. http://dx.doi.org/10.11591/ijece.v8i5.pp2920-2925.
Pełny tekst źródłaBagui, Sikha S., Dustin Mink, Subhash C. Bagui, and Sakthivel Subramaniam. "Resampling to Classify Rare Attack Tactics in UWF-ZeekData22." Knowledge 4, no. 1 (2024): 96–119. http://dx.doi.org/10.3390/knowledge4010006.
Pełny tekst źródłaPrudhvi, E., and Sujatha Reddy. "A Study on Partial Replacement of Cement using Natural Zeolite." Journal of Physics: Conference Series 2779, no. 1 (2024): 012055. http://dx.doi.org/10.1088/1742-6596/2779/1/012055.
Pełny tekst źródłaRozprawy doktorskie na temat "Data replacement attack"
Erfani, Yousof. "Applications of perceptual sparse representation (Spikegram) for copyright protection of audio signals." Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9859.
Pełny tekst źródłaCzęści książek na temat "Data replacement attack"
Cui, Xu, Ruiqiang Ma, Haoran Yang, and Yanan Guo. "Research on Privacy Preservation and Identification Algorithms for Personal Information Data." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2025. https://doi.org/10.3233/faia250185.
Pełny tekst źródłaRowley-Conwy, Peter. "The Three Age System as Predator: Copenhagen and Lund 1836–1850." In From Genesis to Prehistory. Oxford University Press, 2007. http://dx.doi.org/10.1093/oso/9780199227747.003.0007.
Pełny tekst źródłaPal, Koushik, Goutam Ghosh, and Mahua Bhattacharya. "Biomedical Watermarking." In Biomedical Engineering. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3158-6.ch027.
Pełny tekst źródłaPal, Koushik, Goutam Ghosh, and Mahua Bhattacharya. "Biomedical Watermarking." In Research Developments in Computer Vision and Image Processing. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4558-5.ch012.
Pełny tekst źródłaSivanandan N, Dr. "SMART HELMET USING PICMICRO CONTROLLER." In Futuristic Trends in Electronics & Instrumentation Engineering Volume 3 Book 1. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bdei1p5ch2.
Pełny tekst źródłaVaxevanopoulos, Markos, James Ross, Konstantinos Soukis, Panagiotis Voudouris, and Vasilios Melfos. "Mapping the shafts of Laurion – Contribution to a new geological stratigraphy." In Der Anschnitt, Beihefte. Deutsches Bergbau-Museum Bochum, 2023. https://doi.org/10.46586/dbm.264.390.
Pełny tekst źródłaStreszczenia konferencji na temat "Data replacement attack"
Licina, George J., and George Nekoksa. "Monitoring Biofilm Formation in a Brackish Water Cooled Power Plant Environment." In CORROSION 1997. NACE International, 1997. https://doi.org/10.5006/c1997-97222.
Pełny tekst źródłaMishra, Ajit, John Doyle, and Vinay Deodeshmukh. "Application of a Highly Corrosion-Resistant Nickel-Alloy in the Chemical Industry." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19183.
Pełny tekst źródłaMacha, Erica N., Erin DeCarlo, and James F. Dante. "Development of a Methodology to Predict Atmospheric Corrosion Severity Using Corrosion Sensor Technologies." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13389.
Pełny tekst źródłaDownie, R. L., and O. C. Dias. "Localized U-Bend Attack in 1 ¼ Cr - ½ Mo Reformer Heater Tubes." In CORROSION 1999. NACE International, 1999. https://doi.org/10.5006/c1999-99386.
Pełny tekst źródłaRomano, Peter, Michael Seifert, and Michael Smith. "The 505 Low Vibration Solution." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12028.
Pełny tekst źródłaPlumley, A. L., D. J. Hollenbach, and J. F. Henry. "The Protection of Critical Recovery Boiler Components - The Case for Chromizing." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93251.
Pełny tekst źródłaChen, Pengpeng, Yongqiang Yang, Dingqi Yang, Hailong Sun, Zhijun Chen, and Peng Lin. "Black-Box Data Poisoning Attacks on Crowdsourcing." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/332.
Pełny tekst źródłaTsuda, Takuji, Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio. "Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs." In 2014 15th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2014. http://dx.doi.org/10.1109/mdm.2014.40.
Pełny tekst źródłaPalese, Joseph W., Allan M. Zarembski, and Kyle Ebersole. "Stochastic Analysis of Transit Wheel Wear and Optimized Forecasting of Wheel Maintenance Requirements." In 2019 Joint Rail Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/jrc2019-1305.
Pełny tekst źródłaTsuda, Takuji, Yuka Komai, Takahiro Hara, and Shojiro Nishio. "Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs." In 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). IEEE, 2015. http://dx.doi.org/10.1109/srds.2015.34.
Pełny tekst źródłaRaporty organizacyjne na temat "Data replacement attack"
Castro, Rubén, Leonardo González, Ignacio Schiappacasse, and Juan Tapia. The Impact of Covid-19 on Pensions due to Early Withdrawals of Pension Savings. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004517.
Pełny tekst źródła