Gotowa bibliografia na temat „Prediction of attacks in wild”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Prediction of attacks in wild”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Prediction of attacks in wild"
Bilen, Abdulkadir, and Ahmet Bedri Özer. "Cyber-attack method and perpetrator prediction using machine learning algorithms." PeerJ Computer Science 7 (April 9, 2021): e475. http://dx.doi.org/10.7717/peerj-cs.475.
Pełny tekst źródłaSiswanto, Joko, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Number of Cyber Attacks Predicted With Deep Learning Based LSTM Model." JUITA : Jurnal Informatika 12, no. 1 (2024): 39. http://dx.doi.org/10.30595/juita.v12i1.20210.
Pełny tekst źródłaZuzcák, Matej, and Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks." Computer Science and Information Systems, no. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Pełny tekst źródłaKadiri, Padmaja, and Seshadri Ravala. "Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks." International Journal of e-Collaboration 17, no. 4 (2021): 75–88. http://dx.doi.org/10.4018/ijec.2021100106.
Pełny tekst źródłaLi, Zhong, Xianke Wu, and Changjun Jiang. "Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems." Security and Safety 1 (2022): 2022003. http://dx.doi.org/10.1051/sands/2022003.
Pełny tekst źródłaRuda, Aleš, Jaromír Kolejka, and Thakur Silwal. "GIS-Assisted Prediction and Risk Zonation of Wildlife Attacks in the Chitwan National Park in Nepal." ISPRS International Journal of Geo-Information 7, no. 9 (2018): 369. http://dx.doi.org/10.3390/ijgi7090369.
Pełny tekst źródłaYuan, Guotao, Hong Huang, and Xin Li. "Self-supervised learning backdoor defense mixed with self-attention mechanism." Journal of Computing and Electronic Information Management 12, no. 2 (2024): 81–88. http://dx.doi.org/10.54097/7hx9afkw.
Pełny tekst źródłaHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Pełny tekst źródłaTibble, Holly, Athanasios Tsanas, Elsie Horne, et al. "Predicting asthma attacks in primary care: protocol for developing a machine learning-based prediction model." BMJ Open 9, no. 7 (2019): e028375. http://dx.doi.org/10.1136/bmjopen-2018-028375.
Pełny tekst źródłaGazzan, Mazen, and Frederick T. Sheldon. "Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems." Future Internet 15, no. 4 (2023): 144. http://dx.doi.org/10.3390/fi15040144.
Pełny tekst źródłaRozprawy doktorskie na temat "Prediction of attacks in wild"
Yermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.
Pełny tekst źródłaArthur, Jacob D. "Enhanced Prediction of Network Attacks Using Incomplete Data." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1020.
Pełny tekst źródłaHarshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.
Pełny tekst źródłaNuñez, del Prado Cortez Miguel. "Inference attacks on geolocated data." Thesis, Toulouse, INSA, 2013. http://www.theses.fr/2013ISAT0028/document.
Pełny tekst źródłaFedderwitz, Frauke. "Protecting dogs against attacks by wolves (Canis lupus), with comparison to African wild dogs (Lycaon pictus) and dholes (Cuon alpinus)." Thesis, Linköpings universitet, Institutionen för fysik, kemi och biologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-56817.
Pełny tekst źródłaLuke, Mark Elden. "Predicting Drag Polars For Micro Air Vehicles." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd297.pdf.
Pełny tekst źródłaBourgeois, Luc. "ACCase inhibitor resistant wild oat in Manitoba : prediction, identification, and characterization." 1997. http://hdl.handle.net/1993/7393.
Pełny tekst źródłaChao, Jenny C. "Attachment style, anxiety sensitivity and personality in the prediction of panic attacks : response to a symptom-provocation test." 2004. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=94843&T=F.
Pełny tekst źródłaJiang, Jun. "Detection of network anomalies and novel attacks in the internet via statistical network traffic separation and normality prediction." Thesis, 2005. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2005-027.
Pełny tekst źródłaGonçalves, Hélia Marisa do Vale. "Analysis and prediction of the occurrence of leptospirosis in wild boars (Sus scrofa Linnaeus, 1758) of the Trás-os-Montes Region." Master's thesis, 2016. http://hdl.handle.net/10348/5395.
Pełny tekst źródłaKsiążki na temat "Prediction of attacks in wild"
C, Jorgensen Charles, Ross James C, and Ames Research Center, eds. Neural network prediction of new aircraft design coefficients. National Aeronautics and Space Administration, Ames Research Center, 1997.
Znajdź pełny tekst źródłaCampbell, Doug. The Campbell prediction system: A wild land fire prediction system and language. s.n., 1993.
Znajdź pełny tekst źródłaCampbell, Doug. The Campbell prediction system: A wild land fire prediction and communication system. D. Campbell, 1991.
Znajdź pełny tekst źródłaUnited States. National Aeronautics and Space Administration., ed. Prediction of wind tunnel effects on the installed F/A-18A inlet flow field at high angles-of-attack. National Aeronautics and Space Administration, 1995.
Znajdź pełny tekst źródłaUnited States. National Aeronautics and Space Administration., ed. Aerothermodynamic measurement and prediction for modified orbiter at Mach 6 and 10. American Institute of Aeronautics and Astronautics, 1995.
Znajdź pełny tekst źródłaCopyright Paperback Collection (Library of Congress), ed. Trailsman 329: Bayou Trackdown. Signet, 2009.
Znajdź pełny tekst źródłaVaillant, John. The tiger: A true story of vengeance and survival. Vintage Books, 2011.
Znajdź pełny tekst źródłaVaillant, John. Le tigre: Une histoire de survie dans la taïga : récit. Libretto, 2013.
Znajdź pełny tekst źródłaVaillant, John. The tiger: A true story of vengeance and survival. Alfred A. Knopf, 2010.
Znajdź pełny tekst źródłaCzęści książek na temat "Prediction of attacks in wild"
Rebeiro, Chester, Debdeep Mukhopadhyay, and Sarani Bhattacharya. "Branch Prediction Attacks." In Timing Channels in Cryptography. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12370-7_9.
Pełny tekst źródłaRyckelynck, David, Fabien Casenave, and Nissrine Akkari. "Error Estimation." In Manifold Learning. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-52764-7_3.
Pełny tekst źródłaVovk, Vladimir. "Competing with Wild Prediction Rules." In Learning Theory. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11776420_41.
Pełny tekst źródłaCao, Yulong, Chaowei Xiao, Anima Anandkumar, Danfei Xu, and Marco Pavone. "AdvDO: Realistic Adversarial Attacks for Trajectory Prediction." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20065-6_3.
Pełny tekst źródłaAakaash, N., K. Akshaya Bala, Veerabrahmam Pranathi, and Meenakshi S. Arya. "Prediction of Network Attacks Using Connection Behavior." In Machine Learning for Predictive Analysis. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7106-0_30.
Pełny tekst źródłaChen, Jinyin, Ximin Zhang, and Haibin Zheng. "Backdoor Attack on Dynamic Link Prediction." In Attacks, Defenses and Testing for Deep Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0425-5_7.
Pełny tekst źródłaAbusnaina, Ahmed, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, and David Mohaisen. "Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks." In Information Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_27.
Pełny tekst źródłaArumugam, Chamundeswari, Varsha Bhargavi Dwarakanathan, S. Gnanamary, et al. "Prediction of SQL Injection Attacks in Web Applications." In Computational Science and Its Applications – ICCSA 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24305-0_37.
Pełny tekst źródłaLiu, Mingqian, and Hongyi Zhang. "Poisoning Attacks on Deep Learning Based Spectrum Prediction." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-97-7770-9_31.
Pełny tekst źródłaSubramani, Karthika, Roberto Perdisci, and Maria Konte. "Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Prediction of attacks in wild"
Yang, Tianming, Runhai Jiao, Junqiang Wei, and Xuejie Wu. "A Markov Matrix Based Method for Prediction Direction in Wind Power Forecasting Attacks." In 2024 6th International Conference on Energy, Power and Grid (ICEPG). IEEE, 2024. https://doi.org/10.1109/icepg63230.2024.10775482.
Pełny tekst źródłaNguyen, Hoang Dai, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, and Phani Vadrevu. "C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00200.
Pełny tekst źródłaTan, Yicong, Xinyue Shen, Yun Shen, Michael Backes, and Yang Zhang. "On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00120.
Pełny tekst źródłaSaiganesh, Marati, Kiran L. N. Eranki, Mahankali Koushik, and Peddi Shashi Preetham. "Prediction of Intrusion Attacks Using Machine Learning Approach." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10717035.
Pełny tekst źródłaZhang, Zifan, Minghong Fang, Jiayuan Huang, and Yuchen Liu. "Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction." In 2024 IFIP Networking Conference (IFIP Networking). IEEE, 2024. http://dx.doi.org/10.23919/ifipnetworking62109.2024.10619763.
Pełny tekst źródłaAlemerien, Khalid, Sadeq Al-Suhemat, Fadi Alsuhimat, and Enshirah Altarawneh. "Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks." In 2024 14th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2024. http://dx.doi.org/10.1109/acit62333.2024.10712474.
Pełny tekst źródłaAl-Turk, Aynoor, Kasim M. Al-Aubidy, and Mustafa A. Al-Khawaldeh. "Prediction of Asthma Attacks Using ANFIS and Mobile Technologies." In 2024 17th International Conference on Development in eSystem Engineering (DeSE). IEEE, 2024. https://doi.org/10.1109/dese63988.2024.10912035.
Pełny tekst źródłaAl-Turk, Aynoor, Kasim M. Al-Aubidy, and Mustafa A. Al-Khawaldeh. "Prediction of Asthma Attacks Using ANFIS and Mobile Technologies." In 2024 17th International Conference on Development in eSystem Engineering (DeSE). IEEE, 2024. https://doi.org/10.1109/dese63988.2024.10911899.
Pełny tekst źródłaSubrmanian, Kayalvizhi, Gunasekar Thangarasu, Zhao Yanyan, and K. Nattar Kannan. "Enhancing Detection and Prediction of DDoS Attacks Through Regression Modeling." In 2024 IEEE 6th Symposium on Computers & Informatics (ISCI). IEEE, 2024. http://dx.doi.org/10.1109/isci62787.2024.10668039.
Pełny tekst źródłaFaradilla, Arnes, and Taufik Djatna. "The Prevention Stroke for High-Risk Patients Using Prediction and Treatment Based on Adaptive Neuro-Fuzzy Inference System (ANFIS)." In 14th International Seminar on Industrial Engineering and Management. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-qk2n23.
Pełny tekst źródłaRaporty organizacyjne na temat "Prediction of attacks in wild"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Pełny tekst źródłaHatada, Mitsuhiro, and Matthew Scholl. An Empirical Study on Flow-based Botnet Attacks Prediction. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.tn.2111.
Pełny tekst źródłaGranot, David, Richard Amasino, and Avner Silber. Mutual effects of hexose phosphorylation enzymes and phosphorous on plant development. United States Department of Agriculture, 2006. http://dx.doi.org/10.32747/2006.7587223.bard.
Pełny tekst źródłaFagúndez, Jaime, Laura Lagos, José Antonio Cortés Vázquez, and Flávia Canastra. Galician Wild Ponies. Socio-Economic Context and Environmental Benefits: Galicia Area Report and Case Study for GrazeLIFE (LIFE18 PRE NL 002). Publishing Service-University of A Coruña, 2022. http://dx.doi.org/10.17979/spudc.9788497498234.
Pełny tekst źródłaFagúndez, Jaime, Laura Lagos, José Antonio Cortés Vázquez, and Flávia Canastra. Galician Wild Ponies. Socio-Economic Context and Environmental Benefits: Galicia Area Report and Case Study for GrazeLIFE (LIFE18 PRE NL 002). Publishing Service-University of A Coruña, 2022. http://dx.doi.org/10.17979/spudc.9788497498241.
Pełny tekst źródłaGriswold, Jim. Monitoring and Evaluation of Smolt Migration in the Columbia Basin, Volume XIV; Evaluation of 2006 Prediction of the Run-Timing of Wild and Hatchery-Reared Salmon and Steelhead at Rock Island, Lower Granite, McNary, John Day and Bonneville Dams using Program Real Time, Technical Report 2006. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/963283.
Pełny tekst źródła