Статті в журналах з теми "Attack and defence"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Attack and defence".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Повний текст джерелаK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Повний текст джерелаSiame, Richard. "Pre-emptive Use of Force in Self-Defence Under International Law." East African Journal of Law and Ethics 8, no. 1 (2025): 1–13. https://doi.org/10.37284/eajle.8.1.2580.
Повний текст джерелаGao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (2023): 2266. http://dx.doi.org/10.3390/s23042266.
Повний текст джерелаKUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.
Повний текст джерелаAsabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.
Повний текст джерелаJurica, Karlo, Josip Vrdoljak, and Irena Brčić Karačonji. "Food defence systems as an answer to food terrorism." Archives of Industrial Hygiene and Toxicology 70, no. 4 (2019): 232–55. http://dx.doi.org/10.2478/aiht-2019-70-3357.
Повний текст джерелаAkintola, A. S. "Integrating Research Testbeds, Attack Mechanisms, and Defence Strategies into a Holistic Framework for Cybersecurity." Journal of Computer Science Review and Engineering 8, no. 2 (2024): 1–12. https://doi.org/10.5281/zenodo.14543273.
Повний текст джерелаLi, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.
Повний текст джерелаLi, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.
Повний текст джерелаCharreire, J., and C. Bedin. "Hypothesis: Autoimmunity: Attack or Defence?" Autoimmunity 3, no. 1 (1989): 75–79. http://dx.doi.org/10.3109/08916938909043615.
Повний текст джерелаGat, Azar. "Clausewitz on defence and attack." Journal of Strategic Studies 11, no. 1 (1988): 20–26. http://dx.doi.org/10.1080/01402398808437327.
Повний текст джерелаFordham, J. "Sham trusts: attack and defence." Trusts & Trustees 11, no. 8 (2005): 19–22. http://dx.doi.org/10.1093/tandt/11.8.19.
Повний текст джерелаLi, Zhe, Jin Liu, Yibo Dong, Jiaqi Ren, and Weili Li. "Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks." Entropy 25, no. 11 (2023): 1558. http://dx.doi.org/10.3390/e25111558.
Повний текст джерелаHaroon, Muhammad Shahzad, and Husnain Mansoor Ali. "Ensemble adversarial training based defense against adversarial attacks for machine learning-based intrusion detection system." Neural Network World 33, no. 5 (2023): 317–36. http://dx.doi.org/10.14311/nnw.2023.33.018.
Повний текст джерелаSkelhorn, John, and Candy Rowe. "Frequency-dependent taste-rejection by avian predation may select for defence chemical polymorphisms in aposematic prey." Biology Letters 1, no. 4 (2005): 500–503. http://dx.doi.org/10.1098/rsbl.2005.0359.
Повний текст джерелаYao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.
Повний текст джерелаU., Sakthivelu, and Vinoth Kumar C.N.S. "Defence Mechanism against Advanced Persistent Threat Attack Using Significant Features based Deep Learning Model." Journal of Internet Services and Information Security 14, no. 4 (2024): 263–77. https://doi.org/10.58346/jisis.2024.i4.016.
Повний текст джерелаAbimbola, Olamide, and Olayinka Oduola Idris. "A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review." Path of Science 11, no. 3 (2025): 4009. https://doi.org/10.22178/pos.115-11.
Повний текст джерелаPatel, Raj Kumar, Dr Lalan Kumar Singh, and Dr Narendra Kumar. "Literature Review of Distributed: Denial of Service Attack Protection." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1032–36. http://dx.doi.org/10.22214/ijraset.2023.48673.
Повний текст джерелаWu, Di, Xiangbin Yan, Rui Peng, and Shaomin Wu. "Optimal defence-attack strategies between one defender and two attackers." Journal of the Operational Research Society 71, no. 11 (2019): 1830–46. http://dx.doi.org/10.1080/01605682.2019.1630332.
Повний текст джерелаTaylor, Sean Joe, Farhan Ahmad, Hoang Nga Nguyen, and Siraj Ahmed Shaikh. "Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges." Sensors 23, no. 1 (2022): 134. http://dx.doi.org/10.3390/s23010134.
Повний текст джерелаDe Dreu, Carsten K. W., Ruthie Pliskin, Michael Rojek-Giffin, Zsombor Méder, and Jörg Gross. "Political games of attack and defence." Philosophical Transactions of the Royal Society B: Biological Sciences 376, no. 1822 (2021): 20200135. http://dx.doi.org/10.1098/rstb.2020.0135.
Повний текст джерелаOwen, Denis F. "The Language of Attack and Defence." Oikos 57, no. 1 (1990): 133. http://dx.doi.org/10.2307/3565746.
Повний текст джерелаGoyal, S., and A. Vigier. "Attack, Defence, and Contagion in Networks." Review of Economic Studies 81, no. 4 (2014): 1518–42. http://dx.doi.org/10.1093/restud/rdu013.
Повний текст джерелаRepel, Dusan, and Ingo Stengel. "Grammar-based transformations: attack and defence." Information Management & Computer Security 22, no. 2 (2014): 141–54. http://dx.doi.org/10.1108/imcs-09-2013-0071.
Повний текст джерелаSudhakaran, Pradeep, Manikannan Kaliyaperumal, T. Senthilkumar, R. Jeya, and B. Sowmiya. "Hierarchical and On-Demand Attack Defence Framework for IoT Devices." Wireless Communications and Mobile Computing 2022 (April 26, 2022): 1–8. http://dx.doi.org/10.1155/2022/4335871.
Повний текст джерелаLehmanski, Linda M. A., Lara M. Kösters, Jianbei Huang, Martin Göbel, Jonathan Gershenzon, and Henrik Hartmann. "Windthrow causes declines in carbohydrate and phenolic concentrations and increased monoterpene emission in Norway spruce." PLOS ONE 19, no. 5 (2024): e0302714. http://dx.doi.org/10.1371/journal.pone.0302714.
Повний текст джерелаPELTONEN, S. "Induced defence responses of cereals to pathogen attack." Agricultural and Food Science 8, no. 4-5 (1999): 479–92. http://dx.doi.org/10.23986/afsci.5642.
Повний текст джерелаAdepu, Pavan Kumar. "Adversarial Robustness in Generative AI: Defending Against Malicious Model Inversions and Deepfake Attacks." International Journal of Management Technology 13, no. 4 (2025): 27–43. https://doi.org/10.37745/ijmt.2013/vol13n42743.
Повний текст джерелаSharipuddin, Sharipuddin, and Eko Arip Winanto. "Defence against adversarial attacks on IoT detection systems using deep belief network." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 1073. http://dx.doi.org/10.11591/ijeecs.v35.i2.pp1073-1081.
Повний текст джерелаSharipuddin, Sharipuddin Eko Arip Winanto. "Defence against adversarial attacks on IoT detection systems using deep belief network." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 2 (2024): 1073–81. https://doi.org/10.11591/ijeecs.v35.i2.pp1073-1081.
Повний текст джерелаMahmood, Alaa Mohammed, and İsa Avcı. "Cybersecurity Defence Mechanism Against DDoS Attack with Explainability." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 278–90. https://doi.org/10.58496/mjcs/2024/027.
Повний текст джерелаYe, Shunyao. "Research on the Right of Self-Defence from the Perspective of International Law." Lecture Notes in Education Psychology and Public Media 5, no. 1 (2023): 844–52. http://dx.doi.org/10.54254/2753-7048/5/2022994.
Повний текст джерелаKane, Marie. "‘Knowing (and Not Knowing) One's Place’, Organisational Ranking and the Operation of Envy and Shame in Organisational Life." Organisational and Social Dynamics 12, no. 2 (2012): 194–209. http://dx.doi.org/10.33212/osd.v12n2.2012.194.
Повний текст джерелаAkande, Dapo, and Antonios Tzanakopoulos. "Legal: Use of Force in Self-Defence to Recover Occupied Territory." European Journal of International Law 32, no. 4 (2021): 1299–307. http://dx.doi.org/10.1093/ejil/chab109.
Повний текст джерелаHodder, Ryan W., Will G. Hopkins, Kevin A. Ball, Jamie Bahnisch, and Fabio R. Serpiello. "Exploration of collective tactical variables in elite netball: An analysis of team and sub-group positioning behaviours." PLOS ONE 19, no. 2 (2024): e0295787. http://dx.doi.org/10.1371/journal.pone.0295787.
Повний текст джерелаStamm, Raini, Meelis Stamm, Doris Torilo, Kaivo Thomson, and Alexander Jairus. "Comparative analysis of the elements of attack and defence in men’s and women’s games in the Estonian volleyball highest league." Papers on Anthropology 25, no. 1 (2016): 37. http://dx.doi.org/10.12697/poa.2016.25.1.04.
Повний текст джерелаHills, Samuel P., Erwan Izri, Daniel Howells, Ben Lonergan, Liam P. Kilduff, and Mark Waldron. "Assessing the locomotor demands of international men’s and women’s rugby sevens match-play according to passage of play." PLOS ONE 19, no. 6 (2024): e0304186. http://dx.doi.org/10.1371/journal.pone.0304186.
Повний текст джерелаJermy, Andrew. "Attack is the best form of defence." Nature Reviews Microbiology 10, no. 5 (2012): 311. http://dx.doi.org/10.1038/nrmicro2782.
Повний текст джерелаNarayan, Arpita, and Upendra Kumar. "A Defence Mechanism: DNS based DDoS Attack." International Journal of Computer Trends and Technology 33, no. 1 (2016): 1–8. http://dx.doi.org/10.14445/22312803/ijctt-v33p101.
Повний текст джерелаCohen, Fred. "Managing network security: Attack and defence strategies." Network Security 1999, no. 7 (1999): 7–11. http://dx.doi.org/10.1016/s1353-4858(00)80012-4.
Повний текст джерелаShah, Jyoti. "Plants under attack: systemic signals in defence." Current Opinion in Plant Biology 12, no. 4 (2009): 459–64. http://dx.doi.org/10.1016/j.pbi.2009.05.011.
Повний текст джерелаShende, Sumer. "Crossfire DoS Attack and its Defence Mechanism." International Journal of Computer Applications 132, no. 3 (2015): 9–11. http://dx.doi.org/10.5120/ijca2015907313.
Повний текст джерелаHausken, Kjell. "Defence and attack of complex interdependent systems." Journal of the Operational Research Society 70, no. 3 (2018): 364–76. http://dx.doi.org/10.1080/01605682.2018.1438763.
Повний текст джерелаYing, Fei, Shengjie Zhao, and Hao Deng. "Microservice Security Framework for IoT by Mimic Defense Mechanism." Sensors 22, no. 6 (2022): 2418. http://dx.doi.org/10.3390/s22062418.
Повний текст джерелаMartin, Kathy. "Herring gulls prey upon female willow ptarmigan." Canadian Journal of Zoology 63, no. 4 (1985): 984–85. http://dx.doi.org/10.1139/z85-146.
Повний текст джерелаVAN STEENBERGHE, RAPHAËL. "Self-Defence in Response to Attacks by Non-state Actors in the Light of Recent State Practice: A Step Forward?" Leiden Journal of International Law 23, no. 1 (2010): 183–208. http://dx.doi.org/10.1017/s0922156509990380.
Повний текст джерелаValverde Jiménez, Beatriz. "The Ethics of Facing Western Notions in Graham Greene’s A Burnt-Out Case." Interlitteraria 23, no. 1 (2018): 110–23. http://dx.doi.org/10.12697/il.2018.23.1.12.
Повний текст джерелаGürfidan, Remzi. "INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES." Mühendislik Bilimleri ve Tasarım Dergisi 12, no. 2 (2024): 416–29. http://dx.doi.org/10.21923/jesd.1458955.
Повний текст джерела