Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "attack"

ADD TO MY LIST
 
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee
The influence of climatic conditions on the main vine diseases in terms of chemicals application

Author(s): Constantin Mihai-Oroian | Ioan Oroian | Liliana Tomoiagă | Maria Comşa | Cristian Iederan
Control of insect pests of cowpea in the savanna of Roraima, Brazil. = Controle de insetos-praga do feijão-caupi na savana de Roraima.

Author(s): Deyse Cristina Oliveira da Silva | José Maria Arcanjo Alves | José de Anchieta Alves de Albuquerque | Antonio Cesar Silva Lima | Maria Edite da Silva Veloso | Luana dos Santos Silva
Risk factors for norovirus outbreaks associated with attack rate and genogroup

Author(s): Jamie Felzer | Jonathan Matthews | Ben Dickey | Rebecca Miller | Brad Dawson | Alice Lee | Jennifer Rocks | Christine Moe | Joe Eisenberg | Juan Leon
Low intensity surface fire instigates movement by Calosoma frigidum (Coleoptera, Carabidae)

Author(s): Jenna Jacobs | Colin Bergeron | Timothy Work | John Spence
Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Author(s): Basappa B. Kodada | Ramesh Nayak | Raghavendra Prabhu | Suresha D
A Dynamic Approach for Anomaly Detection in AODV

Author(s): P.VIGNESHWARAN | R. DHANASEKARAN
Analysis of Radiological Terrorism on Metropolitan Area

Author(s): Hosik Yoo | Jeong-ho Lee | Sung-woo Kwak
CAPTURA DE Tuta absoluta (Meyrick) (LEPIDOPTERA: GELECHIIDAE) COM ARMADILHA LUMINOSA NA CULTURA DO TOMATEIRO TUTORADO CAPTURE OF Tuta absoluta (Meyrick) (LEPIDOPTERA: GELECHIIDAE) WITH LIGHT TRAP IN TOMATO CROP

Author(s): Aline Cavalcante Rodrigues de Oliveira | Valquíria da Rocha Santos Veloso | Rosana Gonçalves Barros | Paulo Marçal Fernandes | Eli Regina Barboza de Souza
8-Hydroxydeoxyguanosine: Not mere biomarker for oxidative stress, but remedy for oxidative stress-implicated gastrointestinal diseases

Author(s): Chan-Young Ock | Eun-Hee Kim | Duck Joo Choi | Ho Jae Lee | Ki-Baik Hahm | Myung Hee Chung
Insulin resistance: Is it time for primary prevention?

Author(s): Valentina Mercurio | Guido Carlomagno | Valeria Fazio | Serafino Fazio
The Offensive Efficiency of the High-Level Handball Players of the Front and the Rear Lines

Author(s): Cherif Moncef | Gomri Dagbaji | Aouidet Abdallah | Said Mohamed
Host Plant Resistance to Phytophthora Pod Rot in Cacao (Theobroma cacao L.): The Role of Epicuticular Wax on Pod and Leaf Surfaces

Author(s): D. Nyadanu | R. Akromah | B. Adomako | C. Kwoseh | H. Dzahini-Obiatey | S.T. Lowor | A.Y. Akrofi | M.K. Assuah
Jigsaw Semantics

Author(s): Paul J. E. Dekker
Ketidakstabilan Gaya dan Interaksi Fluida-Struktur pada Turbin Sumbu Vertikal untuk Pembangkit Energi Arus Laut

Author(s): Ridho Hantoro | I.K.A.P. Utama | Erwandi Erwandi | Aries Sulisetyono
ORALLY DISINTEGRATING TABLET: FRIENDLY DOSAGE FORM

Author(s): Saxena Vaibhav | Khinchi Mahaveer Pr | Gupta M.K. | Agarwal Dilip | Sharma Natasha
RESIDUAL COMPRESSIVE STRENGTH OF FLY ASH BASED GLASS FIBRE REINFORCED HIGH PERFORMANCE CONCRETE SUBJECTED TO ACID ATTACK

Author(s): Dr.H.Sudarsana Rao | Sri. H. M. Somasekharaiah | Dr.Vaishali. G.Ghorpade
FPGA Based Secure System Design-an Overview

Author(s): Gurjit Singh Walia | Gajraj Kuldeep | Rajiv Kapoor | A K Sharma | Navneet Gaba
Controlling IP Spoofing through PACKET Filtering

Author(s): Mridu Sahu | Rainey C. Lal
njcmindia

Author(s): Sheetal Vyas, Sonal Parikh, Rachna Kapoor, Vaibhavi Patel, Anand Solanki
The Effect of Culture Technique on Culture Positivity in Peritoneal Dialysis Patients with Peritonitis

Author(s): Meltem Gürsu | Zeki Aydın | Savaş Öztürk | Filiz Pehlivanoğlu | Gönül Şengöz | Sami Uzun | Serhat Karadağ | Emel Tatlı | Rümeyza Kazancıoğlu
njcmindia

Author(s): Sheetal Vyas, Sonal Parikh, Rachna Kapoor, Vaibhavi Patel, Anand Solanki
Session Fixation Vulnerability in Web-Based Application

Author(s): A.P. Jadhav | A.P. Jadhav | Vaibhav B. Lohkare | Bhagyashri R.Deulkar
Acute Rheumatic fever

Author(s): Velayati AA
The Case Report of a Survival from Ekiri Syndrome

Author(s): Seyed Mehdi Monajemzadeh; Sheedeh Assar; Ali Akbar Momen
Is There Any Association between Spina bifida occulta and Primary Vesicoureteral Reflux?

Author(s): Mehrzad Mehdizadeh | Azadeh Roohi | Mohsen Hemami | Seyed-Taher Esfahani
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
Acute Hemorrhagic Edema of Infancy; a Report of Five Iranian Infants and Review of the Literature

Author(s): Mohammad-Hassan Moradinejad | Pegah Entezari | Fatemeh Mahjoub | Vahid Ziaee
Security Risks in IP Telephony

Author(s): Filip Rezac | Miroslav Voznak
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

Author(s): Filip Rezac | Miroslav Voznak | Karel Tomala | Jan Rozhon | Jiri Vychodil
Total Loss of MHC Class I is an Independent Indicator of Good Prognosis in Breast Cancer

Author(s): Z Madjd | I Spendlove | IO Ellis | SE Pinder | LG Durrant


Author(s): Sheetal Vyas, Sonal Parikh, Rachna Kapoor, Vaibhavi Patel, Anand Solanki
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
ATTACK VECTORS USED IN FRAUDULENCE CONNECTION DURING ONLINE TRANSACTIONS

Author(s): PRADEEP PUNDIR AND VIRENDRA GOMANSE
CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK

Author(s): N.Ugtakhbayar | D.Battulga | Sh.Sodbileg
A study of anatomical, seasonal and diurnal variation in the occurrence of ischemic stroke

Author(s): Divyanshu Dubey | Anshudha Sawhney | Arvind Kavishwar | Sonjjay Pande | Devashish Dubey
Changing ideas about the evolution and functional morphology of Machairodontine felids

Author(s): Turner, A. | Antón, M. | Salesa, M. J. | Morales, J.
Data on Lontra longicaudis (Carnivora: Mustelidae) Mortality in Southeast and Southern Brazil

Author(s): Fernando Marques Quintela | Fabiano Aguiar da Silva | Clodoaldo Lopes de Assis | Vanessa Cardoso Antunes
SECURING WMN USING HONEYPOT TECHNIQUE

Author(s): Priyanka Gupta | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
Shoulder Dislocation and Non Displaced Humerus Head Fracture Due to Epileptic Attack

Author(s): Ali Aydın | Ayhan Aköz | Atıf Bayramoğlu | Mustafa Uzkeser | Hüseyin Şahin | Zeynep Gökcan Çakır
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Biodeterioration of products made from australian cedar (Toona ciliata M. Roem. var. australis)

Author(s): Natália Amarante Almeida | Lourival Marin Mendes | Esmeralda Yoshico Arakaki Okino | Alencar Garlet | Fábio Akira Mori | Rafael Farinassi Mendes
STUDIES OF DURABILITY ASPECTS OF FIBRE REINFORCED CONCRETE

Author(s): D. MARUTHACHALAM | RAGHUNATHAPANDIAN | B.G. VISHNURAM
Match Analysis in a University Taekwondo Championship

Author(s): José Luis Bermejo | Isaac Estevan | Cristina Menescardi | Coral Falco | Raul Landeo
Match Analysis in a University Taekwondo Championship

Author(s): José Luis Bermejo | Isaac Estevan | Cristina Menescardi | Coral Falco | Raul Landeo
2-(3-Aminopyridinium-1-yl)-3-carboxypropanoate monohydrate

Author(s): Guadalupe Millán Corrales | David Morales-Morales | Simón Hernández-Ortega | José J. Campos-Gaxiola | Adriana Cruz Enríquez
EVALUATION OF THE FLOW ACCELERATED CORROSION OF COPPER PIPES

Author(s): Tatiana Liptáková | Pavol Fajnor | Alexander Dodek
Gas phase formation of extremely oxidized pinene reaction products in chamber and ambient air

Author(s): M. Ehn | E. Kleist | H. Junninen | T. Petäjä | G. Lönn | S. Schobesberger | M. Dal Maso | A. Trimborn | M. Kulmala | D. R. Worsnop | A. Wahner | J. Wildt | Th. F. Mentel
Secure And Reliable Routing In Mobile Adhoc Networks

Author(s): Rachid Haboub | Mohammed Ouzzif
Antistreptolysin O titer in health and disease: levels and significance

Author(s): Alyaa Amal Kotby | Nevin Mamdouh Habeeb | Sahar Ezz El Arab
Epidemiology, electrolytes balance and treatment strategy of equine anhidrosis

Author(s): Arshad Zahoor, | Muhammad Nauman Manzoor, | Abdul Raheem Usama, | Abdullah Ahmad, | Sajid ur Rehman | Rifat Ullah Khan
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
An Approach to Increase Bandwidth Utilization under Suspected Flood Attack

Author(s): Raman Singh | Harish Kumar | R.K. Singla
Honeysand: An Open Source Tools based Sandbox Environment for Bot Analysis and Botnet Tracking

Author(s): Saurabh Chamotra | Rakesh Kumar Sehgal | Raj Kamal
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
NUMERICAL ANALYSIS OF HELICOPTER ROTOR AT 400 RPM

Author(s): K.M. Pandey | A. Surana | D. Deka
CFD Analysis of Flow through Compressor Cascade

Author(s): K.M.Pandey | S.Chakraborty | K.Deb
Why do you need a reservation system?      Save time & money - Smart Internet Solutions