Search Results - ROGUE, P~
-
1
-
2
-
3
-
4
Rogue waves in multiphase solutions of the focusing nonlinear Schrödinger equation
Published 2016“…A generalised rogue wave notion then naturally enters as a large amplitude localised coherent structure occurring within a finite-band fNLS solution. …”
Get full text
Default Article -
5
Rogue waves in integrable turbulence: semi-classical theory and fast measurements
Published 2017Get full text
Default Book chapter -
6
Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks
Published 2017“…Three main types of attacks have been launched using publicly available tools:1) Man-In-The-Middle at the Physical Layer attack - using Airpwn tool2) De-authentication Attack Using Aircrack-ng3) Rogue Access Point (AP) attackSee attached description PDF file for further details. …”
Get full text
Data Data -
7
Inverse scattering transform analysis of rogue waves using local periodization procedure
Published 2016“…The determination of exact analytic solutions of the focusing 1D-NLSE prototyping RW events of statistical relevance is now considered as the problem of central importance. …”
Get full text
Default Article -
8
Dam break problem for the focusing nonlinear Schrodinger equation and the generation of rogue waves
Published 2016“…We propose a novel, analytically tractable, scenario of the rogue wave formation in the framework of the small-dispersion focusing nonlinear Schrodinger (NLS) equation with the initial condition in the form of a rectangular barrier (a \box"). …”
Get full text
Default Article -
9
On the origin of heavy-tail statistics in equations of the Nonlinear Schrodinger type
Published 2016“…Extensive numerical simulations in 1D+1 and 2D+1 are also performed to confirm the results.…”
Get full text
Default Article -
10
Detecting misbehaviour in WiFi using multi-layer metric data fusion
Published 2013Subjects: Get full text
Default Conference proceeding -
11
Catalogue of extreme wave events in Ireland: revised and updated for 14680 BP - 2017
Published 2018“…This paper updates the O’Brien et al. (2013) catalogue to include events up to the end of 2016. …”
Get full text
Default Article -
12
A basic probability assignment methodology for unsupervised wireless intrusion detection
Published 2018“…The proposed methodology provides 100% True Positive Rate (TPR) and 4.23% False Positive Rate (FPR) for the MitM attack, and 100% TPR and 2.44% FPR for the deauthentication attack, which confirm the efficiency of the dynamic BPA generation methodology.…”
Get full text
Default Article