Search Results - ROGUE, P~

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Elizabethan rogues and vagabonds / by F. Aydelotte. by Aydelotte, F.

    Published 1967
    Book
  2. 2

    The rogue's comedy : a play in three acts. by Jones, Henry Arthur, 1851-1929

    Published 1898
    Book
  3. 3

    Harlequin Phoenix : of The rise and fall of a Bergamask rogue / by T. Niklaus. by Niklaus, T.

    Published 1956
    Book
  4. 4

    Rogue waves in multiphase solutions of the focusing nonlinear Schrödinger equation by Marco Bertola, Gennady El, Alexander Tovbis

    Published 2016
    “…A generalised rogue wave notion then naturally enters as a large amplitude localised coherent structure occurring within a finite-band fNLS solution. …”
    Get full text
    Default Article
  5. 5
  6. 6

    Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks by Kostas Kyriakopoulos, Francisco Aparicio-Navarro

    Published 2017
    “…Three main types of attacks have been launched using publicly available tools:1) Man-In-The-Middle at the Physical Layer attack - using Airpwn tool2) De-authentication Attack Using Aircrack-ng3) Rogue Access Point (AP) attackSee attached description PDF file for further details. …”
    Get full text
    Data Data
  7. 7

    Inverse scattering transform analysis of rogue waves using local periodization procedure by Stephane Randoux, Pierre Suret, Gennady El

    Published 2016
    “…The determination of exact analytic solutions of the focusing 1D-NLSE prototyping RW events of statistical relevance is now considered as the problem of central importance. …”
    Get full text
    Default Article
  8. 8

    Dam break problem for the focusing nonlinear Schrodinger equation and the generation of rogue waves by Gennady El, E.G. Khamis, Alexander Tovbis

    Published 2016
    “…We propose a novel, analytically tractable, scenario of the rogue wave formation in the framework of the small-dispersion focusing nonlinear Schrodinger (NLS) equation with the initial condition in the form of a rectangular barrier (a \box"). …”
    Get full text
    Default Article
  9. 9

    On the origin of heavy-tail statistics in equations of the Nonlinear Schrodinger type by Miguel Onorato, Davide Proment, Gennady El, Stephane Randoux, Pierre Suret

    Published 2016
    “…Extensive numerical simulations in 1D+1 and 2D+1 are also performed to confirm the results.…”
    Get full text
    Default Article
  10. 10
  11. 11

    Catalogue of extreme wave events in Ireland: revised and updated for 14680 BP - 2017 by L. O'Brien, Emiliano Renzi, John M. Dudley, Colm Clancy, F. Dias

    Published 2018
    “…This paper updates the O’Brien et al. (2013) catalogue to include events up to the end of 2016. …”
    Get full text
    Default Article
  12. 12

    A basic probability assignment methodology for unsupervised wireless intrusion detection by Ibrahim Ghafir, Kostas Kyriakopoulos, Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil AsSadhan, Hamad BinSalleeh

    Published 2018
    “…The proposed methodology provides 100% True Positive Rate (TPR) and 4.23% False Positive Rate (FPR) for the MitM attack, and 100% TPR and 2.44% FPR for the deauthentication attack, which confirm the efficiency of the dynamic BPA generation methodology.…”
    Get full text
    Default Article