• Thumbnail for Trojan wave packet
    In physics, a trojan wave packet is a wave packet that is nonstationary and nonspreading. It is part of an artificially created system that consists of...
    15 KB (1,631 words) - 15:18, 21 November 2024
  • Thumbnail for Trojan (celestial body)
    Lagrange points Tadpole orbit Trojan wave packet Robutel, Philippe; Souchay, Jean (2010). "An introduction to the dynamics of trojan asteroids". In Dvorak, Rudolf;...
    15 KB (1,480 words) - 17:04, 9 April 2025
  • Thumbnail for Wave
    Rayleigh wave, surface acoustic waves that travel on solids Spin wave, in magnetism Spin density wave, in solid materials Trojan wave packet, in particle...
    61 KB (7,810 words) - 05:56, 1 April 2025
  • Thumbnail for Quantum revival
    till it will fully revive. Especially once created by fields the Trojan wave packet in a hydrogen atom exists without any external fields stroboscopically...
    7 KB (1,039 words) - 20:31, 9 December 2023
  • Thumbnail for Superradiant phase transition
    system is mathematically equivalent for one mode of excitation to the Trojan wave packet, when the circularly polarized field intensity corresponds to the...
    16 KB (2,436 words) - 02:41, 5 February 2025
  • This is a list of wave topics. Contents:  Top 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z...
    11 KB (37 words) - 22:14, 6 March 2025
  • deuterium separation using Trojan wavepackets in circularly polarized electromagnetic field. The process of Trojan wave packet formation by the adiabatic-rapid...
    32 KB (4,305 words) - 20:28, 1 April 2025
  • Thumbnail for Quantum dot
    single-photon source Quantum point contact Shuming Nie Superatom Trojan wave packet Uri Banin Djordjevic, Ivan (2012), "Physical Implementations of Quantum...
    117 KB (13,793 words) - 18:27, 21 April 2025
  • Thumbnail for Joseph H. Eberly
    Reiss, Howard R. (May 27, 1966). "Electron Self-Energy in Intense Plane-Wave Field". Physical Review. 145 (4): 1035–1040. Bibcode:1966PhRv..145.1035E...
    14 KB (1,249 words) - 15:58, 15 May 2025
  • (tight-binding charge wave dispersion). Mathematically the Hopfield dielectric for the one mode of excitation is equivalent to the trojan wave packet in the harmonic...
    5 KB (1,175 words) - 12:38, 11 December 2024
  • Triplet state Trisonic wind tunnel Trisops Tritiated water Tritium Trojan wave packet Troland Tropical cyclone Tropical cyclone scales Tropospheric scatter...
    19 KB (2,020 words) - 14:34, 30 November 2024
  • Thumbnail for Storm Worm
    Storm Worm (redirect from Storm Trojan)
    passing on packets to destinations encoded within the malware itself. According to Symantec, it may also download and run the Trojan.Abwiz.F trojan, and the...
    14 KB (1,496 words) - 11:48, 21 January 2025
  • called packets, which are routed to their destination and assembled back into a complete message. A packet capture appliance intercepts these packets, so...
    46 KB (5,098 words) - 08:46, 24 April 2025
  • Thumbnail for Denial-of-service attack
    Secure Layer observed and reported on a record-breaking packet DDoS at 3.15 billion packets per second, which targeted an undisclosed number of unofficial...
    99 KB (11,454 words) - 16:26, 4 May 2025
  • Alureon (category Trojan horses)
    Alureon (also known as TDSS or TDL-4) is a trojan and rootkit created to steal data by intercepting a system's network traffic and searching for banking...
    13 KB (1,047 words) - 04:10, 19 January 2025
  • Thumbnail for Eavesdropping
    categorized as trojan viruses or more broadly as spyware. Network eavesdropping is a network layer attack that focuses on capturing small packets from the network...
    7 KB (674 words) - 15:44, 23 March 2025
  • by Bob Clifford. The company builds vessels using aluminium construction, wave-piercing and water-jet technology. Vessels have been constructed up to 130...
    39 KB (1,654 words) - 05:52, 9 May 2025
  • Thumbnail for Webcam
    working from home. First developed in 1991, a webcam was pointed at the Trojan Room coffee pot in the Cambridge University Computer Science Department...
    34 KB (3,642 words) - 23:10, 8 April 2025
  • [user-generated source] Knudsen, Kent (April 5, 2002). "Tracking the Back Orifice Trojan On a University Network". sans.org. p. 7. Archived from the original (PDF)...
    320 KB (13,110 words) - 07:09, 13 May 2025
  • Thumbnail for Fairchild Republic A-10 Thunderbolt II
    Mines & Technology (SDSM&T), replacing SDSM&T's retired North American T-28 Trojan. In 2018, this plan was found to be too risky due to the costly modifications...
    128 KB (13,839 words) - 04:18, 10 May 2025
  • Thumbnail for Information Sciences Institute
    Cohen, became first to implement packet voice and packet video over ARPANET, demonstrating the viability of packet switching for real-time applications...
    22 KB (2,080 words) - 19:51, 29 January 2025
  • Thumbnail for ANT catalog
    2022-04-07. Stöcker, Christian; Rosenbach, Marcel (25 November 2014). "Trojaner Regin ist ein Werkzeug von NSA und GCHQ". Spiegel Online (in German). Archived...
    34 KB (1,833 words) - 16:24, 10 May 2025
  • break into the Guide's corporate accounting software in order to plant a Trojan Horse module that will automatically pay anything billed to his InfiniDim...
    136 KB (21,788 words) - 13:06, 16 May 2025
  • Thumbnail for List of missing ships
    distress call. Sudden disasters such as military strike, collision, rogue wave, or piracy could also prevent a crew from sending a distress call and reporting...
    65 KB (2,135 words) - 03:25, 16 April 2025
  • Thumbnail for Liverpool
    Services are provided by several companies, including the Isle of Man Steam Packet Company, P&O Ferries and Stena Line. The Liverpool Cruise Terminal handles...
    368 KB (31,012 words) - 23:31, 5 May 2025
  • The macOS and Linux operating systems are not immune to malware such as trojan horses or computer viruses. Specialized malware designed to attack those...
    331 KB (32,572 words) - 22:02, 14 May 2025
  • Thumbnail for Anonymous (hacker group)
    stress-testing application allowing users to flood a server with TCP or UDP packets. The LOIC soon became a signature weapon in the Anonymous arsenal; however...
    174 KB (15,630 words) - 04:12, 11 May 2025
  • Thumbnail for Telephone exchange names
    Radio waves wireless Transmission line telecommunication circuit Network topology and switching Bandwidth Links Network switching circuit packet Nodes...
    31 KB (3,725 words) - 22:56, 15 May 2025
  • malware samples, consisting of backdoors, keyloggers, rootkits, mass mailers, trojan horses, spyware, adware, and various other samples. Each was executed on...
    173 KB (16,926 words) - 17:45, 13 May 2025
  • Thumbnail for Cornish people
    Cornish tick box on next census AGAIN – despite minority status". Falmouth Packet. 27 April 2020. Andrews, Robert; Brown, Jules; Humphreys, Rob; Lee, Phil;...
    116 KB (12,034 words) - 18:59, 5 May 2025