-
181
Dynamic Characteristics of the Rotating Penetrating Missile for Attacking Warship Vertically
Published 2021-01-01“…The paper aimed to analyze the dynamic response of a new type penetrating missile in rotary attacking warship. The dynamic response characteristics of the penetrator become more complex when attacking the ship target due to the special materials of the deck such as stiffeners. …”
Get full text
Article -
182
Survey of attack and detection based on the full life cycle of APT
Published 2024-09-01Subjects: Get full text
Article -
183
Modeling and security analysis of hardware trojan attack based on GSCPN
Published 2024-08-01Subjects: Get full text
Article -
184
Predictors of infliximab efficacy in patients with severe attack of ulcerative colitis
Published 2013-10-01“…The retrospective analysis of biological therapy results in 30 patients with severe steroid-resistant attack of ulcerative colitis, assessed by Truelove and Witts’ criteria was carried out.Results. …”
Get full text
Article -
185
Grievous Temporal and Occipital Injury Caused by a Bear Attack
Published 2013-01-01“…Bear attacks are reported from nearly every part of the world. …”
Get full text
Article -
186
Inference Attacks on Genomic Data Based on Probabilistic Graphical Models
Published 2020-09-01“…We propose new inference attacks to predict unknown Single Nucleotide Polymorphisms (SNPs) and human traits of individuals in a familial genomic dataset based on probabilistic graphical models and belief propagation. …”
Get full text
Article -
187
Experimental Analysis of Neural Approaches for Synthetic Angle-of-Attack Estimation
Published 2021-01-01“…Within modern digital avionics, synthetic sensors can be implemented and used for several purposes such as analytical redundancy or monitoring functions. The angle of attack, measured at air data system level, can be estimated using synthetic sensors exploiting several solutions, e.g., model-based, data-driven, and model-free state observers. …”
Get full text
Article -
188
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Subjects: Get full text
Article -
189
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01Subjects: Get full text
Article -
190
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: Get full text
Article -
191
Localization of multiple jamming attackers in vehicular ad hoc network
Published 2017-08-01“…In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming attackers. …”
Get full text
Article -
192
Side channel attack of cipher chips based on difference variability
Published 2015-03-01Subjects: Get full text
Article -
193
My Pine Is Under Attack—What Should I Do?
Published 2016-05-01“… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
Get full text
Article -
194
Recurrent “transient ischemic attacks” caused by pulmonary arteriovenous malformation
Published 2025-01-01Subjects: Get full text
Article -
195
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.…”
Get full text
Article -
196
New approach against Sybil attack in wireless sensor networks
Published 2008-01-01Subjects: Get full text
Article -
197
Alert processing based on attack graph and multi-source analyzing
Published 2015-09-01Subjects: Get full text
Article -
198
Detecting and preventing collusion attack in DPoS based on power index
Published 2022-12-01Subjects: Get full text
Article -
199
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01Subjects: Get full text
Article -
200
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01Subjects: Get full text
Article