Showing 1,981 - 2,000 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1981

    Acupuncture Reversible Effects on Altered Default Mode Network of Chronic Migraine Accompanied with Clinical Symptom Relief by Yan Zou, Weijun Tang, Xiang Li, Manwen Xu, Ji Li

    Published 2019-01-01
    “…The monthly mean visual analog scale (VAS) scores, monthly mean headache attacks, monthly headache days, monthly amount of acute headache medications, and immediate VAS scores were assessed for evaluation of pain. …”
    Get full text
    Article
  2. 1982

    Fast access authentication scheme for mobile IPv6 hierarchical network by Shan-shan SONG, Tao SHANG, Jian-wei LIU

    Published 2013-08-01
    “…The analysis of the scheme shows that it is strongly unforgeable, and mean-while it can defend replay attacks and reduce the delay time of the entire authentication process.…”
    Get full text
    Article
  3. 1983

    MANDATORY TECHNICAL ELEMENTS IN THE METAMORPHOSIS OF THE SINGING VOICE by Georgeta PINGHIRIAC

    Published 2011-06-01
    “…Trying to imitate human voice, people invented a variety of musical instruments. The attack and emission of the sound are essential while singing. …”
    Get full text
    Article
  4. 1984

    Football Game and Tactical Training by Ionel Caius Drula

    Published 2024-07-01
    “…Versatile players are an essential part of modern football, which no longer allows us to talk about attacking or defensive players but rather players with complex talents who can manage any circumstance the game demands. …”
    Get full text
    Article
  5. 1985

    Untangling the Web of Systemic Autoinflammatory Diseases by Donato Rigante, Giuseppe Lopalco, Antonio Vitale, Orso Maria Lucherini, Francesco Caso, Caterina De Clemente, Francesco Molinaro, Mario Messina, Luisa Costa, Mariangela Atteno, Franco Laghi-Pasini, Giovanni Lapadula, Mauro Galeazzi, Florenzo Iannone, Luca Cantarini

    Published 2014-01-01
    “…Further research should enhance our understanding of the genetics behind SAIDs, unearth triggers of inflammatory attacks, and result in improvement for their diagnosis and treatment.…”
    Get full text
    Article
  6. 1986

    Research on WiFi Penetration Testing with Kali Linux by He-Jun Lu, Yang Yu

    Published 2021-01-01
    “…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. …”
    Get full text
    Article
  7. 1987

    Personal reboot and survival by A. V. Nekhaev

    Published 2020-10-01
    “…It is concluded that the main goals of critical attacks of these arguments are the temporal mismatch of psychological connectedness and continuity as well as the reductionist claim that all the facts what matters for survival can be described in an impersonal way…”
    Get full text
    Article
  8. 1988

    An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm by Yuping Hu, Congxu Zhu, Zhijian Wang

    Published 2014-01-01
    “…Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.…”
    Get full text
    Article
  9. 1989

    Topical Treatment of Ulcerative Colitis using Enemas Containing 5-Aminosalicylic Acid and Beclomethasone Dipropionate by M Campieri, P Gionchetti, A Belluzzi, M Tampieri, C Brignola, M Ferretti, M Miglioli, L Barbara

    Published 1990-01-01
    “…5-Aminosalicylic acid (5-ASA) enemas constitute a first-line therapy for patients with mild to moderate attacks of ulcerative colitis. To date, based on the results of different studies, 5-ASA enemas appear to be satisfactory in at least two-thirds of patients treated. …”
    Get full text
    Article
  10. 1990

    Research and implementation of safety authentication technology in Internet of vehicles by Manzhu WANG, Ziqi LI, Yifei CHEN, Gaofeng HONG, Wei SU

    Published 2021-09-01
    “…Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV.…”
    Get full text
    Article
  11. 1991

    Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol by Ying-di DONG, Jin-ye PENG, Xiao-bo ZHANG, Zhen-long ZHANG

    Published 2016-02-01
    “…The security performance of the proposed scheme is extensively analyzed and accordingly con?rmed in the case of attacks.…”
    Get full text
    Article
  12. 1992

    Autoimmunity against cytokines: Double strike in autoimmune disease, a historical perspective by Iván Insignares, Luis E. Rodríguez, Óscar Correa-Jiménez, Alberto Alfaro-Murillo, Laura Rincón-Arenas, Andrés Sánchez, Marlon Múnera

    Published 2024-12-01
    “…This leads to an effector immune response against tissues expressing antigens, which are later recognized by the host immune system. Host antigens attacked by antibodies are called “autoantigens” and are of different kinds, including receptors, enzymes, and channel proteins. …”
    Get full text
    Article
  13. 1993

    Asian Horntail Eriotremex formosanus (Matsumura) (Insecta: Hymenoptera: Symphyta: Siricidae: Tremicinae) by You Li, Jiri Hulcr

    Published 2015-08-01
    “…It is not considered an economically important pest because it only attacks dying or dead trees, but the species may someday prove to be a pest and its ecological impacts in North American forests remain unknown. …”
    Get full text
    Article
  14. 1994

    Vibration Performance Redistribution in Heterogeneous Networks by Genling Huang, Jiqiang Wang

    Published 2020-01-01
    “…Albeit in a simple setup, this paper presents an attempt to attacking this problem. Important results are obtained for performance redistribution under both unitary and specified specifications. …”
    Get full text
    Article
  15. 1995

    Asian Horntail Eriotremex formosanus (Matsumura) (Insecta: Hymenoptera: Symphyta: Siricidae: Tremicinae) by You Li, Jiri Hulcr

    Published 2015-08-01
    “…It is not considered an economically important pest because it only attacks dying or dead trees, but the species may someday prove to be a pest and its ecological impacts in North American forests remain unknown. …”
    Get full text
    Article
  16. 1996

    ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1

    Published 2008-01-01
    “…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
    Get full text
    Article
  17. 1997

    A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision by Yuan-Yu Tsai

    Published 2016-01-01
    “…Finally, a principal component analysis can make the stego model against similarity transformation and vertex/triangle reordering attacks. Our proposed algorithm can provide a high and adjustable embedding capacity with reversibility. …”
    Get full text
    Article
  18. 1998

    Stable Fly (Dog Fly) Control by Phillip E. Kaufman, Emma N. I. Weeks

    Published 2012-09-01
    “…Stable flies primarily attack animals for a blood meal, but in the absence of an animal host, they will bite people. …”
    Get full text
    Article
  19. 1999

    Stereo robust watermark algorithm based on parameter optimization by Yiming XUE, Jinyu ZHANG, Botao CHEN, Zhenghong YANG

    Published 2023-07-01
    “…Aiming at issues such as illegal dissemination of network audio data and privacy leakage, a stereo robust watermark algorithm based on parameter optimization was proposed.Firstly, the watermark was embedded by modifying the singular value ratio of odd segment based on the insensitivity of stereo channels to attack, and aiming at minimizing the relative distortion of the two channels.The embedding process was optimized and the perceived quality of the audio was improved.Then, a parameter optimization method was proposed to find optimal parameters on each audio file, and the imperceptibility and robustness were well balanced.The simulation results show that the proposed algorithm has good imperceptibility and robustness against conventional signal processing.…”
    Get full text
    Article
  20. 2000

    Les chiites et la célébration du gamou au Sénégal by Macoumba Diop

    Published 2024-07-01
    “…I then show how the celebration of this festival by Senegalese Shiites reflects both a desire to draw closer to Sufi brotherhoods, notably in a common opposition to Wahhabi attacks, and a desire to distinguish themselves from the Sunni religious environment.…”
    Get full text
    Article