Showing 2,021 - 2,040 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 2021

    Cornsilk Fly (suggested common name), Euxesta stigmatias Loew (Insecta: Diptera: Otitidae) by Gregg S. Nuessly, John L. Capinera

    Published 2013-05-01
    “…Four species of ‘cornsilk flies’ are known to attack corn in Florida: Chaetopsis massyla (Walker), Euxesta annonae (Fabricius), Euxesta eluta Loew, and Euxesta stigmatias Loew. …”
    Get full text
    Article
  2. 2022

    Why is Your Cup of Coffee so Expensive? Because of a Tiny Bark Beetle! by Jiri Hulcr

    Published 2013-11-01
    “… Sometimes an insect pest attacking crops in places as far away as Indonesia or Ethiopia can be very important to us here in Florida. …”
    Get full text
    Article
  3. 2023

    Beyond Equal Rights: The Persistence of Ethno-Racial Inequalities in America by Olivier Richomme

    Published 2014-11-01
    “…Worse, racial patterns of mass incarceration and efforts at disenfranchisement suggest that equal rights remain under attack in an indirect but still very troubling manner.…”
    Get full text
    Article
  4. 2024

    The Lexicon of Argumentation for Argument Mining: methodological considerations by Patrick Saint Dizier

    Published 2020-12-01
    “…An argument being a relation between a controversial statement (claim) and a support or an attack, we deal with the marks specific to each class and those related to the expression of the relations which hold between them. …”
    Get full text
    Article
  5. 2025

    Design of network traffic monitoring and control system in SDN by Chuan LIU, Zheng LOU, Hui HUANG, Hui DENG

    Published 2015-12-01
    “…The core idea of SDN(software defined networking)is that the control plane and data plane are separated,which makes the network traffic can be flexible controlled.Since SDN has these characteristics,the traffic monitoring and control in SDN have significant differences with traditional IP networks.A network traffic monitoring and control system based on sFlow technology was presented.With the application of sFlow,the process of data collection was separated from the control plane of SDN.The experimental environment was constructed based on OpenDaylight controller and Mininet,and the abnormal traffic was simulated by DoS(denial of service)attacks.The experiments show that the proposed network traffic monitoring and control system can effectively intercept the abnormal traffic.…”
    Get full text
    Article
  6. 2026

    Anthracnose Fruit Rot of Strawberry by James C. Mertely, Natalia A. Peres

    Published 2005-04-01
    “…Although fruit rot is the most important symptom caused by C. acutatum, the fungus can also attack other parts of the plant including the crown, leaves, petioles, and roots. …”
    Get full text
    Article
  7. 2027

    Anthracnose Fruit Rot of Strawberry by James C. Mertely, Natalia A. Peres

    Published 2005-04-01
    “…Although fruit rot is the most important symptom caused by C. acutatum, the fungus can also attack other parts of the plant including the crown, leaves, petioles, and roots. …”
    Get full text
    Article
  8. 2028

    Facing Terrorism Alone by Carolyn S. Wilken

    Published 2003-06-01
    “…We worry about the possibility of another terrorist attack. We feel stressed because we don’t know what to expect from day to day. …”
    Get full text
    Article
  9. 2029

    A Series on Diseases in the Florida Vegetable Garden: PEPPER by Ken Pernezny, Tim Momol

    Published 2004-10-01
    “…The pathogenic microorganisms that attack garden vegetables, including pepper, can be classified into three major groups: fungi, bacteria, and viruses. …”
    Get full text
    Article
  10. 2030

    Acquired Traumatic Diaphragmatic Hernia with Delayed Presentation in a Child by Nader Mutwakel Osman

    Published 2019-03-01
    “…The author reports a case of acquired diaphragmatic hernia in a three-year-old boy with a prolonged history of recurrent attacks of vomiting and abdominal pain associated with cough. …”
    Get full text
    Article
  11. 2031

    Use of the Triptans by Marek J Gawel

    Published 2000-01-01
    “…This has been due in part to the realization that the migraine attack can be blocked by activating the serotonin receptor, namely the 5-hydroxytryptamine/1D receptor. …”
    Get full text
    Article
  12. 2032

    Insect Management for Cucurbits (Cucumber, Squash, Cantaloupe, and Watermelon) by Susan E. Webb

    Published 2005-12-01
    “…Pickleworm and melonworm rarely attack watermelon. This document is ENY-460, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
    Get full text
    Article
  13. 2033

    Tag's ownership transfer protocol based on quadratic residue by Rui XIE, Zhifeng HAO

    Published 2018-03-01
    “…A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.…”
    Get full text
    Article
  14. 2034

    Trust based secure routing algorithm for wireless sensor networks by WANG Chao, JIA Xiang-yu, LIN Qiang

    Published 2008-01-01
    “…Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present.…”
    Get full text
    Article
  15. 2035

    Why is Your Cup of Coffee so Expensive? Because of a Tiny Bark Beetle! by Jiri Hulcr

    Published 2013-11-01
    “… Sometimes an insect pest attacking crops in places as far away as Indonesia or Ethiopia can be very important to us here in Florida. …”
    Get full text
    Article
  16. 2036

    A Series on Diseases in the Florida Vegetable Garden: PEPPER by Ken Pernezny, Tim Momol

    Published 2004-10-01
    “…The pathogenic microorganisms that attack garden vegetables, including pepper, can be classified into three major groups: fungi, bacteria, and viruses. …”
    Get full text
    Article
  17. 2037

    Cornsilk Fly (suggested common name), Euxesta stigmatias Loew (Insecta: Diptera: Otitidae) by Gregg S. Nuessly, John L. Capinera

    Published 2013-05-01
    “…Four species of ‘cornsilk flies’ are known to attack corn in Florida: Chaetopsis massyla (Walker), Euxesta annonae (Fabricius), Euxesta eluta Loew, and Euxesta stigmatias Loew. …”
    Get full text
    Article
  18. 2038

    Cross‐ethnicity face anti‐spoofing recognition challenge: A review by Ajian Liu, Xuan Li, Jun Wan, Yanyan Liang, Sergio Escalera, Hugo Jair Escalante, Meysam Madadi, Yi Jin, Zhuoyuan Wu, Xiaogang Yu, Zichang Tan, Qi Yuan, Ruikun Yang, Benjia Zhou, Guodong Guo, Stan Z. Li

    Published 2021-01-01
    “…We organized the Chalearn Face Anti‐spoofing Attack Detection Challenge which consists of single‐modal (e.g. …”
    Get full text
    Article
  19. 2039

    Graph analysis based on SCN reveals novel neuroanatomical targets related to tinnitus distress by Yawen Lu, Yifeng Yang, Meijing Yan, Lianxi Sun, Caixia Fu, Jianwei Zhang, Jianwei Zhang, Yuehong Liu, Kefeng Li, Zhao Han, Guangwu Lin, Shihong Li

    Published 2025-01-01
    “…In addition, the tinnitus network was found to be reduced in robustness to targeted attacks compared with HCs. Besides, a significant negative correlation between Tinnitus Handicap Inventory (THI) score and GMV in the left angular gyrus (r = −0.283, p = 0.040) as well as left superior temporal pole (r = −0.282, p = 0.041) were identified.ConclusionTinnitus patients showed reduced small-world properties, altered hub nodes, and reduced ability to respond to targeted attacks in brain network. …”
    Get full text
    Article
  20. 2040

    Influence of sediment additions on the mechanical behavior of fiber-reinforced concrete in aggressive environments by Louafi Goudih, Hamid Sellaf, Benamar Balegh, Ali Meksi, Adda Hadj Mostefa, Mohamed Elamine Dahamni

    Published 2025-01-01
    “…Durability was assessed by exposing the concrete to chemical attacks from hydrochloric acid (HCl), sulfuric acid (H₂SO₄), and sodium sulfate (Na₂SO₄) solutions. …”
    Get full text
    Article