Showing 2,041 - 2,060 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 2041

    Animal and bird-related ocular trauma: a decade of experience from a tertiary referral eye hospital of Iran by Mohammadreza Mehrabi Bahar, Esmaeil Asadi Khameneh, Hassan Asadigandomani, Alireza Razavi, Seyed Ali Tabatabaei, Zahra Mahdizad, Fatemeh Masoudi Samghabadi

    Published 2025-01-01
    “…Abstract Background This study aimed to explore ocular and periocular injuries resulting from animal and bird attacks among patients referred to a tertiary referral eye hospital of Iran over ten years (2014–2024). …”
    Get full text
    Article
  2. 2042

    Adult hypophosphatasia presenting with recurrent acute joint pain by Hayao Yoshida, Takaaki Murakami, Atsubumi Ogawa, Takashi Sunouchi, Naoko Hidaka, Nobuaki Ito, Hiromi Murakami, Hidenori Kawasaki, Tomoyuki Akiyama, Katsumi Nakajima, Daisuke Yabe, Taizo Yamamoto

    Published 2025-01-01
    “…Enzyme replacement therapy with asfotase alfa was then introduced; no attacks of arthralgia occurred in the 1-year period since then. …”
    Get full text
    Article
  3. 2043

    A 2D linear canonical transform partition algorithm(二维线性正则变换剖分算法) by 赵伟康(ZHAO Weikang), 侯建伟(HOU Jianwei), 刘晴晴(LIU Qingqing)

    Published 2025-01-01
    “…The partition rectangle number in each 16×16 grid forms the feature matrix which is then combined with Arnold transform to establish a lightweight image protection method that can resist different forms of attacks. Experimental results show that the proposed method has a particular function to detect attacks.…”
    Get full text
    Article
  4. 2044

    Induced Defense in Ryegrass–Epichloë Symbiosis Against <i>Listronotus bonariensis</i>: Impact on Peramine Levels and Pest Performance by Manuel Chacón-Fuentes, Gunnary León-Finalé, Marcelo Lizama, Gastón Gutiérrez-Gamboa, Daniel Martínez-Cisterna, Andrés Quiroz, Leonardo Bardehle

    Published 2025-01-01
    “…To evaluate peramine production and its increase in response to ASW attack, peramine levels in leaves were analyzed using liquid chromatography. …”
    Get full text
    Article
  5. 2045

    Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform by Sunanda Vashisth, Hukum Singh, A. K. Yadav, Kehar Singh

    Published 2014-01-01
    “…The proposed encryption scheme has been seen to exhibit reasonable robustness against occlusion attack.…”
    Get full text
    Article
  6. 2046

    Pointes, hachoirs et marteaux by Eva Belgherbi

    Published 2020-11-01
    “…Between the opening of the École des beaux-arts to women in the late 19th century and the attack by suffragette Mary Richardson at the dawn of World War I against Velázquez’s The Toilet of Venus, commonly known in English as the Rokeby Venus, there was an abundance of speeches on the subject of the violence of women. …”
    Get full text
    Article
  7. 2047

    Collapse Scenarios of High-Rise Buildings Using Plastic Limit Analysis by G. Liu, D. K. Liu, W. K. Chow

    Published 2009-01-01
    “…According to the theory analysis and numerical calculations, a conclusion can be drawn that the large fires, aroused by the terrorist attack, play a significant role on the collapse of the WTC.…”
    Get full text
    Article
  8. 2048

    Research on anonymous identity authentication technology in Fabric by Yueyang YE, Xinglan ZHANG

    Published 2021-06-01
    “…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
    Get full text
    Article
  9. 2049

    Study on dynamic trust metric of trusted network based on state and behavior associated by LI Dao-feng, YANG Yi-xian, GU Li-ze, SUN Bin

    Published 2010-01-01
    “…Intergrated the factors that state and behavior of entities,a new dynamic trust model of trusted network was proposed.The trust information was obtained through the associated analysis of state and behavior of entities.The rela-tion of trust,state and behavior of the entities was also studied,and a new dynamic trust measurement of trusted network was proposed.The simulation results show that the new trust model has advantages in providing real-time dynamic trust.It is highly effective in countering malicious entities regarding strategic altering behavior and malicious attack,presenting better choice in task assignment in the network,providing help to make the secure police for the network security,and enhancing trustworthily of network.…”
    Get full text
    Article
  10. 2050

    Issues and challenges of Internet DNS security by Ning HU, Wen-ping DENG, Su YAO

    Published 2017-03-01
    “…The domain name system is a critical component of the Internet infrastructure,which maps host names to IP ad-dresses and is involved in most Internet transactions.DNS security has a profound effect on the overall security of Internet and it is also a vital research content of Internet security.In order to improve the security capability of DNS,many enhanced protocols,monitoring mechanisms and best practices were proposed.But recent DNS attack events indicate there are still many recent major research challenges of DNS security problems.The existing achievements and challenges were summarized and discussed,which included security enhanced,behavior monitoring and privacy protection.…”
    Get full text
    Article
  11. 2051

    Can Strategic Litigation Backfire? Challenging the Crackdown on Migration NGOs in Greece Through EU Law by Elli Kriona Saranti

    Published 2024-08-01
    “…In 2020, amid aggressive and inflammatory political discourse and an unprecedented wave of violent attacks against migration Non-Governmental Organizations and their staff, the Greek Government sought to establish a new legal framework for the registration of Non-Governmental Organizations active in the fields of international protection, migration and social inclusion, and their members. …”
    Get full text
    Article
  12. 2052

    Moving target defense solution on network layer based on OpenFlow by Yi-xun HU, Kang-feng ZHENG, Yi-xian YANG, Xin-xin NIU

    Published 2017-10-01
    “…In order to take an active part in network attack and defense,a moving target defense solution on network layer based on OpenFlow was proposed,using the flexibility of network brought by OpenFlow network architecture.On the network layer,through mapping the correspondent nodes’ addresses to pseudo-random virtual addresses in the LAN and mapping correspondent nodes’ ports to virtual ports,achieving the hiding of correspond nodes in the whole network and the information of network architecture.Researches verify the system’s effectiveness.Comparing with existing moving target defense solutions,the proposed algorithm can be deployed easily in the traditional network,and realize comprehensive protection of the corresponding in the whole network.…”
    Get full text
    Article
  13. 2053

    COVID-19: An Emerging Culprit of Inflammatory Arthritis by Muhammad Shariq Mukarram, Muhammad Ishaq Ghauri, Sehrish Sethar, Nasir Afsar, Amir Riaz, Khizra Ishaq

    Published 2021-01-01
    “…Although COVID-19 seems to attack the musculoskeletal system (muscles and joints) in its infective and postinfective stage causing inflammatory arthritis, not much is known about the rheumatic manifestations of this infection. …”
    Get full text
    Article
  14. 2054

    The "one-group-one-cipher" cryptograph of block-cipher based on chaotic by XUAN Lei1, YAN Ji-ning1

    Published 2009-01-01
    “…The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated in aspects of Shannon entropy.The"one-group-one-cipher"algorithm was de-signed and implemented based on hyper-chaos generalized Hénon mapping and IDEA algorithms, and its security was analyzed theoretically.Analysis shows that the algorithm is so secure that it can withstand brute force attack, and it was perfect secrecy.The disadvantages of key’s reuse of block ciphers are avoided, and the practicality and feasibility of chaos ciphers and one-time pad are improved.…”
    Get full text
    Article
  15. 2055

    Yellow Garden Spider, Writing Spider Argiope aurantia (Lucas) (Arachnida: Araneae: Araneidae) by Taryn B. Griffith, Jennifer Lynn Gillett-Kaufman

    Published 2020-05-01
    “…Although their appearance may cause alarm, the species is relatively harmless and will generally leave its web to flee rather than attack when disturbed (Enders 1973). https://edis.ifas.ufl.edu/in1273 …”
    Get full text
    Article
  16. 2056

    New nucleopolyhedrovirus isolate in the management of Spodoptera eridania by ALIXELHE P. DAMASCENA, FERNANDO Z. MADALON, LUIS M. DE ARAUJO JUNIOR, DIRCEU PRATISSOLI, CARLOS EDUARDO C. PAIVA, LORENA C. MACHADO, HUGO GONÇALVES JUNIOR, VINÍCIUS H. BELLO

    Published 2025-02-01
    “…Abstract Spodoptera eridania is considered a polyphagous pest, as it attacks several crops. The aim of this study was to identify a virus isolate present in symptomatic S. eridania caterpillars. …”
    Get full text
    Article
  17. 2057

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  18. 2058

    Service security monitoring mechanism for application server cluster by Hongyao JU

    Published 2016-06-01
    “…For an application system,the workloads on the application servers’ key hardware and the working state of the application software are important factors affecting the system’s safety.Based on studies of the monitoring techniques for CPU,RAM,network traffic,software directories and software files of application servers,dynamic comprehensive monitoring,safety review and application software intelligent recovery were integrated,and an intelligent monitoring system was constructed for the application systems.The mechanisms and methodology of the monitoring system were illustrated.The system realized intelligent monitoring the working state of hardware and software,achieved the goal of automatic alarming,fault locating upon abnormal working states of the hardware or software and automatic recovery upon attacks to the software.…”
    Get full text
    Article
  19. 2059

    Research towards IoT-oriented universal control system security model by Jin-cui YANG, Bin-xing FANG, Li-dong ZHAI, Fang-jiao ZHANG

    Published 2012-11-01
    “…In Internet of things,the control loop of industrial Ethernet and real-time Ethernet is easily exploited by hackers for malicious attacks,causing serious security incidents in the physical world; a universal control system model (IoTC) was put forward by analysing the working principle of the control system in IoT,on which some disturbing factors the system faces were discussed; for the disturbing factors in the system,one universal control system security model (S-IoTC) was given,adding security authentication module in responding disturbing factor to achieve secure system; the components,safety justice and typical realization process of S-IoTC were also described in detail at last.…”
    Get full text
    Article
  20. 2060

    New construction of secure range query on encrypted data in cloud computing by Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, Ru-chuan WANG

    Published 2015-02-01
    “…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
    Get full text
    Article