Showing 2,081 - 2,100 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 2081

    Pripojenie Javoriny a Lesnice k Poľsku 1938–1939 by Pavol Matula

    Published 2015-01-01
    “…On 1st September1939, after the German attack on Poland, which the Slovak Army was involved in too, Javorina and Lesnica became a part of Slovakia again. …”
    Get full text
    Article
  2. 2082

    BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks by Ning Yu, Lirui Zhang, Yongji Ren

    Published 2013-03-01
    “…In this paper, we propose a BRS-based robust secure localization (BRSL) algorithm in order to reduce the impact of the malicious attackers in WSNs. The BRSL method includes two phases. …”
    Get full text
    Article
  3. 2083

    Hospodářský bojkot jako odpověď na antisemitismus. Příklad druhé Československé republiky by Tomáš Jiránek

    Published 2017-10-01
    “…In spite of the government’s effort to preserve the tradition of religious and racial tolerance, anti-Jewish attacks, mostly verbal, but gradually even real, took place at different levels, resulting in attempts to declare a boycott of Czech-Slovak goods exported to democratic states, especially the USA. …”
    Get full text
    Article
  4. 2084

    Insect Management for Cucurbits (Cucumber, Squash, Cantaloupe, and Watermelon) by Susan E. Webb

    Published 2005-12-01
    “…Pickleworm and melonworm rarely attack watermelon. This document is ENY-460, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
    Get full text
    Article
  5. 2085

    Female Midwifery in the Czech Lands 1850–1950: A Career on the Decline by Vladan Hanulík

    Published 2020-11-01
    “… Although midwives were incorporated into the administrative system governing the conditions of birth delivery, female midwifery became the target of verbal attacks from the leading authorities of scientific medicine. …”
    Get full text
    Article
  6. 2086

    Network architecture with intrinsic security by Weiyu JIANG, Bingyang LIU, Chuang WANG

    Published 2019-09-01
    “…IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult for patch-like solutions to cure stubborn security issues (IP spoofing,privacy leakage,MITM attack,DDoS,etc.).On the basis of surveying different kinds of security threats and related security techniques,an overview of the security weakness analysis was given,and network architecture with intrinsic security (NAIS) was presented,including dynamic ID/IP with intrinsic security,security verification and audit protocols,and cross-domain cooperation defense mechanism,which could provide security and trustworthiness for end to end communication.…”
    Get full text
    Article
  7. 2087

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  8. 2088

    Pine Sawflies, Neodiprion spp. (Insecta: Hymenoptera: Diprionidae) by Wayne N. Dixon

    Published 2005-04-01
    “…Sawfly infestations can cause growth loss and mortality, especially when followed by secondary attack by bark and wood-boring beetles (Coleoptera: Buprestidae, Cerambycidae, Scolytidae,). …”
    Get full text
    Article
  9. 2089

    Arpenter et sillonner les archives du Web by Valérie Schafer

    Published 2023-07-01
    “…It looks back at research projects, from the Web90 project running between 2014 and 2018, dedicated to the digital cultures of the 1990s, to the current Hivi project (A History of Online Virality), through research about events (terrorist attacks of 2015-2016; COVID-19 crisis). This path is related to the evolution of the state of the art and of archival and academic practices, in the face of the large amounts of data generated, particularly those of the social networks, and of transnational or transversal research in progress.…”
    Get full text
    Article
  10. 2090

    Distributed robust RLS estimation algorithm over sensor networks by Kaikai KANG, Zhaoting LIU, Yingbiao YAO

    Published 2019-01-01
    “…The characteristic of interference or attack on a node is usually sporadic (ie, sparse) for a period of time was utilized, ℓ<sub>1</sub>norm was introduced to cost function. …”
    Get full text
    Article
  11. 2091

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems

    Published 2012-03-01
    “… This rather large, yellow-brown, fruit fly with yellow and dark-brown markings exists in several South American countries, and attacks watermelon and other fruits of the family Cucurbitaceae. …”
    Get full text
    Article
  12. 2092

    Review of information hiding on Chinese text by Guohua WU, Lichun GONG, Lifeng YUAN, Ye YAO

    Published 2019-09-01
    “…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
    Get full text
    Article
  13. 2093

    Chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion by Yeqin CUI, Guochao DING

    Published 2016-11-01
    “…A novel chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion was presented.Firstly,a single image local scrambling algorithm was proposed.Secondly,a novel dynamic feedback diffusion strategy was proposed to change the pixel values of the scrambled image in the phase of diffusion,by which improved the results of image encryption.Finally,the simulation results and performance analysis show that the number pixels change rate(NPCR)values and unified average changing intensity(UACI)values of the proposed algorithm can be close to 99.6% and 33.4%,showing that the proposed algorithm has better resistance to differential attacks and saves time compared with the other three classic algorithms.…”
    Get full text
    Article
  14. 2094

    Common Sharks of Florida by Florida Sea Grant

    Published 2002-07-01
    “…Among the species that grow to this size and have been known to attack humans are bull sharks, tiger sharks and great white sharks. …”
    Get full text
    Article
  15. 2095

    Pine Sawflies, Neodiprion spp. (Insecta: Hymenoptera: Diprionidae) by Wayne N. Dixon

    Published 2005-04-01
    “…Sawfly infestations can cause growth loss and mortality, especially when followed by secondary attack by bark and wood-boring beetles (Coleoptera: Buprestidae, Cerambycidae, Scolytidae,). …”
    Get full text
    Article
  16. 2096

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  17. 2097

    Zmiany w polskim systemie ochrony lotnictwa cywilnego by Łukasz Szymankiewicz

    Published 2023-04-01
    “…Air transport, as a component of critical infrastructure, is an attractive target for terrorist attack, which makes it necessary to maintain an adequate level of aviation security. …”
    Get full text
    Article
  18. 2098

    DNA algorithm of primeness test based on finite automaton by YANG Xue-qing, LIU Zhong-kan

    Published 2006-01-01
    “…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
    Get full text
    Article
  19. 2099

    A Series on Diseases in the Florida Vegetable Garden: TOMATO by Ken Pernezny, Tim Momol

    Published 2004-10-01
    “…The pathogenic microorganisms that attack garden vegetables, including tomato, can be classified into three major groups: fungi, bacteria, and viruses. …”
    Get full text
    Article
  20. 2100

    Common Sharks of Florida by Florida Sea Grant

    Published 2002-07-01
    “…Among the species that grow to this size and have been known to attack humans are bull sharks, tiger sharks and great white sharks. …”
    Get full text
    Article