Showing 2,101 - 2,120 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 2101

    "You are my rock and fortress". Refuge metaphors in Psalm 31. A perspective from cognitive metaphor theory by A. Basson

    Published 2005-12-01
    “…The one under constant attack of the enemy has no other option but to implore the deity to intervene on his behalf. …”
    Get full text
    Article
  2. 2102

    Distributed trust model based on parameter modeling by Jing-pei WANG, Bin SUN, Xin-xin NIU, Yi-xian YANG

    Published 2013-04-01
    “…A distributed trust model based on parameter modeling was posed.Nine functional parameters were extracted after investigating the trust mechanism and current trust models.These parameters included flexibility,subjectivity,fuzziness,time decay property,transitivity,anti-attacks property,rewards & punishment property,sensitivity and scalability.Each parameter was modeled and integrated to form a comprehensive trust model.Analytical results indicate that the proposed trust model satisfies all the nine functional parameters and thus has fair universality Experimental results show that the proposed trust model is reasonable and effective.Comparisons with previous algorithms indicate that the performance of the proposed trust model has been improved.…”
    Get full text
    Article
  3. 2103

    Improvement on simulating TCP connection establishment in NS2 by Yu JIANG, Jian REN, Li-ming ZHOU

    Published 2012-11-01
    “…In the procedure of three-way handshake of transmission control protocol connection establishment,it involves the management of half-connection and connection tables.However,in the famous networks simulator NS2,there is only a formal description instead of a concrete and complete implementation for the procedure of TCP connection establishment.An improvement was beed made on the point.Table structures for half-connections and connections are added,and the way of managing half-connection table in Linux kernel is also imported into NS2.Simulation results show that it is clear to monitor the change in half-connection table in the TCP connection establishment procedure,and thus the requirement of simulating the connection establishment procedure in studies such as protection from TCP SYN flooding attack can be met.…”
    Get full text
    Article
  4. 2104

    Theoretical Studies on the Reaction Mechanism for the Cycloaddition of Zwitterionic π-Allenyl Palladium Species: Substrate-Controlled Isomerization by Yongjie Long, Jiahao Shen, Min Shi, Yin Wei

    Published 2024-12-01
    “…Further DFT calculation studies show that zwitterionic π-allenyl palladium species are generated through the oxidative addition of Pd(0), which can be promoted by Lewis acid like Yb(OTf)<sub>3</sub>, and the cycloaddition more likely undergoes through an outer sphere nucleophilic attack. The isomerization is caused by the difference of dissociation energy between the cycloaddition intermediation of tropsulfimides and tropones, forming the substrate-controlled specificity.…”
    Get full text
    Article
  5. 2105

    Trust system based on node behavior detection in Internet of Things by Yan-bing LIU, Xue-hong GONG, Yan-fen FENG

    Published 2014-05-01
    “…Establishing a trust system, which considers energy efficiency and a trust metric aware both subjectivity and objectivity in the Internet of Things, is a powerful technique to defend against malicious attacks and improve the per-formance of network. A trust system based on behavior detection was proposed, which takes direct trust, recommended trust as well as history statistical trust into trust evaluation periodically and in communication. …”
    Get full text
    Article
  6. 2106

    Case Study of Remaining Service Life Assessment of a Cooling Water Intake Concrete Structure in Indonesia by M. Sigit Darmawan, Ridho Bayuaji, N. A. Husin, R. B. Anugraha

    Published 2014-01-01
    “…This paper deals with the assessment of remaining service life of a cooling water intake concrete structure (CWICS) subjected to corrosion due to chloride attacks. Field and laboratory tests were performed to determine the current existing condition of the structure. …”
    Get full text
    Article
  7. 2107

    Enzensberger's challenge to leftist communicologists by Eric Louw

    Published 2022-11-01
    “…Importantly, Enzensberger was not content with merely attacking the (Marxist-domi nated) Left Rather, he simulta neously proposed an 'alternative' left-wing communication theory. …”
    Get full text
    Article
  8. 2108

    Monitoring approach for online security of cryptographic protocol by Yu-na ZHU, Ji-hong HAN, Lin YUAN, Yu-dan FAN, Han-tuo CHEN, Wen GU

    Published 2016-06-01
    “…Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified description of cryptographic protocol features with different types.Based on the framework,a feature weighting method was proposed by fuzzy subspace clustering first,and the individualized feature database of cryptographic protocols was built.On this basis,a self-learning method was presented for protocol identification and session rebuilding,and then abnormal protocol sessions were detected online.Experimental results show that CPOMA can identify protocols,rebuild sessions,detect abnormal sessions efficiently,and can improve the online security of cryptographic protocols.…”
    Get full text
    Article
  9. 2109

    Antinuclear Antibody-Positive Ticlopidine-Induced Hepatitis by Sander Jo Veldhuyzen van Zanten, C William McCormick

    Published 1996-01-01
    “…Ticlopidine hydrochloride has been shown to reduce the risk of first or recurrent stroke in patients who have experienced a transient ischemic attack, reversible ischemic neurological deficit, recurrent stroke or first stroke. …”
    Get full text
    Article
  10. 2110

    An individual, stochastic model of growth incorporating state-dependent risk and random foraging and climate by William Wolesensky, J. David Logan

    Published 2006-10-01
    “…Specifically, we study the stochastic dynamics of arthropod predator-prey interactions under a varying temperature regime, and we develop an individual model of a prey under pressure from a predator, with vigilance (or foraging effort), search rates, attack rates, and other predation parameters dependent on daily temperature variations. …”
    Get full text
    Article
  11. 2111

    Selected allergic diseases of the gastrointestinal tract by Andrzej Kuźmiński, Michał Przybyszewski, Małgorzata Graczyk, Magdalena Żbikowska-Götz, Natalia Sokołowska-Ukleja, Alina Tomaszewska, Zbigniew Bartuzi

    Published 2019-09-01
    “…They may manifest themselves as gastrointestinal problems, asthma attacks, hives, or anaphylactic shock. Allergic reactions of the gastrointestinal tract may be IgE-independent (oral anaphylaxis syndrome, acute gastrointestinal reactions), mixed (eosinophilic gastrointestinal disorders), or IgE-independent (food-induced enterocolitis, proctitis, or enteropathy). …”
    Get full text
    Article
  12. 2112

    A Distributed Consensus Scenario Approach to Optimization and Control With Uncertainties by Jing Wang, Steven Drager

    Published 2025-01-01
    “…Our design inherently offers robustness against adversarial attacks and preserves data privacy. We provide rigorous convergence analysis and demonstrate the effectiveness of our approach through application examples in regression and robust internal model control. …”
    Get full text
    Article
  13. 2113

    Representation for uncertainty trust of WSN based on lightweight-cloud by Xiao-bin XU, Guang-wei ZHANG, Shang-guang WANG, Qi-bo SUN, Fang-chun YANG

    Published 2014-02-01
    “…Simulation results show that this method overcomes the contradiction between the sensitivity and tolerance of traditional trust management framework, furthermore, it's not only tolerant of abnormal conditions, but also sensitive to multiple attacks.…”
    Get full text
    Article
  14. 2114

    Research progress of mimic multi-execution scheduling algorithm by Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG

    Published 2021-05-01
    “…Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architecture.With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system.Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnerabilities.Based on this, the principle and goal of mimic scheduling algorithm were firstly introduced.Then the state-of-the-art of mimic scheduling algorithms were analyzed and summarized from three aspects, such as scheduling object, scheduling quantity and scheduling timing.Finally, the future research direction and trend of mimic scheduling algorithms were prospected.…”
    Get full text
    Article
  15. 2115

    Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT by Jie ZHAO, Huarong ZHANG

    Published 2016-06-01
    “…For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.…”
    Get full text
    Article
  16. 2116

    Computational Nanochemistry Study of the Molecular Structure and Properties of Chlorophyll a by Mónica Alvarado-González, Norma Flores-Holguín, Daniel Glossman-Mitnik

    Published 2013-01-01
    “…The active sites for nucleophilic and electrophilic attacks have been chosen by relating them to the Fukui function indices. …”
    Get full text
    Article
  17. 2117

    Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters by Hai-ying GAO, Chen-hui JIN

    Published 2012-07-01
    “…It is an open problem to combine many distinguishing characters to construct a distinguisher with more advantage.An optimal combined distinguisher based on multiple independent distinguishing characters was proposed.The computing method of distinguishing advantage of this combined distinguisher was presented and the conclusion was given that the data complexity decreased on the condition of same distinguishing advantage,and the distinguishing advantage increased on the condition of the same data complexity when more distinguishing characters were used in distinguishing attack.Let N denote the data complexity of distinguisher with only one character,then the data complexity of combined distinguisher with k-independent characters was about N/k for special case that all distinguishing advantages of k-independent characters were equal.…”
    Get full text
    Article
  18. 2118

    Autonomous drone warfare by Martín Carbajo-Núñez OFM

    Published 2022-10-01
    “… Recently, a military robot has autonomously taken the decision to attack enemy troops in the Libyan war without waiting for any human intervention. …”
    Get full text
    Article
  19. 2119

    A CFD analysis of NACA 0015 airfoil as a horizontal stabilizer with gap length variations by Gunawan Nugroho, Herman Sasongko, Mohammad Adenan, Sarwono, Heru Mirmanto

    Published 2023-06-01
    “…For the 2 degree angle of attack and 20 degree of elevetor deflection angle, the lift coefficient is 0.93 (gap length 1.75%). …”
    Get full text
    Article
  20. 2120

    Artificial Intelligence and Physics-Based Anomaly Detection in the Smart Grid: A Survey by Giovanni Battista Gaggero, Paola Girdinio, Mario Marchese

    Published 2025-01-01
    “…However, this increased complexity introduces new vulnerabilities, heightening risks of cyber-attacks, equipment failures, and other anomalies. …”
    Get full text
    Article