Showing 2,121 - 2,140 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 2121

    Proinflammatory Effects of C-Peptide in Different Tissues by Dusica Vasic, Daniel Walcher

    Published 2012-01-01
    “…Atherosclerosis is well known as an inflammatory disease that can lead to clinical complications such as heart attack or stroke. C-peptide as a cleavage product of proinsulin is in the last few decades known as an active peptide with a number of different effects on microvascular and macrovascular complications in type 2 diabetic patients. …”
    Get full text
    Article
  2. 2122

    Sliding Mode Observer and Control Design with Adaptive Parameter Estimation for a Supersonic Flight Vehicle by M. Bahrami, B. Ebrahimi, G. R. Ansarifar

    Published 2010-01-01
    “…Design and synthesis of a nonlinear generic supersonic flight vehicle longitudinal dynamics control for angle-of-attack, AOA, output tracking in the atmospheric flight is presented based on sliding mode control. …”
    Get full text
    Article
  3. 2123

    A New Impact Time and Angle Control Guidance Law for Stationary and Nonmaneuvering Targets by Zhe Yang, Hui Wang, Defu Lin, Luyao Zang

    Published 2016-01-01
    “…A guidance problem for impact time and angle control applicable to cooperative attack is considered based on the sliding mode control. …”
    Get full text
    Article
  4. 2124

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…The test results showed that the suggested image scheme is very secure and impervious to differential, statistical analysis, and other types of attacks. Furthermore, the majority assessment shows that the presented approach performs noticeably better than previous techniques.…”
    Get full text
    Article
  5. 2125
  6. 2126

    Two-factor wearable device authentication protocol based on PUF and IPI by Jun WANG, Shu-bo LIU, Cai LIANG, Yong-kai LI

    Published 2017-06-01
    “…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
    Get full text
    Article
  7. 2127

    Fever-Associated Supraventricular Tachycardia after 4CMenB Vaccination in an Infant by Erdem Gönüllü, Burcu Topçu, Naci Öner, Ahmet Soysal, Metin Karaböcüoğlu

    Published 2019-01-01
    “…During three months of follow-up, she was free of further SVT attacks. Conclusion. This is the first report of ECG-proven SVT after 4CMenB vaccination. …”
    Get full text
    Article
  8. 2128

    Application of the Gordon Loeb model to security investment metrics: a proposal by Maria Francesca Carfora, Albina Orlando

    Published 2024-12-01
    “…The consequences of a cyber attack can be quite severe. Investing in security to mitigate the impact of such risks is a crucial task, both in terms of the frequency and the severity of cyber incidents. …”
    Get full text
    Article
  9. 2129

    Research on area-efficient low-entropy masking scheme for AES by Jiuxing JIANG, Jiao HOU, Hai HUANG, Yuying ZHAO, Xinxin FENG

    Published 2019-05-01
    “…Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme.For the AES,the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn’t included).Compared with the RSM,the combinational logic,the dedicated logic and the memory size are reduced to 69%,60% and 80% respectively.In addition,the theoretical analysis shows that the proposed scheme can resist offset based CPA attack,thus has higher security than the RSM.…”
    Get full text
    Article
  10. 2130

    Diplomacy and Recruitment of Mercenaries before the Battle of Žalgiris by Sven Ekdahl

    Published 2010-06-01
    “…Ulrich von Jungingen got this message by the king's emissary on 11 May and immediately stopped the preparations for an intended surprise attack on Poland on 1 June. He had regarded such an attack as legitimate, because the Poles had rejected the arbitration by King Venceslas, and had for that purpose secretly recruited 1,800 mercenaries. …”
    Get full text
    Article
  11. 2131

    Phenotypic and transcriptomic analyses reveal major differences between apple and pear scab nonhost resistance by Vergne, Emilie, Chevreau, Elisabeth, Ravon, Elisa, Gaillard, Sylvain, Pelletier, Sandra, Bahut, Muriel, Perchepied, Laure

    Published 2023-01-01
    “…Apple (Malus x domestica Borkh.) have a nonhost resistance to Venturia pyrina, the scab species attacking European pear (Pyrus communis L.). Reciprocally, P. communis have a nonhost resistance to Venturia inaequalis, the scab species attacking apple. …”
    Get full text
    Article
  12. 2132

    Performance Analysis of 2022 Women’s European Football Champion England National Team by Gizem Başkaya

    Published 2022-12-01
    “…In addition, considering that the most important factor determining the result in football is goals and that these goals are the result of organized attacks, it is important that the football players other than the strikers contribute to the score, and that the organizational studies are important, therefore it is necessary to plan the technical-tactical studies of the teams accordingly. is thought to be useful.…”
    Get full text
    Article
  13. 2133

    Assessing favipiravir impact on SARS-CoV-2 transmission within households: Insights from a multi-center study (FaviPrev) by Taweegrit Siripongboonsitti, Marisa Muadchimkaew, Kriangkrai Tawinprai, Ornisa Issaranon, Wichuda Meepholkij, Pureepat Arttawejkul, Apiradee Vararungzarit, Onwalee Dhissayakamol, Wilaiporn Preeyachit, Kamonwan Soonklang, Nithi Mahanonda

    Published 2024-12-01
    “…Favipiravir led to a 58 % secondary attack rate, substantially lower than the 71.8 % observed with standard treatment, representing a 54 % reduction in transmission likelihood, with an odds ratio of 0.46 (95 % confidence interval [CI] [0.23–0.89]). …”
    Get full text
    Article
  14. 2134

    MRI-based analysis of the microstructure of the thalamus and hypothalamus and functional connectivity between cortical networks in episodic cluster headache by Chiara Abagnale, Antonio Di Renzo, Giada Giuliani, Gabriele Sebastianelli, Francesco Casillo, Lucia Ziccardi, Vincenzo Parisi, Cherubino Di Lorenzo, Mariano Serrao, Francesca Caramia, Vittorio Di Piero, Gianluca Coppola

    Published 2025-01-01
    “…We investigated differences in resting-state functional connectivity (FC) between brain networks and its relationship with the microstructure of the hypothalamus and thalamus in patients with episodic CH outside attacks and healthy controls (HCs). Methods We collected 3T MRI data from 26 patients with CH during the in-bout period outside the attacks and compared them with data from 20 HCs. …”
    Get full text
    Article
  15. 2135

    A study on sexual violence among women in Northern Ethiopia's 2022 conflict: mixed methods by Atitegeb Abera Kidie, Seteamlak Adane Masresha, Birtukan Gizachew Ayal, Kindie Mekuria, Tsion Kokeb Kodo, Abayneh Tunta Boye, Misganaw Guadie Tiruneh, Fassikaw Kebede Bizuneh, Eneyew Talie Fenta

    Published 2025-01-01
    “…Factors such as being a prostitute, having a lower income, and living in attacked villages were significant predictors of this violence. …”
    Get full text
    Article
  16. 2136

    Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11 by Noor Sattar Noor, Dalal Abdulmohsin Hammood, Ali Al-Naji

    Published 2022-09-01
    “…This paper provided a detailed explanation of the types of attackers according to their layer, in addition to the design of a wireless sensor network consisting of a temperature and humidity sensor called the DHT-11 and a Raspberry Pi to implement the Text-To-Image Encryption/Decryption algorithm based on CMYK mode (TTIED-CMYK) in these networks. …”
    Get full text
    Article
  17. 2137

    Seizures and Blurred Vision as Initial Presentation of Intracerebral Schwannoma: A Rare Tumor of the Brain by Mohammad Alayyaf, Nour Taher Nasir

    Published 2019-01-01
    “…Here, we are reporting a case of an 18-year-old male who presented with attacks of seizures. MR imaging studies were done and showed right parieto-occipital cortical and subcortical mass lesion with intense enhancement and significant vasogenic oedema with mass effect on the subjacent sulci. …”
    Get full text
    Article
  18. 2138

    Higher-order differences based research on comparison between type-1 generalized Feistel-SP network and Feistel-SPSP network by ONGLe D, UJiao D, UWen-ling W

    Published 2014-07-01
    “…As a result, the dou-ble-SP model is weaker than the single-SP model against the higher-order differential attack under the 4-line type-1 Feis-tel structure.…”
    Get full text
    Article
  19. 2139

    Phytophthora Identification and Sampling in Citrus Nurseries by Jamie D. Burrow, Diane B. Bright, Tim D. Riley, Evan G. Johnson, James H. Graham

    Published 2019-07-01
    “… Phytophthora species are important soilborne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
    Get full text
    Article
  20. 2140

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems

    Published 2012-03-01
    “… This rather large, yellow-brown, fruit fly with yellow and dark-brown markings exists in several South American countries, and attacks watermelon and other fruits of the family Cucurbitaceae. …”
    Get full text
    Article