Showing 2,141 - 2,160 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 2141

    Florida Bromeliad Weevil (no official common name), Metamasius mosieri Barber (Insecta: Coleoptera: Curculionidae: Dryophthorinae) by Barbra Larson, J. Howard Frank, Olan Ray Creel

    Published 2003-10-01
    “…It should not be confused with the Mexican bromeliad weevil, Metamasius callizona, which is currently attacking five species of native bromeliads in 16 counties and will likely destroy populations of six additional species of already-threatened or endangered bromeliads if not brought under control. …”
    Get full text
    Article
  2. 2142

    Secure supply and demand relationship perception routing in intermittently connected wireless networks by Peng YANG, Yang TANG, Na SHU, Ru-yan WANG

    Published 2015-11-01
    “…Because of low message delivery probability and nodes malicious attack behaviors in the quota-limit routing for intermittently connected wireless networks,a secure routing is proposed based on supply and demand relationship perception.According to activity degree,average residual buffer ratio of neighbors and encountered nodes reputation dynamically perceived by nodes,the encountered nodes in real time build the supply and demand model and determine the message quota allocation combined with the message survival ratio in common.When network status meets constraint situations,update message quota dynamically based on demand elasticity of message.Simulation results show that the proposed strategy effectively reduces influence of nodes malicious behaviors and improve network performance greatly.…”
    Get full text
    Article
  3. 2143

    Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI

    Published 2016-06-01
    “…In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.…”
    Get full text
    Article
  4. 2144

    Lattice-based verifiable timed signature and application by CHEN Huiyan, WANG Qingnan, WANG Ke, TAN Shuncong, XIN Hongcai

    Published 2024-10-01
    “…Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over lattices. …”
    Get full text
    Article
  5. 2145

    Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms by Pushpa Mala Siddaraju, Devappa Jayadevappa, Kaliyamoorthy Ezhilarasan

    Published 2015-01-01
    “…The proposed scheme is tested on mammograms images and is subjected to common attacks like Gaussian filtering, median filtering, compression, sharpening, and contrast adjustments. …”
    Get full text
    Article
  6. 2146

    Detection of phishing websites based on the improved TrustRank algorithm by Hao HAN, Bowen LIU, Guoyuan LIN

    Published 2018-03-01
    “…Anti-phishing methods just generally detect phishing sites based on comparing the similarity of pages features,which could be anti-detected when attackers are clear about the extraction process of features.Therefore,a method based on web pages relationship was proposed to detect phishing websites.According to this method,phishing websites were detected by an improved TrustRank algorithm which set up a collection of web pages and used the link relationship between phishing websites and other websites.Experiments show that the improved TrustRank algorithm can focus the trust values of phishing websites on some range with the lower false positive rate,the lower false negative rate and the higher speed compared to other methods.…”
    Get full text
    Article
  7. 2147

    Thrips in Florida Strawberry Crops by Jeffrey D. Cluever, Hugh A. Smith, Joe E. Funderburk, Galen Frantz

    Published 2015-06-01
    “… Strawberries grown in Florida are attacked by several pests, including flower thrips. …”
    Get full text
    Article
  8. 2148

    A Three-Dimensional Cooperative Guidance Law of Multimissile System by Xing Wei, Yongji Wang, Shuai Dong, Lei Liu

    Published 2015-01-01
    “…In order to conduct saturation attacks on a static target, the cooperative guidance problem of multimissile system is researched. …”
    Get full text
    Article
  9. 2149

    Annoying Hiccups following Intra-Articular Corticosteroid Injection of Betamethasone Acetate/Betamethasone Sodium Phosphate at the Knee Joint by George Habib, Suheil Artul, Geries Hakim

    Published 2013-01-01
    “…Usually, this phenomenon of hiccups responds to regular antihiccups treatment; however, it is recommended not to repeat an IACI in a patient who had this adverse effect before due to an expected severe recurrent attack of hiccups afterwards.…”
    Get full text
    Article
  10. 2150

    Silencing Mechanisms in Academia: Towards Collaborative Innovation to Support Critical Social Science by Mustafa F. Özbilgin, Cihat Erbil

    Published 2024-12-01
    “…We explain three dominant silencing mechanisms in academia that frame the backlash and attacks against CSS. Theorising collaborative innovation, we offer multilevel and inclusive design and solidarity as possible venues for resistance against the ongoing purge of CSS, which undermines autonomy, freedom of speech, and equality in academia.…”
    Get full text
    Article
  11. 2151

    Le canard a-t-il coulé la moule du Québec ? Construire un problème de prédation, dépolitiser un échec économique by Antoine Police

    Published 2023-12-01
    “…Several species of migratory birds, known as "sea ducks", are attacking sea-based cultivation lines, jeopardizing the province's mussel-growing industry. …”
    Get full text
    Article
  12. 2152

    Decision-level fusion model of multi-source intrusion detection alerts by LI Zhi-dong, YANG Wu, WANG Wei, MAN Da-peng

    Published 2011-01-01
    “…In order to lessen the dependence on training samples significantly and eliminate rigorous constraint conditions,an alert fusion model that supports online incremental training was presented.Firstly,primary alerts vector was mapped to voting pattern,so as to reduce statistical space.Then,the conditional probability distributions of various voting patterns in normal or attack traffic were inferred via training.Afterwards,according to the variation of statistical characteristics,the composition of the traffic being detected was inferred instantly.Finally,fusion decision was made via threshold constraint method and Bayesian inference.Besides extended applicative scope,the model proposed can track and adapt to the traffic being detected well,and improve detection performance significantly only via small scale training.…”
    Get full text
    Article
  13. 2153

    Tawny Crazy Ant by Stephanie K. Hill, Rebecca W. Baldwin, Roberto M. Pereira, Philip G. Koehler

    Published 2015-08-01
    “…This species infests buildings and greenhouses, attacks crops, domestic animals, honeybee hives, displaces native ant species, and disrupts electrical equipment. …”
    Get full text
    Article
  14. 2154

    FORCES AND DISPLACEMENTS DISTRIBUTION AFTER FEM ANALYSIS OF VIBRATORY WORKING TOOL by NELUS-EVELIN GHEORGHITA

    Published 2021-06-01
    “…According to prior studies, the angle of attack after the forces have been applied should not exceed 80 degrees. …”
    Get full text
    Article
  15. 2155

    Provable secure mutual RFID authentication protocol based on QC-MDPC code by Ze-hui LI, Ya-tao YANG, Zi-chen LI

    Published 2014-11-01
    “…The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system,a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols,this protocol is more suitable for RFID system in areas of interaction,computation and storage,which owns limited resource and needs high efficiency.…”
    Get full text
    Article
  16. 2156

    Treating COVID-19 using Micro RNA by Eskandar Kirolos

    Published 2023-06-01
    “…That resulted in an incredible increase in the rate of death, in particular for old people who are suffering from other diseases and have frailty in their immunity that permit viruses attacks. Various dense research is under working, as a way to uncover a cure or a vaccine on the long term. …”
    Get full text
    Article
  17. 2157

    Phytophthora Identification and Sampling in Citrus Nurseries by Jamie D. Burrow, Diane B. Bright, Tim D. Riley, Evan G. Johnson, James H. Graham

    Published 2019-07-01
    “… Phytophthora species are important soilborne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
    Get full text
    Article
  18. 2158

    Animal Bites in ENT by Saba Erfan, Prithvi Das, Somnath Saha

    Published 2023-09-01
    “…Case reports: The first two case reports deal with tiger attack and the other two involve bites by the pet dogs. …”
    Get full text
    Article
  19. 2159

    Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection by Yufeng Li, Shoulian Qian, Julong Lan, Xiaoqiang Guo, Bo Chen

    Published 2015-06-01
    “…Increasingly serious network security situation has made video website,broadcasting network and other video sending systems become more and more vulnerable to network attack. The video fingerprint management system which could protect video security on transmit line in real time was proposed. …”
    Get full text
    Article
  20. 2160

    Les papiers de Baya Hocine. Une source pour l’histoire des prisons algériennes pendant la guerre d’indépendance (1954-1962) by Sylvie Thénault

    Published 2019-06-01
    “…In 1958, a search of the prison of Barbarossa in Algiers led to the confiscation of the Journal, notes and correspondence of Baya Hocine, a young female detainee of 17 years, sentenced to death for an attack. Written in the intimate style of a personal diary, Hocine’s papers are a valuable source for the historiography of prisons during the Algerian War of Independence (1954-1962). …”
    Get full text
    Article