Showing 2,161 - 2,180 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 2161

    Data processing based on the privacy-preserving vector for wireless sensor networks by Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, Shi-ming HE, Peng CHEN

    Published 2015-09-01
    “…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
    Get full text
    Article
  2. 2162

    Thrips in Florida Strawberry Crops by Jeffrey D. Cluever, Hugh A. Smith, Joe E. Funderburk, Galen Frantz

    Published 2015-06-01
    “… Strawberries grown in Florida are attacked by several pests, including flower thrips. …”
    Get full text
    Article
  3. 2163

    Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3

    Published 2010-01-01
    “…Under the random oracle model, the proposed scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. The security of scheme relied on the hardness of the computational Diffie-Hellman problem (CDHP). …”
    Get full text
    Article
  4. 2164

    Photodegradation of Sulfadiazine in Aqueous Solution and the Affecting Factors by Xuesen Bian, Jibing Zhang

    Published 2016-01-01
    “…This study suggested that sulfadiazine photodegradation under UV light is generally favored by the attack of hydroxyl radicals.…”
    Get full text
    Article
  5. 2165

    Prevalence of Stylopization of Sphex ichneumoneus (L.) (Hymenoptera: Sphecidae) by Paraxenos westwoodi (Templeton) (Strepsiptera: Xenidae) by Richard S. Miller, April M. Pearce, Kevin M. O'Neill

    Published 2009-01-01
    “…Our estimate is based on a sample size larger than those usually reported for strepsipterans attacking solitary aculeate wasps. We review the literature on strepsipteran prevalence in solitary aculeate wasps and provide an updated list of solitary wasps known to act of strepsipteran hosts in North America.…”
    Get full text
    Article
  6. 2166

    Study of BGP secure scheme based on divide and conquer strategy by Bin WANG, Jin-liang AN, Chun-ming WU, Ju-long LAN

    Published 2012-05-01
    “…A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was proposed,which used the aggregate signatures algorithm based on RSA.The SA-BGP has strong ability of security that can effectively verify the propriety of IP prefix origination and verifies the validity of an AS to announce network layer reachability information (NLRI).SA-BGP can large-scale reduced the number of the used certificates.Performance evaluation results that SA-BGP can be implemented efficiently and the incurred overhead,in terms of time and space,ptable in practice.…”
    Get full text
    Article
  7. 2167

    Du détroit de Malacca jusqu’à sa périphérie by Eric Frécon

    Published 2009-09-01
    “…In the surrounding areas of the Malacca Strait, there have already been attacks in 2008. Furthermore, the current economic crisis obliges parties concerned to stay vigilant. …”
    Get full text
    Article
  8. 2168

    Research on intrusion detection based on network events and deep protocol analysis by ZHU Ying-ying, WU Jin-feng, MING Zhong

    Published 2011-01-01
    “…The problems for restricting NIDS were investigated.Based on network events and deep protocol analysis,a new model MIDM analyzing and integrating network intrusion was proposed.After extending ABNF to describe network events,a new NIDS was built based on MIDM.Experimental results proved that,comparing to the current mainstream NIDS,the model MIDM can work effectively with less false positive rate and less redundancy of rule base.And if net-work stream and rule base were extended quickly,the CPU utilization of new model’s would remain low growth,which makes MIDM better adapt to high-speed network.And it’s also able to detect some unknown attacks and sustain rule gen-eralization.…”
    Get full text
    Article
  9. 2169

    A Series on Diseases in the Florida Vegetable Garden: TOMATO by Ken Pernezny, Tim Momol

    Published 2004-10-01
    “…The pathogenic microorganisms that attack garden vegetables, including tomato, can be classified into three major groups: fungi, bacteria, and viruses. …”
    Get full text
    Article
  10. 2170

    Cooperative Guidance of Seeker-Less Missiles for Precise Hit by Jianbo Zhao, Fenfen Xiong

    Published 2019-01-01
    “…A novel cooperative guidance scenario is proposed that implements fire-and-forget attacks for seeker-less missiles with a cheap finder for stationary targets and without requiring real-time communication among missiles or precise position information. …”
    Get full text
    Article
  11. 2171

    Robust video watermarking algorithm for H.264/AVC based on texture feature by Wei-wei ZHANG, Ru ZHANG, Jian-yi LIU, Xin-xin NIU, Yi-xian YANG

    Published 2012-03-01
    “…On the basis of analyzing some existing video watermarking al ithms and combining with the new features of the H.264/AVC video coding standard,a new robust video watermarking algorithm based on texture feature was proposed.The proposed algorithm firstly performs the 4×4 integer discrete cosine transform on the current frame in purpose of identifying whether it is the texture block.Then the watermarking is embedded by adopting the way of differential energy for selecting the appropriate coefficients adaptively.The experimental result shows that the proposed algorithm has little impact on the video quality and bit-rate,moreover,its robustness can effectively resist the common attacks such as the gauss noise,low pass filter and re-coded performed on the video watermarking.…”
    Get full text
    Article
  12. 2172

    NSAIDs and Triptans – a (not) New Treatment Option for Migraine by B. Kakta, Rasa Mameniškienė

    Published 2023-12-01
    “…Non-steroidal anti-inflammatory drugs and triptans are first line treatment of a migraine attack. Nevertheless, when used in combination, these medications deliver a synergistic action. …”
    Get full text
    Article
  13. 2173

    Treating COVID-19 using Micro RNA by Eskandar Kirolos

    Published 2023-06-01
    “…That resulted in an incredible increase in the rate of death, in particular for old people who are suffering from other diseases and have frailty in their immunity that permit viruses attacks. Various dense research is under working, as a way to uncover a cure or a vaccine on the long term. …”
    Get full text
    Article
  14. 2174

    Florida Bromeliad Weevil (no official common name), Metamasius mosieri Barber (Insecta: Coleoptera: Curculionidae: Dryophthorinae) by Barbra Larson, J. Howard Frank, Olan Ray Creel

    Published 2003-10-01
    “…It should not be confused with the Mexican bromeliad weevil, Metamasius callizona, which is currently attacking five species of native bromeliads in 16 counties and will likely destroy populations of six additional species of already-threatened or endangered bromeliads if not brought under control. …”
    Get full text
    Article
  15. 2175

    A compressive data gathering method based on El Gamal cryptography by Xiaohan YU, Keming DONG, Xia LI, Chao CHEN

    Published 2019-12-01
    “…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
    Get full text
    Article
  16. 2176

    Tawny Crazy Ant by Stephanie K. Hill, Rebecca W. Baldwin, Roberto M. Pereira, Philip G. Koehler

    Published 2015-08-01
    “…This species infests buildings and greenhouses, attacks crops, domestic animals, honeybee hives, displaces native ant species, and disrupts electrical equipment. …”
    Get full text
    Article
  17. 2177

    « The Fault is that she is my wife » : L’ambivalence des représentations d’Henriette-Marie (1625-1649) by Alice Leroy

    Published 2021-10-01
    “…While her very presence reinforced the trope of Charles I as husband to the nation and father to his people, she also became a source of anxiety at a period when popery and the very institution of the monarchy came under violent attack from a part of the English people.…”
    Get full text
    Article
  18. 2178

    Juifs d'Istanbul, territorialités d'une communauté entre recompositions et dislocations by Yoann Morvan

    Published 2011-07-01
    “…Nowadays, behind an apparent optimism, the situation of the Jewish minority is more and more worrying because of internal and external reasons: attacks increase of anti-Semitism and political and geopolitical contexts damage the confidence; in the same time the community’s cohesion is breaking down due to urban sprawl. …”
    Get full text
    Article
  19. 2179

    Efficient ID-based certificateless signature scheme by LIU Jing-wei, SUN Rong, MA Wen-ping

    Published 2008-01-01
    “…Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. This scheme not only eliminated the inherent key escrow problem but also had a higher efficiency than the existing schemes did.…”
    Get full text
    Article
  20. 2180

    Binocular suppression based asymmetrical stereo image watermarking with self-recovery by Ting LUO, Gang-yi JIANG, Xiao-dong WANG, Mei YU, Zong-ju PENG, Feng SHAO

    Published 2013-06-01
    “…To authenticate the integrity of stereo image,an asymmetrical stereo image watermarking scheme based on binocular suppression was proposed.Firstly,according to the features of stereo vision,the computation of binocular sup-pression model was established.The concept of asymmetric stereo image watermarking was defined that two views of stereo image were embedded with different data payloads.Then,discrete wavelet transform was employed to generate different types of recovery watermark for each block,and their copies were embedded into two or three different mapping blocks to improve the quality of recovery.The experimental results demonstrate that the proposed method can detect and recover different kinds of tamper effectively,such as collage attack,and the recovered quality is better than those of other existing and extended mono-image watermarking methods.…”
    Get full text
    Article