Showing 2,181 - 2,200 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 2181

    Cardiac Calcified Amorphous Tumor in the Neonatal Period by Mohammad Nasir Hematian, Kamran Hessami, Maasoumeh Saleh, Abolfazl Shirdel Abdolmaleki, Shirin Torabi, Sedigheh Hantoushzadeh

    Published 2022-01-01
    “…In this report, we presented a 4-month-old male baby with repeated attacks of cyanosis and a cardiac murmur. Echocardiography revealed a tumoral noncircumscribed mass in the right atrium adhering to the interatrial septum which extends to the inferior vena cava. …”
    Get full text
    Article
  2. 2182

    Password-based three-party authenticated key exchange protocol from lattices by Jinxia YU, Huanhuan LIAN, Yongli TANG, Mengyao SHI, Zongqu ZHAO

    Published 2018-11-01
    “…Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.…”
    Get full text
    Article
  3. 2183

    Synaptic Plasticity and Neurological Disorders in Neurotropic Viral Infections by Venkata Subba Rao Atluri, Melissa Hidalgo, Thangavel Samikkannu, Kesava Rao Venkata Kurapati, Madhavan Nair

    Published 2015-01-01
    “…Based on the type of cells or tissues they tend to harbor or attack, many of the viruses are characterized. But, in case of neurotropic viruses, it is not possible to classify them based on their tropism because many of them are not primarily neurotropic. …”
    Get full text
    Article
  4. 2184

    Methodical Contributions Regarding the Improvement of Physical Training in U16 Female Volleyball Players by L. Rada, E.L. Amzar, I.I. Niculescu

    Published 2024-07-01
    “…The victory of the team can only be achieved if the ratios between the motor qualities, the height of the players, and the overall effectiveness of the team are optimized in the two fundamental phases: attack and defense. A selection of the means applied in physical training must be made in accordance with the technical needs imposed by the sports branch, in order that the muscle groups involved in the achievement of specific movements to be well prepared, and the technical-tactical actions can be performed at their maximum potential.…”
    Get full text
    Article
  5. 2185

    Numerical Analysis for a Fractional Differential Time-Delay Model of HIV Infection of CD4+ T-Cell Proliferation under Antiretroviral Therapy by Yiliang Liu, Peifen Lu, Ivan Szanto

    Published 2014-01-01
    “…At last, we extend the model to incorporate the term which we consider the loss of virion and a bilinear term during attacking the target cells.…”
    Get full text
    Article
  6. 2186

    Completed local binary pattern based speech anti-spoofing by Jian XU, Zhihua JIAN, Jiaqi YU, Yifan JIN, Lin YOU, Yunlu WANG

    Published 2021-05-01
    “…In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was proposed.In this method, the spectrogram of speech signals is generated by the variable Q transformation (VQT) and used to train the true/spoofed speech classifier, so as to perform the detection of disguised speech.The experimental results demonstrate that the proposed anti-spoofing method based on the CLBP in the detection of voice conversion deception is better than the LBP-based algorithm, and when the parameter γ in VQT is set to 50, the detection system based on CLBP and SVM-RBF has the best performance for anti-spoofing the disguise speech.…”
    Get full text
    Article
  7. 2187

    Architecture and mechanisms for secure and efficient internetworking of heterogeneous network by Hongbin LUO, Shan ZHANG, Zhiyuan WANG

    Published 2022-04-01
    “…An architecture named CoLoR (coupling service location and inter-domain routing) was introduced to securely and efficiently interconnect networks with different architectures (called heterogeneous networks below).First, the fundamental challenges and scientific problems that have to be addressed by CoLoR were raised.Then, the core aspects of CoLoR were described, including how to characterize and represent the cyberphysical system comprised by heterogeneous networks, the network architecture, the basic communication model and how secure internetworking was achieved.After that, results from prototype implementation were presented to demonstrate the feasibility and capability of CoLoR, including defending against attacks and preventing data leakage.Finally, some open issues were outlined for future studies.…”
    Get full text
    Article
  8. 2188

    N.P. VAN WYK LOUW AS SATIRIKUS by HP van Coller

    Published 2019-12-01
    “…The definition of satire proposed in this article is that satire is an implied or explicit attack on a satirical object, but also with the suggestion at least of an explicit satirical norm. …”
    Get full text
    Article
  9. 2189

    Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior by Weifu Zou, Yiying Zhang, Suxiang Zhang, Chengyue Yang

    Published 2014-11-01
    “…Trojans inject systems and launch various attacks, such as eavesdropping secret information, tampering with system configuration etc., which threats to system security seriously. …”
    Get full text
    Article
  10. 2190

    La lettre perdue by Philippe Dufour

    Published 2010-12-01
    “…These three types of readings all attacked the orthodoxy: Strauss dismantled the historical foundations of the origins of Christianity. …”
    Get full text
    Article
  11. 2191

    Proactive migration model of SWIM service based on situation awareness by Zhijun WU, Shengyan ZHOU, Jin LEI

    Published 2019-08-01
    “…To solve the problem that in the system wide information management (SWIM) network,the SWIM service provider suffers from SWIM service interruption,service delay increase or service quality degradation due to malicious attack or self-failure.Therefore,a proactive migration model of SWIM service was proposed on the basis of situation awareness,which used the random forest algorithm to timely judge the SWIM service provider security situation.SWIM service authority was actively migrated according to security situation,and the emergencies impact on SWIM services were reduces.Experimental results show that the proposed model can guarantee services continuity in an emergency event,which has higher reliability and stability than SWIM network in which the service migration model is not deployed.…”
    Get full text
    Article
  12. 2192

    Implementation and evaluation of big data desensitization system based on format-preserving encryption by Chaoyi BIAN, Shaomin ZHU, Tao ZHOU

    Published 2017-03-01
    “…Data desensitization is a process that makes some special transformations on sensitive data in order to protect the secrecy and privacy from being acquired by malicious attackers.Format-preserving encryption is one of the techniques of data desensitization, which has the advantage of keeping data format unchanged so that the upper layer applications are not affected.Along with the coming of big data and the wide application of the Hadoop platform, data desensitization techniques for traditional relational database management systems cannot satisfy the need of production. …”
    Get full text
    Article
  13. 2193

    Study on user behavior profiling in insider threat detection by Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG

    Published 2018-12-01
    “…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks details. …”
    Get full text
    Article
  14. 2194

    Two Cases of Schimmelpenning Syndrome by Aniruddha Gulanikar, Aruna Gunreddy

    Published 2025-01-01
    “…A 3-year-old girl has a large sebaceous nevus on her scalp and face, along with seizures and transient ischemic attacks. Examination and tests reveal coarctation of the aorta, eyelid colobomas, and other findings. …”
    Get full text
    Article
  15. 2195

    Anonymous survey system based on NIZK by Lu LIU, Yu-xi LI, Fu-cai ZHOU

    Published 2016-12-01
    “…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
    Get full text
    Article
  16. 2196

    Dynamic trust evaluation model based on evaluation credibility in cloud computing by Lin ZHANG, Kai-li RAO, Ru-chuan WANG

    Published 2013-08-01
    “…Simulation results show that the model results are closer to the cloud service provider's actual trust value, and can resist the attack of malicious cloud users effectively.…”
    Get full text
    Article
  17. 2197

    Caribbean Fruit Fly, Anastrepha suspensa (Loew) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr., John B. Heppner, Thomas R. Fasulo, James L. Nation

    Published 2004-04-01
    “…It is a near relative of the Mexican fruit fly, Anastrepha ludens (Loew), and is one of several species of fruit flies which are indigenous to the West Indies and the larvae of which attack several kinds of tropical and subtropical fruits. …”
    Get full text
    Article
  18. 2198

    Acaro del coco, Aceria guerreronis Keifer (Arácnidae: Acari: Eriophyidae) by Forrest W. Howard, Dave Moore, Edwin Abreu, Sergio Gallo

    Published 2007-10-01
    “…It describes one of the worst arthropod pests of coconut palms, which attacks the young fruits and can cause scarring and distortion and premature fruit drop. …”
    Get full text
    Article
  19. 2199

    Message encryption and authentication mechanism based on wireless physical layer key by Xingzhi,JINLiang LI, Zhou ZHONG, Yangming LOU

    Published 2018-08-01
    “…In order to solve the problem of hidden key leakage in traditional high-level message authentication and passive eavesdropping in physical layer message authentication,a message encryption and authentication mechanism based on the characteristics of wireless physical layer was proposed.By extracting the characteristics of the wireless channel,the physical layer key was generated and the seed key was generated by combining the identity key.The key stream generator then generated the key stream to decrypt the message according to the extracted seed,protects the privacy of the transmitted data,and the final receiver authenticated the authenticity and integrity of the received message through the CRC verification result.Simulation results show that the proposed method has better performance in preventing passive eavesdropping and active attack,and the randomness of key stream is greatly improved and the rate of authentication leak detection is reduced by half.…”
    Get full text
    Article
  20. 2200

    Diversity of controllable anonymous communication system by Yan-wei ZHOU, Zhen-qiang WU, Bo YANG

    Published 2015-06-01
    “…With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.…”
    Get full text
    Article