Showing 2,241 - 2,260 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 2241

    Solubility of Structurally Complicated Materials: 3. Hair by Ari L. Horvath

    Published 2009-01-01
    “…Small molecular solvents and molecules with hydrophobic groups appear to have higher affinity for hair. A good solvent attacks the disulfide bonds between cystine molecules and hydrates the hair shaft. …”
    Get full text
    Article
  2. 2242

    Identity-based cloud storage integrity checking from lattices by Miaomiao TIAN, Chuang GAO, Jie CHEN

    Published 2019-04-01
    “…With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.…”
    Get full text
    Article
  3. 2243

    Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Heteroptera: Miridae) by Wayne N. Dixon, Thomas R. Fasulo

    Published 2004-07-01
    “… Lygus lineolaris (Palisot de Beauvois), the tarnished plant bug, attacks a wide variety of economically important herbaceous plants, vegetable crops, commercial flower plants, fruit trees, and nursery stock (Kelton 1975). …”
    Get full text
    Article
  4. 2244

    « Writing into a Void » : Charles Bukowski and the Little Magazines by Abel Debritto

    Published 2012-04-01
    “…Bukowski’s position was ambiguous: he needed those periodicals to satisfy his hunger for exposure and recognition and, yet, he attacked their editors for their allegedly unskillful productions, especially in the case of the mimeographs. …”
    Get full text
    Article
  5. 2245

    Acaro del coco, Aceria guerreronis Keifer (Arácnidae: Acari: Eriophyidae) by Forrest W. Howard, Dave Moore, Edwin Abreu, Sergio Gallo

    Published 2007-10-01
    “…It describes one of the worst arthropod pests of coconut palms, which attacks the young fruits and can cause scarring and distortion and premature fruit drop. …”
    Get full text
    Article
  6. 2246

    Armenian – Mamluks Relations by Fatma, AKKUŞ YİĞİT

    Published 2015-06-01
    “…However, the Armenians, they apply their attacks and with trade embargoes, they were made themselves the target of the Mamluk State. …”
    Get full text
    Article
  7. 2247

    Modernisation de l’agriculture et santé mentale : les contradictions au travail by Philippe Spoljar

    Published 2015-04-01
    “…This transverse glance helps to situate the process of embrittlement and dynamic critical that appear in contexts initially distant from the actual work and then come « attack links’ to crystallize in situations of impasse affecting professional practice hard family and personal life, and finally the farmers / breeders mental health.…”
    Get full text
    Article
  8. 2248

    Focus : Les archives audiovisuelles de la justice by Martine Sin Blima-Barru

    Published 2024-10-01
    “…Since then, 28 trials have been recorded: crimes committed during the Second World War, crimes against humanity, crimes of genocide against the Tutsi in Rwanda, crimes of terrorist attacks. The historical subjects characterise their recording. …”
    Get full text
    Article
  9. 2249

    Watermarking algorithm for image authentication based on second generation Bandelet by LIU Xu-chong1, LUO Yong1, WANG Jian-xin1, WANG Jie1

    Published 2010-01-01
    “…A watermarking algorithm for image authentication was designed,which was based on second generation Bandelet translation and statistical model.The image directional flow was constructed by using Bandelet,and it could depict the characteristic of the image.By applying noise visibility function,the noise visibility intensity algorithm which was based on Gaussian statistical models was proposed.The blocks of image which contain more texture information were selected to hide the image directional flow,based on the noise visibility intensity algorithm.The image was authen-ticated through comparing the hiding information and the carrier image directional flow created by Bandelet.Experimen-tal results show that the algorithm can resist the JPEG compression and noise attack strongly and guarantee the quality of the sight.It is a blind detection algorithm,and this algorithm has high concealment performance and security.…”
    Get full text
    Article
  10. 2250

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
    Get full text
    Article
  11. 2251

    Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security by Javier Blesa, Alvaro Araujo, Elena Romero, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such as Cognitive Wireless Sensor Networks. …”
    Get full text
    Article
  12. 2252

    Green Lynx Spider, Peucetia viridans (Hentz) (Arachnida: Araneae: Oxyopidae) by Howard V. Weems, Jr., W. H. Whitcomb

    Published 2004-08-01
    “…Although it is common throughout Florida and aggressively attacks its insect prey, it very seldom bites humans. …”
    Get full text
    Article
  13. 2253

    Study on BGP route leak by Jia JIA, Zhi-wei YAN, Guang-gang GENG, Jian JIN

    Published 2016-08-01
    “…With the rapid expansion of the scale of Internet,BGP plays a more and more important role in the Inter domain routing system.BGP has a lot of security risks,which result in prefix hijacking,AS_PATH hijacking and route leak attacks occuring frequently,causing serious threats to the Internet.In currently,the content introduction and security research mechanism were little,so a detailed study of BGP route leak was carried out.The BGP proto-col,route policy and established rules were introduced,six types of major route leak security incidents were analy-sised,the current security mechanisms and methods were summarized and compared to solve and detect route leak.In the last,a new prospect for the security and protection mechanism of route leak was proposed.…”
    Get full text
    Article
  14. 2254

    Cold War in Space: Reconnaissance Satellites and US-Soviet Security Competition by Wawrzyniec Muszyński-Sulima

    Published 2023-07-01
    “…Spy satellites allowed for a better assessment of the other side’s military strength, created a system of early warning for nuclear attacks, and offered a non-invasive way of verifying arms control treaties. …”
    Get full text
    Article
  15. 2255

    Trust expansion and listwise learning-to-rank based service recommendation method by Chen FANG, Hengwei ZHANG, Ming ZHANG, Jindong WANG

    Published 2018-01-01
    “…In view of the problem of trust relationship in traditional trust-based service recommendation algorithm,and the inaccuracy of service recommendation list obtained by sorting the predicted QoS,a trust expansion and listwise learning-to-rank based service recommendation method (TELSR) was proposed.The probabilistic user similarity computation method was proposed after analyzing the importance of service sorting information,in order to further improve the accuracy of similarity computation.The trust expansion model was presented to solve the sparseness of trust relationship,and then the trusted neighbor set construction algorithm was proposed by combining with the user similarity.Based on the trusted neighbor set,the listwise learning-to-rank algorithm was proposed to train an optimal ranking model.Simulation experiments show that TELSR not only has high recommendation accuracy,but also can resist attacks from malicious users.…”
    Get full text
    Article
  16. 2256

    La femme allaitant des serpents et ses liens avec la Luxure by Raphaël Guesuraga

    Published 2020-01-01
    “…A serial study of the iconographic type also relativizes the sexual nature of this woman with snakes, who is not always naked, who almost never sex attacked. Conversely, an investigation of the representations of Lust as a capital sin throughout the Middle Ages shows that it is rather depicted as a woman looking in a mirror than by a woman suckling snakes. …”
    Get full text
    Article
  17. 2257

    L’ayahuasca et son ombre. L’apprentissage de la possession dans un centre chamanique d’Amazonie péruvienne by David Dupuis

    Published 2018-12-01
    “…The proposed practices seem to lead those who are willing to perceive themselves as influenced, attacked and inhabited by malevolent forces that are usually invisible. …”
    Get full text
    Article
  18. 2258

    Research on trust transitivity and aggregation in evidential trust model by JIANG Li-ming1, ZHANG Kun1, XU Jian1, LIAO Jun1, ZHANG Hong1

    Published 2011-01-01
    “…Current trust models had some certain disadvantages in dealing with trust transitivity and trust aggregation.Firstly,these models ignored the feedback trust measurement on the direct recommender in the process of trust transitivity.Secondly,the models contained the problems of information loss or repetitive calculation for the limits in analysis and dis-posal of the dependent relationships among referral chains.A new evidential trust model was proposed,and the problems existed in current methods for transferring and aggregating trust relationships were addressed by combing D-S evidence with graph theory.It can be seen from the simulation results that compared with existing trust models,the proposed model is more robust on defending malicious attacks for various strategy cheating and collusion,and has more remarkable en-hancements in the accuracy of trust measurement.…”
    Get full text
    Article
  19. 2259

    Forgetting and Remembering the Darwin Bombings by Elizabeth RECHNIEWSKI

    Published 2012-12-01
    “…Despite the extent of this attack  - the most serious ever launched against Australian territory - it received comparatively little recognition in the post-war era outside of Darwin until November 2011 when Prime Minister Julia Gillard announced, during the visit of President Obama to Darwin, that 19 February would become an official national day of commemoration. …”
    Get full text
    Article
  20. 2260

    Research on deep differential fault analysis against MIBS by ZHAO Xin-jie1, WANG Tao 1, WANG Su-zhen2, WU Yang1

    Published 2010-01-01
    “…The MIBS algorithm and its differential fault analysis principle were presented,then three differential fault analysis methods against MIBS were proposed based on different depth of fault model and verified through experiments.Experiment results demonstrate that due to its Feistel structure and S-box differential feature,MIBS is vulnerable to deep differential fault attack.The best result is that after injecting one 4-bit fault into the 30th round left register,both the fault location and fault differential are unknown,the 64-bit MIBS master key searching space can be reduced to 224 and be re-covered after one minute brute-force-search.Moreover,the fault analysis method can provide some ideas on differential fault analysis against other block ciphers using S-box.…”
    Get full text
    Article