Showing 2,261 - 2,280 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 2261

    Analysis of security extension protocol in e-mail system by Jingjing SHANG, Yujia ZHU, Qingyun LIU

    Published 2020-12-01
    “…E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.…”
    Get full text
    Article
  2. 2262

    Endoscopic Fistulotomy – ‘The Suprapapillary Punch’: A Method of Access to the Bile Duct during ERCP by Noel B Hershfield

    Published 1994-01-01
    “…Results have been excellent with only one complication, a minor attack of pancreatitis after the procedure. In summary, the suprapapillary punch or fistulotomy is a safe and useful method for entering the common bile duct when access by the usual method is impossible.…”
    Get full text
    Article
  3. 2263

    Multi-server conjunctive keyword searchable encryption scheme based on BDH problem by Yanhua LU, Youliang TIAN, Chen LIU

    Published 2020-02-01
    “…Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in certificate management.In the multi-serve environment,a bilinear mapping was used to construct an identity-based encryption scheme that supports conjunctive keyword search.In this scheme,the storage and query of the encrypted data were allocated to different servers,and the retrieval efficiency of the user storage and keyword was improved by cooperation.Re-use the encryption and search ability of the connection keywords by using the identity of multi-server and user.At the same time,combine with the searchable encryption method of conjunctive keyword,a new security model was constructed based on bilinear pairing.And under the bilinear Diffie-Hellman problem,the scheme satisfies the ciphertext indistinguishability under selected message attack.…”
    Get full text
    Article
  4. 2264

    Openstack authentication protocol based on digital certificate by Zhiqiang ZHU, Renhao LIN, Cuiyun HU

    Published 2019-02-01
    “…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
    Get full text
    Article
  5. 2265

    Games under Ambiguous Payoffs and Optimistic Attitudes by Wei Xiong

    Published 2014-01-01
    “…To illustrate our model, we provide an analysis of a scenario concerning allocating resource of defending and attacking in military contexts.…”
    Get full text
    Article
  6. 2266

    OPTIMIZATION OF BLADE DEFLECTION BASED ON HYBRID GENETIC ALGORITHM by WANG YongDing, QIAN YingJuan

    Published 2021-01-01
    “…In order to improve the energy utilization rate of the vertical axis variable angle of attack turbine,a mathematical optimization model of the blade declination angle variation rule was established,using the blade declination angle change with the position angle as the design parameter,the turbine energy utilization rate as the objective function,and genetic algorithm Combined with the method of sequential quadratic programming,the optimization calculation is carried out,and on this basis,the most suitable blade declination variation law is obtained. …”
    Get full text
    Article
  7. 2267

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “… Anastrepha grandis (Macquart) (1846: 227), which exists in several South American countries and possibly Panama, attacks watermelon and other fruits of the family Cucurbitaceae. …”
    Get full text
    Article
  8. 2268

    Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Heteroptera: Miridae) by Wayne N. Dixon, Thomas R. Fasulo

    Published 2004-07-01
    “… Lygus lineolaris (Palisot de Beauvois), the tarnished plant bug, attacks a wide variety of economically important herbaceous plants, vegetable crops, commercial flower plants, fruit trees, and nursery stock (Kelton 1975). …”
    Get full text
    Article
  9. 2269

    Possibilities for qualitative evaluation of the protection area of protective clothing by Dominik Münks, Jasmin Pilgrim, Kyosev Yordan

    Published 2022-09-01
    “… Protective clothing, worn for example by police, ambulance and private security services, has the task of protecting against weapon attacks and is becoming increasingly important. International standards specify test methods to ensure the protective effects and classes, but the protective surfaces or the wearing comfort are not defined more detailed in the standards. …”
    Get full text
    Article
  10. 2270

    Antibacterial Peptides from Plants: What They Are and How They Probably Work by Patrícia Barbosa Pelegrini, Rafael Perseghini del Sarto, Osmar Nascimento Silva, Octávio Luiz Franco, Maria Fátima Grossi-de-Sa

    Published 2011-01-01
    “…Some hypotheses for their mechanisms of action and attack on the bacterial membrane surface are also proposed.…”
    Get full text
    Article
  11. 2271

    Research on OLE object vulnerability analysis for RTF file by De-guang LE, Liang ZHANG, Sheng-rong GONG, Li-xin ZHENG, Shao-gang WU

    Published 2016-01-01
    “…Besides, the detection effectiveness of the proposed method is higher than that of other methods, which can effectively defense the exploit attack of OLE object vulnerability for RTF documents.…”
    Get full text
    Article
  12. 2272

    Antisemitism in Medicine: An International Perspective by Michael Gordon, Jerome Teitel, Ted Rosenberg, Ruth Oratz, Naomi Katz, David Katz

    Published 2025-01-01
    “…Eventually quotas fell, and the period after World War II once again saw a tremendous growth in numbers of Jews excelling in medicine internationally. Since the Hamas attack on Israel on October 7, 2023, there has been a resurgence of antisemitism worldwide. …”
    Get full text
    Article
  13. 2273

    Soybean Cyst Nematode Heterodera glycines (Ichinohe, 1952) (Nematoda: Rhabdita: Heteroderidae) by Holly Andres, Zane J. Grabau

    Published 2025-02-01
    “…They are obligate parasites that attack different species of crops and weeds. Heteroderidae are divided into two groups: cyst and cystoid based on morphological alterations in their skin. …”
    Get full text
    Article
  14. 2274

    Mechanisms and diagnosis of myocardial ischemia in patients with intact coronary arteries by V.A. Skybchyk, Yu.P. Melen

    Published 2021-10-01
    “…This article describes pathogenetic mechanisms underlying the occurrence of myocardial ischemia and angina attacks in patients without ischemic non-obstructive coronary artery (INOCA) based on coronary angiography. …”
    Get full text
    Article
  15. 2275

    U.S. NATIONAL MISSILE DEFENSE DEPLOYMENT IN THE ASIA-PACIFIC REGION by J. Y. Parshkova

    Published 2015-12-01
    “…The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. …”
    Get full text
    Article
  16. 2276

    Two-factor authenticated key agreement protocol based on biometric feature and password by Xiao-wei LI, Deng-qi YANG, Ben-hui CHEN, Yu-qing ZHANG

    Published 2017-07-01
    “…A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.…”
    Get full text
    Article
  17. 2277

    Predatory Gall Midge (unofficial common name), Feltiella acarisuga (Vallot) (Insecta: Diptera: Cecidomyiidae) by Ryan S. Osborne, Norman C. Leppla, Lance S. Osborne

    Published 2004-11-01
    “…F. acarisuga could be particularly useful for integrated pest management of spider mites that attack greenhouse crops (Gillespie et al. 1998). This document is EENY-269, one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  18. 2278

    Prevalence and Scabies Severity Rate on a Goat at Mempawah Hilir, Mempawah District West Kalimantan Province by Arum Maula Hidayah, Wiwiek Tyasningsih, Soeharsono Soeharsono, Retno Wulansari

    Published 2021-09-01
    “…This is due to weather factors in the area and the type of cage as well as inadequate maintenance management, thus making many cases of scabies attack goats.…”
    Get full text
    Article
  19. 2279

    Design and implementation of a model for OS kernel integrity protection by Dong-hai TIAN, Jun-hua CHEN, Xiao-qi JIA, Chang-zhen HU

    Published 2015-11-01
    “…Untrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presented.The basic idea of MOKIP was to set different integrity labels for different entities in the kernel space,and then ensure that the entities with low integrity label cannot harm the entities with high integrity label.A prototype system based on the hardware assisted virtualization technology was implemented.The experimental results show that proposed system is effective at defending against various malicious kernel extension attacks within a little performance overhead which is less than 13%.…”
    Get full text
    Article
  20. 2280

    UNMET NEEDS OF LESBIAN WOMEN IN BREAST CANCER TREATMENT by Carolina de Souza, Manoel Antônio dos Santos

    Published 2025-02-01
    “…The results showed that the vulnerability process of the spouses was amplified by the need to defend themselves against constant attacks on their identities. The invisibility and discrimination of lesbian women in the oncology care network has contributed to multiplying the unmet health needs, worsening the already tenuous link with health professionals. …”
    Get full text
    Article