Showing 301 - 320 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 301

    Serum Leptin Is not a Diagnostic Marker for Familial Mediterranean Fever Attacks

    Published 2006-01-01
    “…We investigated serum levels of leptin, interleukin-6 (IL-6) erythrocyte sedimentation rate (ESR),} C-reactive protein (CRP),fibrinogen, and leukocyte counts before the attack and 8–12 hours after the attack started. …”
    Get full text
    Article
  2. 302
  3. 303
  4. 304

    Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication by Haiqing Liu, Shiqiang Zheng, Shuhua Hao, Yuancheng Li

    Published 2018-01-01
    “…However, facial recognition has also been subjected to criticism due to security concerns. The main attack methods include photo, video, and three-dimensional model attacks. …”
    Get full text
    Article
  5. 305
  6. 306

    Robust Integrated Guidance and Control Design for Angle Penetration Attack of Multimissiles by Huan Zhou, Xin Zhao

    Published 2022-01-01
    “…Angle penetration attack ability plays a more and more important role for missiles in modern warfare, and the traditional separate guidance and control system design problem is the key to restrict the improvement of time-sensitive attack and cooperative attack ability of multimissiles. …”
    Get full text
    Article
  7. 307

    Malicious attack-resistant secure localization algorithm for wireless sensor network by Kun XU, Hong-li LIU, Jie ZHAN, Zi-ji MA

    Published 2016-12-01
    “…In hostile environments, localization often suffers from malicious attacks that may distort transmit power and degrade positioning accuracy significantly for wireless sensor network. …”
    Get full text
    Article
  8. 308
  9. 309

    Trabeculectomy versus stepwise treatment for breaking the attack of acute primary angle closure in patients with long attack duration: study design and protocol for a multicentre randomised controlled trial (LAAAC) by Jing Jiang, Qing Zhang, Bo Qu, Chao Dai, Mingguang He, Ye Zhang, Ning-Li Wang, Shuning Li, Guangxian Tang, Su Jie Fan, Zhi Li, Chi Liu, Xinqi Chang, Yanyan Cheng

    Published 2025-02-01
    “…However, patients with APAC in China and developed countries differ in disease characteristics as the Chinese have longer attack duration and lower success rate in breaking the attack with solely medication or laser therapy. …”
    Get full text
    Article
  10. 310
  11. 311

    Personalized biological treatment with lanadelumab in a patient with recurrent attacks of hereditary angioedema by Artur Gęsicki, Maciej F. Kozlowski, Karolina Żurawska, Weronika Ossowska, Jakub Sikora, Szymon Dyguś, Iwona Poziomkowska-Gęsicka

    Published 2024-08-01
    “…Long-term treatment to prevent further attacks consists of continuous and regular administration of medications to reduce the number and severity of oedema attacks in HAE patients, thereby reducing the indirect burden of the disease. …”
    Get full text
    Article
  12. 312
  13. 313

    Using Electrocardiogram Signal Features and Heart Rate Variability to Predict Epileptic Attacks by Ying Jiang, Yuan Feng, Danni Lu, Lin Yang, Qun Zhang, Haiyan Yang, Ning Li

    Published 2025-01-01
    “…Since the increase in neuronal activity during an epileptic attack affects the voluntary nervous system, and the voluntary nervous system also affects the heart rate variability, it can be concluded that seizures can be predicted by monitoring heart rate variability. …”
    Get full text
    Article
  14. 314
  15. 315
  16. 316

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malicious attack. In this paper, we propose to apply game theory into solving the network security problem of wireless network. …”
    Get full text
    Article
  17. 317
  18. 318
  19. 319
  20. 320

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. …”
    Get full text
    Article