-
301
Serum Leptin Is not a Diagnostic Marker for Familial Mediterranean Fever Attacks
Published 2006-01-01“…We investigated serum levels of leptin, interleukin-6 (IL-6) erythrocyte sedimentation rate (ESR),} C-reactive protein (CRP),fibrinogen, and leukocyte counts before the attack and 8–12 hours after the attack started. …”
Get full text
Article -
302
Research on low-rate DDoS attack of SDN network in cloud environment
Published 2019-06-01Subjects: Get full text
Article -
303
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
304
Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication
Published 2018-01-01“…However, facial recognition has also been subjected to criticism due to security concerns. The main attack methods include photo, video, and three-dimensional model attacks. …”
Get full text
Article -
305
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: “…Attack detection…”
Get full text
Article -
306
Robust Integrated Guidance and Control Design for Angle Penetration Attack of Multimissiles
Published 2022-01-01“…Angle penetration attack ability plays a more and more important role for missiles in modern warfare, and the traditional separate guidance and control system design problem is the key to restrict the improvement of time-sensitive attack and cooperative attack ability of multimissiles. …”
Get full text
Article -
307
Malicious attack-resistant secure localization algorithm for wireless sensor network
Published 2016-12-01“…In hostile environments, localization often suffers from malicious attacks that may distort transmit power and degrade positioning accuracy significantly for wireless sensor network. …”
Get full text
Article -
308
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01Subjects: Get full text
Article -
309
Trabeculectomy versus stepwise treatment for breaking the attack of acute primary angle closure in patients with long attack duration: study design and protocol for a multicentre randomised controlled trial (LAAAC)
Published 2025-02-01“…However, patients with APAC in China and developed countries differ in disease characteristics as the Chinese have longer attack duration and lower success rate in breaking the attack with solely medication or laser therapy. …”
Get full text
Article -
310
Multi-stage detection method for APT attack based on sample feature reinforcement
Published 2022-12-01Subjects: “…APT attack detection…”
Get full text
Article -
311
Personalized biological treatment with lanadelumab in a patient with recurrent attacks of hereditary angioedema
Published 2024-08-01“…Long-term treatment to prevent further attacks consists of continuous and regular administration of medications to reduce the number and severity of oedema attacks in HAE patients, thereby reducing the indirect burden of the disease. …”
Get full text
Article -
312
The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections
Published 2018-10-01Subjects: Get full text
Article -
313
Using Electrocardiogram Signal Features and Heart Rate Variability to Predict Epileptic Attacks
Published 2025-01-01“…Since the increase in neuronal activity during an epileptic attack affects the voluntary nervous system, and the voluntary nervous system also affects the heart rate variability, it can be concluded that seizures can be predicted by monitoring heart rate variability. …”
Get full text
Article -
314
Pseudacteon Obtusus (Diptera: Phoridae) Attacking Solenopsis Invicta (Hymenoptera: Formicidae) in Brazil
Published 1987-01-01Get full text
Article -
315
Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack
Published 2024-12-01Subjects: Get full text
Article -
316
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malicious attack. In this paper, we propose to apply game theory into solving the network security problem of wireless network. …”
Get full text
Article -
317
Virtual Agents-Based Attack-Resilient Distributed Control for Islanded AC Microgrid
Published 2025-01-01Subjects: “…denial-of-service (DoS) attack…”
Get full text
Article -
318
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. …”
Get full text
Article -
319
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
Published 2023-04-01Subjects: Get full text
Article -
320
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. …”
Get full text
Article