-
301
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. …”
Get full text
Article -
302
Output Feedback-Based Fuzzy Event-Triggered Synchronization Control for Nonlinear Multiagent Systems Under DoS Attacks
Published 2025-01-01Subjects: Get full text
Article -
303
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
Published 2023-09-01Subjects: Get full text
Article -
304
Prevalence and intensity of ectoparasites attacked goonch (Bagarius yarelli) captured from Perjaya Dam, Komering River, South Sumatra
Published 2024-10-01“…Another aspect that needs to concern in domestication is the defense of domesticated species from several pathogens, especially parasites because most of wild fish captured from natural habitats are attacked by several parasites. This study aimed to determine the prevalence and intensity of ectoparasites attacked goonch captured from Perjaya Dam. …”
Get full text
Article -
305
Semiochemical Diversity in Practice: Antiattractant Semiochemicals Reduce Bark Beetle Attacks on Standing Trees—A First Meta-Analysis
Published 2012-01-01“…Reduction of tree mortality caused by bark beetle attacks is not only important for forestry, but also essential for the preservation of biodiversity and forest carbon sinks in the face of climate change. …”
Get full text
Article -
306
Short-Lasting Unilateral Neuralgiform Headache Attacks with Conjunctival Injection and Tearing in a Patient with Varicella-Zoster Virus Encephalomyelitis
Published 2017-01-01“…Short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing syndrome (SUNCT) is a type of trigeminal autonomic cephalalgia. …”
Get full text
Article -
307
Practical security of twin-field quantum key distribution with optical phase-locked loop under wavelength-switching attack
Published 2025-01-01“…Here, by identifying vulnerabilities of an acousto-optic modulator (AOM) in the OPLL scheme, we propose and demonstrate a wavelength-switching attack on a TF-class QKD system. This attack involves Eve deliberately manipulating the wavelength of the reference light to increase mean photon number of prepared quantum states, while maintaining stable interference between Alice and Bob as required by TF-class QKD protocols. …”
Get full text
Article -
308
A PRELIMINARY RESULTS ON THE CONTROL OF CERCOSPORA LEAF SPOT ATTACK IN SOME SUGAR BEET HYBRIDS WITH DIFFERENT DOSES OF FUNGICIDES
Published 2024-05-01“…The assessment of Cercospora leaf spot attack intensity were made using a scale of 1 to 9. …”
Get full text
Article -
309
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01Subjects: “…DDoS attack detection…”
Get full text
Article -
310
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01Subjects: “…DoS attacks…”
Get full text
Article -
311
-
312
Association of Slender Patent Ductus Arteriosus Combined With PFO Related to the Transient Ischemic Attack: A Rare Case Report
Published 2025-01-01Subjects: Get full text
Article -
313
Effect of Flow Attack Angle for V-Wavy Plate on Flow and Heat Transfer in a Square Channel Heat Exchanger
Published 2018-01-01“…Effects of flow attack angles of the V-wavy plate on flow and heat transfer in a square channel heat exchanger are investigated numerically. …”
Get full text
Article -
314
Influence of Water Pressure on the Mechanical Properties of Concrete after Freeze-Thaw Attack under Dynamic Triaxial Compression State
Published 2019-01-01“…This study aims at determining the effect of water pressure on the mechanical properties of concrete subjected to freeze-thaw (F-T) attack under the dynamic triaxial compression state. …”
Get full text
Article -
315
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01Subjects: Get full text
Article -
316
Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks
Published 2024-06-01Subjects: Get full text
Article -
317
The feasibility of assessing prognosis over 3 years in persons with a previous stroke/transient ischemic attack in general practice
Published 2025-01-01“…We aim to assess whether it is feasible to assess prognosis in persons, with a previous stroke or transient ischemic attack (TIA), in general practice, and whether a well-powered observational study is possible. …”
Get full text
Article -
318
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
319
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: “…differential computation attack…”
Get full text
Article -
320
Investigating the Relationship Between Clinical Characteristics, Mental Health, and Vascular Function in Minor Ischemic Stroke or Transient Ischemic Attack Patients
Published 2024-06-01“…However, there is a notable gap in research focusing on the mental and vascular conditions of minor ischemic stroke or transient ischemic attack (TIA) patients, particularly within the Thai population…”
Get full text
Article