Showing 3,281 - 3,300 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 3281

    Research on strong robustness watermarking algorithm based on dynamic difference expansion by Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU

    Published 2023-10-01
    “…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
    Get full text
    Article
  2. 3282

    BUNURILE CULTURALE – VICTIMELE FENOMENULUI TERORIST by Alexandra NICOLESCU

    Published 2022-01-01
    “…Access to cultural heritage is a human right, its destruction being a direct attack on the identity of a state and its population. …”
    Get full text
    Article
  3. 3283

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise the reliability and safety of vehicular communications. …”
    Get full text
    Article
  4. 3284

    Elements of forensic description of threats or violence against a law enforcement officer by I. P. Fedorishchev

    Published 2023-07-01
    “…Proper legal regulation of the protection of law enforcement officers from unlawful attacks should be one of the most important tasks of a developed state governed by the rule of law, especially in the context of active hostilities, because even in peacetime law enforcement officers put their health and lives at risk. …”
    Get full text
    Article
  5. 3285

    Field-scale detection of Bacterial Leaf Blight in rice based on UAV multispectral imaging and deep learning frameworks. by Guntaga Logavitool, Teerayut Horanont, Aakash Thapa, Kritchayan Intarat, Kanok-On Wuttiwong

    Published 2025-01-01
    “…Bacterial Leaf Blight (BLB) usually attacks rice in the flowering stage and can cause yield losses of up to 50% in severely infected fields. …”
    Get full text
    Article
  6. 3286

    Impact of variations in the molarity of sodium hydroxide on metakaolin-ground granular blast-furnace slag-based geopolymer concrete by Rahul Kumar, Rajwinder Singh, Mahesh Patel

    Published 2024-01-01
    “…Attributes such as compressive strength, ultra-sonic pulse velocity, electricity resistance, mass loss, and strength variation due to acid attack for six geopolymer concrete mixes have been evaluated at different ambient curing periods. …”
    Get full text
    Article
  7. 3287

    Synthetic data as external control arms in scarce single-arm clinical trials. by Severin Elvatun, Daan Knoors, Simon Brant, Christian Jonasson, Jan F Nygård

    Published 2025-01-01
    “…Clinical trials typically comprise only a few hundred patients usually with high-cardinality features, which makes individual data instances more exposed to re-identification attacks. We examine whether synthetic data can serve as a proxy for the empirical control arm data by providing the same research outcomes while reducing the risk of information disclosure. …”
    Get full text
    Article
  8. 3288

    Fulminant Diabetes in a Patient with Advanced Melanoma on Nivolumab by Nora Chokr, Hafsa Farooq, Elizabeth Guadalupe

    Published 2018-01-01
    “…Fulminant diabetes is an immune endocrinopathy that results from a violent immune attack leading to complete destruction of pancreatic beta cells in genetically predisposed people. …”
    Get full text
    Article
  9. 3289

    The Awareness and Adoption of Artificial Intelligence for Effective Facilities Management in the Energy Sector by Jonathan Oluwapelumi Mobayo, Ayooluwa Femi Aribisala, Saheed Olanrewaju Yusuf, Usman Belgore

    Published 2021-12-01
    “…The major challenging factors to the adoption of AI in the Nigerian energy sector are outdated power system infrastructure, cellular technologies, lack of qualified experts and data science skills, and growing threat from cyber-attacks. The study recommends improved awareness and technical know-how of energy sector personnel, and provision of adequate power system infrastructure to provide stable power supply. …”
    Get full text
    Article
  10. 3290

    A model for developing dependable systems using a component‐based software development approach (MDDS‐CBSD) by Hasan Kahtan, Mansoor Abdulhak, Ahmad Salah Al‐Ahmad, Yehia Ibrahim Alzoubi

    Published 2023-02-01
    “…The MDDS‐CBSD may be used to create web application systems and to protect them from attacks. Model developers may use CBSD to describe and assess dependability attributes at any point during the model development process. …”
    Get full text
    Article
  11. 3291

    Investigation of possible predictive factors, clinical characteristics, and treatment in vascular Behçet's disease: real-life data from a single center by Abdulvahap Kahveci, Zeycan Kübra Cevval

    Published 2024-10-01
    “…Although immunosuppressive drugs represent the cornerstone of treatment for vasculo-Behçet's disease, most patients had also received anticoagulant therapy following the initial attack.…”
    Get full text
    Article
  12. 3292

    PRAPD: A novel received signal strength–based approach for practical rogue access point detection by Wenjia Wu, Xiaolin Gu, Kai Dong, Xiaomin Shi, Ming Yang

    Published 2018-08-01
    “…Rogue access point attack is one of the most important security threats for wireless local networks and has attracted great attention from both academia and industry. …”
    Get full text
    Article
  13. 3293

    Population Distribution of Rats (Rattus argentiventer) and the Damage Intensity on Rice and Other Crops in Pleret, Yogyakarta, Indonesia by RR Rukmowati Brotodjojo, Ikhsan Lazuardi, Antik Suprihanti

    Published 2023-12-01
    “…There was no damage on rice crops around the TBS. Rats also attacked corn and sugarcane which caused heavy damage to these crops. …”
    Get full text
    Article
  14. 3294

    A PROBLEM OF OPENING OF THE SECOND FRONT IS IN EUROPE: LOOK AFTER SEVEN DECADES by A. A. Paderin

    Published 2014-06-01
    “…The author associate himself with those historians, who support the origin of idea about the efficient strategy of attack against enemy simultaneously from different directions by the defeat of Germany, against which in the years of world war first two-front war was going: Russian army - from the east and Anglo-Franco-American soldiers from the west. …”
    Get full text
    Article
  15. 3295

    Technical Standard of "Five-Tone Figurative Hypnosis" by ZHOU Xia, LI Li, SHEN Yan, LI Chengbin, LIU Zhimei, ZHANG Yikun, ZHANG Mingqian, YU Shaohong, WANG Hongxia, LU Yi, WANG Qin, REN Binbin, JIANG Hengkun, NIU Li, CHENG Aijun, LI Benyuan

    Published 2024-01-01
    “…Contraindications mainly included schizophrenia and panic attack. The operation steps and requirements mainly include [music preparation (five-element music selection,audio and video selection, instrument selection and music intensity), environmental requirements, disinfection preparation, instrument preparation, patient preparation and practitioner preparation]; The operation process mainly includes first diagnosis interview, hypnotic introduction, concrete thinking establishment, hypnotic deepening, post-hypnotic suggestion and recall. …”
    Get full text
    Article
  16. 3296

    Viral and Nonviral Engineering of Natural Killer Cells as Emerging Adoptive Cancer Immunotherapies by Sandro Matosevic

    Published 2018-01-01
    “…As effectors of cancer immunotherapy, NK cells are attractive as they do not attack healthy self-tissues nor do they induce T cell-driven inflammatory cytokine storm, enabling their use as allogeneic adoptive cellular therapies. …”
    Get full text
    Article
  17. 3297

    Detection and localization of indigenous economic grasses in depth-color close-range aerial images, using a novel trainingless data-to-decision approach (DIKD Hierarchy), for the S... by Radhwan Sani, Tamer Rabie, Ali Cheaitou

    Published 2025-03-01
    “…They are associated with fatigue, dehydration, animals' attacks, etc. Plant detection is a pillar of precision agriculture. …”
    Get full text
    Article
  18. 3298

    Investigating the mechanisms of resveratrol in the treatment of gouty arthritis through the integration of network pharmacology and metabolics by Xiaomin Xu, Donghua Yu, Yu Wang, Xin Jiang, Fang Lu, Shumin Liu

    Published 2024-10-01
    “…Through related metabolic pathway analysis, the most affected metabolic pathways were found to be Sphingolipid metabolism, Glycerophospholipid metabolism, Phenylalanine, tyrosine and tryptophan biosynthesis, Pantothenate and CoA, Citrate cycle (TCA cycle), and Arachidonic acid metabolism.ConclusionResveratrol can regulate the biosynthetic pathways of arachidonic acid, phenylalanine, tyrosine, and tryptophan, pantothenic acid and CoA biosynthesis pathways, TCA cycle, and other metabolic pathways, thereby regulating the NF-κB, MAPK, and JAK/STAT3 signaling pathways, and inhibiting the acute inflammatory response during GA attacks, showing characteristics of multi-pathway and multi-target action.…”
    Get full text
    Article
  19. 3299

    Blood-Brain Barrier Abnormalities Caused by HIV-1 gp120: Mechanistic and Therapeutic Implications by Jean-Pierre Louboutin, David S. Strayer

    Published 2012-01-01
    “…These target laminin and attack the tight junctions between endothelial cells and BBB basal laminae. …”
    Get full text
    Article
  20. 3300

    Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning by Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao

    Published 2023-08-01
    “…Nowadays, researchers have made many efforts concerning supervised machine learning methods to identify malicious attacks. High‐quality labels are of great importance for supervised machine learning, but noises widely exist due to the non‐deterministic production environment. …”
    Get full text
    Article