Showing 3,301 - 3,320 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 3301

    Transient epileptic amnesia by J. S. Anužytė, G. Rutkauskaitė, R. Mameniškienė

    Published 2018-09-01
    “…Treatment with monotherapy often helps totally prevent recurrence of attacks. In the paper we review two case reports of patients with transient epileptic amnesia. …”
    Get full text
    Article
  2. 3302

    Mechanical and durability properties of coal cinder concrete: Experimental study and GPR-based analysis by Ali Toghroli, Seyed Azim Hosseini, Farshid Farokhizadeh

    Published 2025-07-01
    “…Various CC compositions (ranging from 10 % to 30 %) were analyzed for their effects on compressive strength, splitting tensile strength, flexural tensile strength, density, open porosity, water absorption, and resistance to freezing-thawing and salt attacks. Results showed that as CC content increased, absorptivity and open porosity also rose, while compressive strength improved, peaking at 77.4 MPa with 30 % CC. …”
    Get full text
    Article
  3. 3303

    Odevixibat treatment in a child with hypoplastic left heart syndrome and severe cholestatic pruritus: a case report by Rainer Ganschow, Christof Maucksch, Peter Rauschkolb, Martin B. E. Schneider

    Published 2025-01-01
    “…Portal hypertension was evident on imaging, and the patient was experiencing severe itching attacks that did not respond to treatment with naltrexone, ursodeoxycholic acid, dimetindene, or rifampicin. …”
    Get full text
    Article
  4. 3304

    A Comprehensive Review of Key Cyber-Physical Systems, and Assessment of Their Education Challenges by Imre Kocsis, Boglarka Burjan-Mosoni, Istvan Balajti

    Published 2025-01-01
    “…The industrial metaverse for smart manufacturing and its novel characteristics require new types of advanced cyber-physical coordinated situational awareness and active defense against cyber-attacks. These new challenges raise the profile of engineering education at the university level, while the addition of new skills requires rigorous preparatory work and the development of tailored requirements for effective knowledge transfer methods that meet the educational needs of the current environment. …”
    Get full text
    Article
  5. 3305

    Variant of Organizational and Functional Adaptation Structures of a Typical Situational Centre to the Emergence of Crisis Situations by Volodymyr Mirnenko, Oleh Hudyma, Vadym Artamoshchenko

    Published 2024-10-01
    “… Due to the growing number of crisis situations (CS) in the modern world, such as natural disasters, man-made accidents, pandemics, cyber-attacks, financial crises, wars, and other negative events, it is important for the state to develop and adapt the organizational and functional structures of information and analytical units, including situation centers (SC), to respond effectively to such cases, thereby ensuring the country’s resilience in the face of negative circumstances. …”
    Get full text
    Article
  6. 3306

    The Effect of Different Vegetable Oils on Cedar Wood Surface Energy: Theoretical and Experimental Fungal Adhesion by Fadoua Bennouna, Moulay Sadiki, Soumya Elabed, Saad Ibnsouda Koraichi, Mohammed Lachkar

    Published 2022-01-01
    “…Despite having been used for ages to preserve wood against several effects (biological attack and moisture effects) that cause its degradation, the effect of vegetable oils on the cedar wood physicochemical properties is poorly known. …”
    Get full text
    Article
  7. 3307

    Promoting Internal Armed Conflict Resolution and Peacebuilding: The Case of the US–Colombia Relations (Part I) by A. A. Manukhin

    Published 2020-11-01
    “…The beginning of the 2000s was yet another pivotal point in the development of bilateral interaction aimed at cessation of hostilities, marked by the 9/11 terrorist attacks, the failure of negotiations between the Colombian government and the opposition, and the implementation of a ‘democratic security’ policy. …”
    Get full text
    Article
  8. 3308

    Carotid endarterectomy outcomes according to anesthesia method: General anesthesia or regional anesthesia? by Fehim Can Sevil, Serkan Gume, Mehmet Tort, Necip Becit

    Published 2024-03-01
    “…Results: There was no statistically significant difference in postoperative stroke, transient ischemic attack (TIA) and cardiovascular mortality (p: 0.48; p: 0.30; p: 0.63, respectively). …”
    Get full text
    Article
  9. 3309

    EEG reveals brain network alterations in chronic aphasia during natural speech listening by Ramtin Mehraram, Jill Kries, Pieter De Clercq, Maaike Vandermosten, Tom Francart

    Published 2025-01-01
    “…Differences in network geometry were assessed by means of graph theory and a targeted node-attack approach. Group-classification accuracy was obtained with a support vector machine classifier. …”
    Get full text
    Article
  10. 3310

    Some Customary Law Nuance on that Hagiography: Attempt of Interpretations by Marius Ščavinskas

    Published 2004-06-01
    “…Vaitiekus came from Polish lands, he was attacked as a Polish agent or ally. Another motive—he was murdered as he was recognized as a person who was dipping people into water (baptizing) or torturing them in other ways. …”
    Get full text
    Article
  11. 3311

    Designing an internet of things laboratory to improve student understanding of secure IoT systems by A. Ravishankar Rao, Angela Elias-Medina

    Published 2024-01-01
    “…We also demonstrate potential vulnerabilities of these databases to SQL injection attacks.We administered these labs and collected survey data from the students. …”
    Get full text
    Article
  12. 3312

    Complexity in Individual Trajectories toward Online Extremism by Z. Cao, M. Zheng, Y. Vorobyeva, C. Song, N. F. Johnson

    Published 2018-01-01
    “…By quantifying the trajectories that individuals follow on their journey toward expressing high levels of pro-ISIS support—irrespective of whether they then carry out a real-world attack or not—our findings can help move safety debates beyond reliance on static watch-list identifiers such as ethnic background or immigration status and/or postfact interviews with already convicted individuals. …”
    Get full text
    Article
  13. 3313

    The New “Other” the Endorsement of Islamophobia in American Political Discourse by Hatice Altundal Erkmen

    Published 2022-12-01
    “… This paper analyses the complexity of problems American Muslims face with Islamophobia by examining (i) how Islamophobic discourse has become an integral part of the American politics; (ii) how the American political discourse on Islam and Muslims has affected the increase of Islamophobia, especially after the 9/11 terrorist attacks; and (iii) how Islamophobia is wielded as a political tool to garner the support of Americans and justify American imperial ambitions including the U.S. invasions and military occupations. …”
    Get full text
    Article
  14. 3314

    Model of the malicious traffic classification based on hypergraph neural network by Wenbo ZHAO, Zitong MA, Zhe YANG

    Published 2023-10-01
    “…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
    Get full text
    Article
  15. 3315

    Method on intrusion detection for industrial internet based on light gradient boosting machine by Xiangdong HU, Lingling TANG

    Published 2023-04-01
    “…Intrusion detection is a critical security protection technology in the industrial internet, and it plays a vital role in ensuring the security of the system.In order to meet the requirements of high accuracy and high real-time intrusion detection in industrial internet, an industrial internet intrusion detection method based on light gradient boosting machine optimization was proposed.To address the problem of low detection accuracy caused by difficult-to-classify samples in industrial internet business data, the original loss function of the light gradient boosting machine as a focal loss function was improved.This function can dynamically adjust the loss value and weight of different types of data samples during the training process, reducing the weight of easy-to-classify samples to improve detection accuracy for difficult-to-classify samples.Then a fruit fly optimization algorithm was used to select the optimal parameter combination of the model for the problem that the light gradient boosting machine has many parameters and has great influence on the detection accuracy, detection time and fitting degree of the model.Finally, the optimal parameter combination of the model was obtained and verified on the gas pipeline dataset provided by Mississippi State University, then the effectiveness of the proposed mode was further verified on the water dataset.The experimental results show that the proposed method achieves higher detection accuracy and lower detection time than the comparison model.The detection accuracy of the proposed method on the gas pipeline dataset is at least 3.14% higher than that of the comparison model.The detection time is 0.35s and 19.53s lower than that of the random forest and support vector machine in the comparison model, and 0.06s and 0.02s higher than that of the decision tree and extreme gradient boosting machine, respectively.The proposed method also achieved good detection results on the water dataset.Therefore, the proposed method can effectively identify attack data samples in industrial internet business data and improve the practicality and efficiency of intrusion detection in the industrial internet.…”
    Get full text
    Article
  16. 3316

    TITO DORČIĆ AS A FORERUNNER OF THE IRONIC MODE by Dean Slavić

    Published 2020-01-01
    “…The text, or the narrator, kills him, in the last step in the long procedure of attacking the protagonist.…”
    Get full text
    Article
  17. 3317

    Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities by Qiang Lyu, Sujuan Liu, Zhouyuan Shang

    Published 2025-01-01
    “…Additionally, the framework achieves a 45% improvement in system resilience during attacks and optimizes defense strategies to reduce deployment costs while increasing overall effectiveness. …”
    Get full text
    Article
  18. 3318

    Potensi Eugenol Fraksi Etil Asetat Bunga Cengkeh terhadap Proliferasi Kanker Serviks (HeLa Cell Line) by Fajri Rahendra Pratama, Annisa Permata Sari, Aprilia Susanti, Hasya Syakira, Amilia Salsabila, Dessy Arisanty

    Published 2024-09-01
    “…<p>Cervix cancer, also known as cervical cancer, is a type of cancer that is caused mainly by oncogenic Human Papillomavirus (HPV), which attacks the cervix. One of the plants that can be used in medicine is clove. …”
    Get full text
    Article
  19. 3319

    Background predation risk induces anxiety-like behaviour and predator neophobia in zebrafish by Himal Thapa, Arash Salahinejad, Adam L. Crane, Ahmad Ghobeishavi, Maud C. O. Ferrari

    Published 2024-10-01
    “…., injured conspecific cues that indicate a predator attack) or a low-risk water control stimulus. In Experiment 1, when tested in a novel tank, zebrafish exposed to high predation risk displayed anxiety-like responses (reduced activity and increased bottom time spent) compared to their low-risk counterparts. …”
    Get full text
    Article
  20. 3320

    Theories and Practices of Societal Security in the Scandinavian Countries: A Comparative Analysis by Mikhail S. Topchiev

    Published 2024-12-01
    “…Our investigation shows that the Scandinavian way of ensuring security was formed on the basis of the “Scandinavian model”, founded on socialization and integration, and the basis of the new socio-philosophical understanding of security was readiness for broad actions: from military invasion to environmental threats, man-made disasters and terrorist attacks. However, a generally accepted interpretation of societal security among the Scandinavian countries has not yet developed; each country has its own peculiarities. …”
    Get full text
    Article