Showing 3,341 - 3,360 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 3341

    ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF by Yuan Zhong, Pengfei Chen, Huxing Zhang

    Published 2025-01-01
    “…Secure Shell (SSH) is one of the most popular methods for remote access, but the leakage of login information presents a substantial security threat, enabling attackers to exploit identities and disrupt systems. …”
    Get full text
    Article
  2. 3342

    Ability of Different Flavonols and Commercial Mannoproteins to Enhance Wine Colour through Copigmentation by Cristina Alcalde-Eon, María-Teresa Escribano-Bailón, Ignacio García-Estévez

    Published 2024-01-01
    “…Copigmentation is a noncovalent interaction between anthocyanins and colourless copigments that stabilises the anthocyanin-coloured forms by protecting them against water attack. Copigmentation can be responsible for almost half of the colour observed in young red wines. …”
    Get full text
    Article
  3. 3343

    New records of the golden jackal (Canis aureus L.) in the upper Soča valley, Slovenia by Miha Mihelič, Miha Krofel

    Published 2012-12-01
    “…Official records of depredations showed high increase in assumed jackal attacks on sheep, but we could not confirm if or how many of these depredations were actually caused by jackals. …”
    Get full text
    Article
  4. 3344

    Evaluation of Serum Zonulin Level and Intestinal Permeability in Patients with Chronic Spontaneous Urticaria and the Relationship Between Serum Zonulin Level and Disease Severity by Simge Ünal, Selda Pelin Kartal, Ahmet Ozsoy, Fevzi Nuri Aydın

    Published 2025-01-01
    “…For the CSU patients, comprehensive data was collected, encompassing various aspects: age at onset of the condition, duration of the most recent attack, presence of any comorbid conditions, dosage of antihistamines being used, the urticaria activity score, as well as detailed personal and family medical histories. …”
    Get full text
    Article
  5. 3345

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  6. 3346

    The Role of Clopidogrel in 2020: A Reappraisal by Giuseppe Patti, Giuseppe Micieli, Claudio Cimminiello, Leonardo Bolognese

    Published 2020-01-01
    “…Antiplatelet therapy is the mainstay of treatment and secondary prevention of cardiovascular disease (CVD), including acute coronary syndrome (ACS), transient ischemic attack (TIA) or minor stroke, and peripheral artery disease (PAD). …”
    Get full text
    Article
  7. 3347

    The riflemen union in the Independence war by Aušra Jurevičiūtė, Audronė Veilentienė

    Published 1998-12-01
    “…There were Riflemen from the small town of Perloja in the Union who distinguished themselves particularly in many actions by beating off the Polish attacks in various parts of South-East Lithuania. …”
    Get full text
    Article
  8. 3348
  9. 3349

    Signatures of Transient Overvoltages in Low Voltage Power Systems in Tea Factories and Their Implications on Insulation Deterioration and Allied Power Quality Issues by Earl A. R. L. Pannila, Mahesh Edirisinghe

    Published 2021-01-01
    “…These steeply passing overvoltage stresses let partial discharges ensue, which can attack the insulation over long service. To unveil this danger, 314 common-mode transient waveforms were measured in the electrical machines of five tea factories in Sri Lanka, in a 50 ms measurement window, taken in 55 measuring attempts. …”
    Get full text
    Article
  10. 3350

    Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services by Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG

    Published 2023-04-01
    “…Personalized quality of service (QoS) prediction is crucial for developing high-quality cloud service system.However, the traditional collaborative filtering method, based on centralized training, presents challenges in protecting user privacy.In order to effectively protect user privacy while obtaining highly accurate prediction effect, a distributed user privacy adjustable personalized QoS prediction model for cloud services (DUPPA) was proposed.The model adopted a “server-multi-user” architecture, in which the server coordinated multiple users, handled multiple users’ requests for uploading model gradients and downloading global model, and maintained global model parameters.To further protect user privacy, a user privacy adjustment strategy was proposed to balance privacy and prediction accuracy by adjusting the initialization proportion of local model parameters and gradient upload proportion.In the local model initialization stage, the user calculated the difference matrix between the local model and the global model, and selected the global model parameters corresponding to the larger elements in the difference matrix to initialize the local model parameters.In the gradient upload stage, the user can select some important gradients to upload to the server to meet the privacy protection requirements of different application scenarios.To evaluate the privacy degree of DUPPA, a data reconstruction attack method was proposed for the distributed matrix factorization model gradient sharing scheme.The experimental results show that when DUPPA sets the gradient upload proportion to 0.1 and the local model parameter initialization proportion to 0.5, the predicted MAE and RMSE are reduced by 1.27% and 0.91%, respectively, compared with the traditional centralized matrix factorization model.Besides, when DUPPA sets the gradient upload proportion to 0.1, the privacy degree is 5 times higher than when the gradient upload proportion is 1.And when DUPPA sets the local model parameter initialization proportion to 0.5, the privacy degree is 3.44 times higher than when the local model parameter initialization proportion is 1.…”
    Get full text
    Article
  11. 3351

    Medical Cannabis for Gilles de la Tourette Syndrome: An Open-Label Prospective Study by Saar Anis, Corinne Zalomek, Amos D. Korczyn, Alina Rosenberg, Nir Giladi, Tanya Gurevich

    Published 2022-01-01
    “…Three patients suffered from psychiatric side effects including worsening of obsessive compulsive disorder (stopped treatment), panic attack, and anxiety (resolved with treatment modification). …”
    Get full text
    Article
  12. 3352

    E-Banking and Performance of Financial Institutions in Uganda: A Case of Kabale District by Bosco, Ismail Bashaija

    Published 2022
    “…In their efforts to provide cheap, reliable, flexible, fast and convenient financial services, financial institutions resorted to e-banking which relies on FinTech tools, However, the provision of e-banking products in financial institutions may heighten operational vulnerability due to network failure, initial high investment technological infrastructure, cyber-attacks, risking customer data confidentiality all of which may affect performance of financial institutions. …”
    Get full text
    Thesis
  13. 3353

    Multi-slotted airfoil design for enhanced aerodynamic performance and economic efficiency by Mohamed A. Aziz, Mohamed A. Khalifa, M. A. Abdelrahman, Haitham Elshimy, Ahmed M. Elsayed

    Published 2025-02-01
    “…The single-slot airfoil is unable to delay stall if the flow is injected downstream of the separation point at the stall angle of attack. A multi-slot airfoil ensures air is injected along the airfoil suction side, delaying stalls over a large range of AOA. …”
    Get full text
    Article
  14. 3354

    Cutin formation in tomato is controlled by a multipartite module of synergistic and antagonistic transcription factors by Yuan Shi, Changhao Deng, Xiangyin Lu, Yan Wang, Yaowen Pan, Deding Su, Wang Lu, Yuxiang Lin, Rui Li, Junnan Han, Yanwei Hao, Yi Chen, Ghassen Abid, Julien Pirrello, Mondher Bouzayen, Yudong Liu, Zhengguo Li, Baowen Huang

    Published 2025-02-01
    “…Summary: Cuticles protect plants from water loss and pathogen attack. We address here the functional significance of SlGRAS9, SlZHD17, and SlMBP3 in regulating cutin formation in tomato fruit. …”
    Get full text
    Article
  15. 3355

    Potential of a Remotely Piloted Aircraft System with Multispectral and Thermal Sensors to Monitor Vineyard Characteristics for Precision Viticulture by Leeko Lee, Andrew Reynolds, Briann Dorin, Adam Shemrock

    Published 2025-01-01
    “…Water stress, cold damage, and pathogen attacks are highly relevant stresses in many grape-growing regions. …”
    Get full text
    Article
  16. 3356

    Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats by Pushpendra Kumar Verma, Bharat Singh, Preety, Shubham Kumar Sharma, Rakesh Prasad Joshi

    Published 2024-12-01
    “…By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. …”
    Get full text
    Article
  17. 3357

    Clinical Guidelines of the Russian Society of Surgeons, the Russian Gastroenterological Association, the Association of Surgeons-Hepatologists and the Endoscopic Society “REndO” o... by V. T. Ivashkin, A. G. Kriger, A. V. Okhlobystin, M. A. Anischenko, S. S. Kardasheva, S. A. Alekseenko, S. F. Bagnenko, M. I. Bykov, S. A. Budzinskiy, I.  M. Buriev, V. A. Vishnevskiy, E. I. Galperin, V. P. Glabay, V. R. Goltsov, T. G. Dyuzheva, G. G. Karmazanovskiy, M. P. Korolev, D. M. Krasilnikov, Yu. A. Kucheryavy, I. V. Maev, N. A. Maystrenko, M. F. Osipenko, M. I. Prudkov, V. I. Simanenkov, E. G. Solonitsin, A. V. Fedorov, E. D. Fedorov, I. B. Khlynov, M. V. Chikunova, A. V. Shabunin, S. G. Shapovalyants, A. A. Sheptulin, O. S. Shifrin

    Published 2022-08-01
    “…The criteria for establishing the diagnosis of CP include typical attacks of abdominal pain and/or clinical and laboratory signs of exocrine, endocrine insufficiency with the mandatory detection of characteristic morphological changes (calcifications in the parenchyma and pancreatic ductal stones, dilatation of the main pancreatic duct and its branches). …”
    Get full text
    Article
  18. 3358

    A Novel Audio Copy Move Forgery Detection Method With Classification of Graph-Based Representations by Beste Ustubioglu, Gul Tahaoglu, Arda Ustubioglu, Guzin Ulutas, Muhammed Kilic

    Published 2025-01-01
    “…It provides a robust solution for verifying audio authenticity, even under various additional attack scenarios, and shows potential for generalization.…”
    Get full text
    Article
  19. 3359

    Q11, a CYP2E1 inhibitor, exerts anti-hepatocellular carcinoma effect by inhibiting M2 macrophage polarization by Cunzhen Zhang, Yan Fang, Mengxue Guo, Liming Tang, Yurong Xing, Jun Zhou, Yuanyuan Guo, Yuhan Gu, Qiang Wen, Na Gao, Haiwei Xu, Hailing Qiao

    Published 2024-12-01
    “…Q11 could inhibit tumor cells by targeting M2 macrophages rather than directly attacking tumor cells. Both Q11 and Cyp2e1 knockout could effectively suppress tumor growth. …”
    Get full text
    Article
  20. 3360

    Transitioning from Oxime to the Next Potential Organophosphorus Poisoning Therapy Using Enzymes by Rauda A. Mohamed, Keat K. Ong, Noor Azilah M. Kasim, Norhana A. Halim, Siti Aminah M. Noor, Victor F. Knight, Nurul Najwa Ab. Rahman, Wan Md Zin W. Yunus

    Published 2021-01-01
    “…Apart from the agricultural pesticide poisoning, terrorists have used these organophosphorus compounds to attack civilian populations in some countries. Recent misuses of sarin in the Syrian conflict had been reported in 2018. …”
    Get full text
    Article