Showing 3,361 - 3,380 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 3361

    Study on mechanical, hydrophobic and corrosion resistant properties of methylsiloxan-based mortar modified by micro-nano supplementary cementitious materials by Kangjie Zhang, Weizhun Jin, Yajun Lv, Shuguang Li, Xianlei Zhang, Tengfei Xiang, Changkuan Gu, Weifeng Bai, Caihong Song, Jun Zhao

    Published 2025-01-01
    “…Concrete with porous hydrophilic properties is easily attacked by corrosive ions, which seriously affects the durability of concrete structures. …”
    Get full text
    Article
  2. 3362

    Advancing allergic rhinitis research through phenome-wide association studies: Insights from known genetic loci by Xingling Tan, MD, Zhouyouyou Xiao, MB, Yao Wen, MD, Han Liu, MD, Wei Yu, MD

    Published 2025-01-01
    “…Additionally, potential associations were observed with ulcerative colitis, psoriasis, chalazion, pernicious anemia, glaucoma, multiple sclerosis, arthritis, prostate cancer, varicose veins of lower extremities, and heart attack. LDSC analysis showed that only asthma, eczema, and nasal polyps have significant positive genetic correlations with AR. …”
    Get full text
    Article
  3. 3363

    Estimation of the potential geographical distribution of invasive peach fruit fly under climate change by integrated ecological niche models by Farman Ullah, Yuan Zhang, Hina Gul, Muhammad Hafeez, Nicolas Desneux, Yujia Qin, Zhihong Li

    Published 2023-10-01
    “…The peach fruit fly, Bactrocera zonata Saunders, is one of the most economically important Tephritidae species that attack several host plants and causes serious damage in Asia and Africa. …”
    Get full text
    Article
  4. 3364

    Perioperative Management of a Patient with Hereditary Angioedema and Intestinal Obstruction Secondary to an Ileal Tumor: A Case Report by Antony Peter Gatheru, Anne Kasyoka Barasa, Isaac Karogo Mwangi, Stanley Ngare, Dan Kiptoon, Edwin Oloo Walong

    Published 2025-01-01
    “…Although C1-INH concentrates are the principal treatment for abdominal HAE attacks, other causes of acute abdomen should be considered, particularly in cases of persistent symptoms, to guide appropriate management. …”
    Get full text
    Article
  5. 3365

    Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools by Muhammad Naveed Abbasi, Abdul Rehman Aslam, Muhammad Awais Bin Altaf, Wala Saadeh

    Published 2025-01-01
    “…The Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as a quantum computing attack-resistant protocol. The hardness of SABER is based on the Rounding with Learning (LWR) problem. …”
    Get full text
    Article
  6. 3366

    Radiofrequency thermocoagulation of Gasserian ganglion in trigeminal neuralgia by Natalia Maria Rulewska, Filip Grabowski, Dagmara Neska, Jakub Siemko, Dominika Prystacka-Szar, Justyna Stadler-Szajda, Adrianna Czyżnikiewicz, Wenancjusz Stołowski, Magdalena Bujak, Magdalena Waśniowska, Jakub Chodkowski

    Published 2025-01-01
    “…This condition typically manifests as recurring episodes of sharp, unilateral pain along one or more branches of the trigeminal nerve.The exact mechanism of trigeminal neuralgia  remains largely unknown. Most pain attacks are triggered by certain stimuli in the areas served by the trigeminal nerve. …”
    Get full text
    Article
  7. 3367

    A Novel Authentication Management for the Data Security of Smart Grid by Imtiaz Parvez, Maryamossadat Aghili, Hugo Riggs, Aditya Sundararajan, Arif I. Sarwat, Anurag K. Srivastava

    Published 2024-01-01
    “…In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. …”
    Get full text
    Article
  8. 3368

    Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks by Shengwei Wang, Hongquan Chen, Yulin Guo, Wenjing Su, Yurong Xu, Shuohao Cui, Zhiqiang Zhou

    Published 2025-01-01
    “…The GDEO-ALNS optimized interaction structure slows down the ECV drop rate in topological attacks by 0.03 and 0.02, respectively, compared to the original interaction structure, which provides better immunity to interference compared to the optimized structure of ALNS. …”
    Get full text
    Article
  9. 3369

    Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix by Annabelle Lee, Sri Nikhil Gupta Gourisetti, David Jonathan Sebastian-Cardenas, Kent Lambert, Vicente Navarro, Marco Pasetti, Umit Cali, Kateryna Isirova, Ramesh Reddi, Puica Nitu, Md. Touhiduzzaman, Michael Mylrea, Philip Huff, Farrokh Rahimi, Shammya Shananda Saha

    Published 2023-01-01
    “…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
    Get full text
    Article
  10. 3370

    Oxidation Degradation of Rhodamine B in Aqueous by UV/S2O8 2− Treatment System by Xiaoyang Chen, Zhiyong Xue, Yanlai Yao, Weiping Wang, Fengxiang Zhu, Chunlai Hong

    Published 2012-01-01
    “…With the increase of oxidant S2O8 2−, more SO4 •− produced to attack RhB molecules and result in the increase of RhB degradation. …”
    Get full text
    Article
  11. 3371

    Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies by Salman Ahmed, Nabihah Ahmad, Nasir Ali Shah, Ghulam E. Mustafa Abro, Ardhi Wijayanto, Abdinasir Hirsi, Abdul Rehman Altaf

    Published 2025-01-01
    “…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
    Get full text
    Article
  12. 3372

    Synthesis, Characterization, Semiempirical and Biological Activities of Organotin(IV) Carboxylates with 4-Piperidinecarboxylic Acid by Shabbir Hussain, Saqib Ali, Saira Shahzadi, Saroj K. Sharma, Kushal Qanungo, Muhammad Shahid

    Published 2014-01-01
    “…HOMO-LUMO calculations show that chlorodiorganotin complexes are more susceptible to nucleophilic attack as compared to triorganotin complexes. Computed negative heat of formation indicates that complexes 1–4 are thermodynamically stable. …”
    Get full text
    Article
  13. 3373

    VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks by Juli Yin, Linfeng Wei, Zhiquan Liu, Xi Yang, Hongliang Sun, Yudan Cheng, Jianbin Mai

    Published 2023-12-01
    “…When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly accessible to all attackers, which increases the risk of vehicle exposure. …”
    Get full text
    Article
  14. 3374

    Evaluation of Risk Factors for Antibiotic Resistance in Patients with Nosocomial Infections Caused by Pseudomonas aeruginosa by Meliha Cagla Sonmezer, Gunay Ertem, Fatma Sebnem Erdinc, Esra Kaya Kilic, Necla Tulek, Ali Adiloglu, Cigdem Hatipoglu

    Published 2016-01-01
    “…In the multivariate analysis, previous cefazolin use was found as an independent risk factor for the development of imipenem resistance (OR = 3.33; CI 95% [1.11–10.0]; p = 0.03), whereas previous cerebrovascular attack (OR = 3.57; CI 95% [1.31–9.76]; p = 0.01) and previous meropenem use (OR = 4.13; CI 95% [1.21–14.07]; p = 0.02) were independent factors for the development of meropenem resistance. …”
    Get full text
    Article
  15. 3375

    Effects of Coach’s Verbal Encouragement During Small-Sided Volleyball Games on Specific Physical Fitness and Technical-Tactical Behavior of Youth Athletes by Taufiq Hidayat, Irma Febriyanti, Advendi Kristiyandaru, Suroto, Hari Wisnu, Ahmet Kurtoğlu, Amayra Tannoubi, Joseph Lobo, Baglan Yermakhanov, Jarosław Muracki, Edi Setiawan

    Published 2025-01-01
    “…Physical performance including agility t-test (ATT), 10-m sprint test (10-mST), countermovement jump test (CMJT), medicine ball throw test (MBTT), multistage 20-meter shuttle run test (M20-MSRT), and technical-tactical behavior (serve, reception, sets, attack, defense) were measured in pre-test and post-test. …”
    Get full text
    Article
  16. 3376

    Enhancing heart disease classification based on greylag goose optimization algorithm and long short-term memory by Ahmed M. Elshewey, Amira Hassan Abed, Doaa Sami Khafaga, Amel Ali Alhussan, Marwa M. Eid, El-Sayed M. El-kenawy

    Published 2025-01-01
    “…Such conditions may consist of coronary artery disease, which is characterized by the narrowing or clotting of the arteries that supply blood to the heart muscle, with the resulting threat of heart attacks. Heart rhythm disorders (arrhythmias), heart valve problems, congenital heart defects present at birth, and heart muscle disorders (cardiomyopathies) are other types of heart disease. …”
    Get full text
    Article
  17. 3377

    Molecular complexity of quantitative immunity in plants: from QTL mapping to functional and systems biology by Chauveau, Carine, Roby, Dominique

    Published 2024-05-01
    “…In nature, plants defend themselves against pathogen attack by activating an arsenal of defense mechanisms. …”
    Get full text
    Article
  18. 3378

    Resveratrol Inhibits Hepatic Stellate Cell Activation via the Hippo Pathway by Chunxue Li, Rongrong Zhang, Yating Zhan, Jianjian Zheng

    Published 2021-01-01
    “…Liver fibrosis, which results from chronic liver injury due to factors such as chronic alcohol consumption, hepatitis virus infections, and immune attacks, is marked by excessive deposition of extracellular matrix (ECM). …”
    Get full text
    Article
  19. 3379

    THE TOTAL LEUKOCYTE COUNT OF ELDERLY PATIENTS CONFIRMED COVID-19 WITH/WITHOUT A VENTILATOR IN A SURABAYA GENERAL HOSPITAL IN 2021 by Safira Indah Fitriani, Nur Septia Handayani, Erlinda Widyastuti, Anita Kurniati

    Published 2023-07-01
    “…Background: Coronavirus is a virus that attacks the immune system, especially the human respiratory system. …”
    Get full text
    Article
  20. 3380

    Deep learning technology: enabling safe communication via the internet of things by Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, Fadi Al-Turjman

    Published 2025-02-01
    “…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
    Get full text
    Article