Showing 321 - 340 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 321

    Risk stratification for acute stroke development after a transient ischemic attack and the use of scoring systems in pre-hospital scenarios by Janković Tamara, Đorđević Stefan

    Published 2024-01-01
    “…Introduction:Transient Ischemic Attack (TIA) is a temporary cerebral circulation disorder manifested by a neurological deficit that usually resolves within 60 minutes, as opposed to cerebrovascular insult, where the cerebral circulation disorder is permanent, and the neurological deficit doesn't resolve. …”
    Get full text
    Article
  2. 322
  3. 323

    The BBC, Daily Telegraph and Wikinews timelines of the terrorist attacks of 7th July 2006 in London: a comparison with contemporary discussions by Mike Thelwall

    Published 2006-01-01
    “…We compared published media timelines with blog postings and news stories related to the London attacks of July, 2005. Rich Site Summary (RSS) technology was used to gather data from 19,587 blog and news sites. …”
    Get full text
    Article
  4. 324

    Psychological Support for Individuals Experiencing Acute Trauma (Based on Experience Working with Victims of a Terrorist Attack at Crocus City Hall) by I.V. Vachkov, E.I. Viryasova, O.S. Melenteva, M.A. Panfilova

    Published 2024-05-01
    “…The article analyzes domestic and international literature on the psychological consequences of terrorist attacks, considering the main mental disorders and symptoms associated with the trauma of being a witness, as well as methods and techniques for working with individuals who have experienced mental trauma. …”
    Get full text
    Article
  5. 325
  6. 326

    Transient Ischemic Attack and Ischemic Stroke in Danon Disease with Formation of Left Ventricular Apical Thrombus despite Normal Systolic Function by Takeshi Tsuda, Amanda J. Shillingford, Jane Vetter, Vinay Kandula, Badal Jain, Joel Temple

    Published 2017-01-01
    “…Subsequently, her neurological manifestation progressed to transient ischemic attack (TIA) and eventually to ischemic stroke confirmed by CT scan with 1-day history of expressive aphasia followed by persistent left side weakness and numbness. …”
    Get full text
    Article
  7. 327
  8. 328
  9. 329

    The effectiveness of honey supplementation in feed for improving goldfish fingerling Carassius auratus immune system against Aeromonas hydrophila bacteria attack by Rosidah Rosidah, Ujang Subhan, Yuniar Mulyani, Rifai Dermawan

    Published 2019-01-01
    “…ABSTRACT   The attack of Aeromonas hydrophila bacteria can cause mortality in goldfish approximately 100%. …”
    Get full text
    Article
  10. 330

    Experiencing Traumatic Violence: An Interpretative Phenomenological Analysis of One Man’s Lived Experience of a Violent Attack Involving a Knife by Zoe Partington, R. Stephen Walsh, Danielle Labhardt

    Published 2025-01-01
    “…Participant ‘J’ is the survivor of an extremely violent attack, involving the use of a knife, in his own home. …”
    Get full text
    Article
  11. 331
  12. 332
  13. 333
  14. 334

    A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques by Lei Chen, Fushan Wei, Chuangui Ma

    Published 2015-04-01
    “…However, most of them are insecure against various attacks. This paper summarizes attacks and security requirements for two-factor user authentication in WSNs. …”
    Get full text
    Article
  15. 335

    ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments by Rodrigo Asensio-Garriga, Pol Alemany, Alejandro M. Zarca, Roshan Sedar, Charalampos Kalalas, Jordi Ortiz, Ricard Vilalta, Raul Munoz, Antonio Skarmeta

    Published 2024-01-01
    “…Efficient resource and security management in multi-domain V2X environments is vital, especially with the growing threat of distributed denial-of-service (DDoS) attacks against critical V2X services within MEC. …”
    Get full text
    Article
  16. 336

    Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks by Amir Mohammed, Craig Ramlal, Lincoln Marine, Fasil Muddeen

    Published 2024-01-01
    “…The study implemented an event-triggered consensus-based attack detection scheme capable of distinguishing between replay (RA), denial-of-service (DoS), and false data injection (FDI) attacks. …”
    Get full text
    Article
  17. 337

    Utilizing of black cumin (Nigella sativa) flour to increase the immunity system of tilapia (Oreochromis niloticus) against Aeromonas hydrophila bacteria attack by Norma Rizki Silviana, Rosidah, Wahyuniar Pamungkas, Roffi Grandiosa

    Published 2022-10-01
    “… ABSTRACT This study aims to determine dose of black cumin flour in fish feed diets which can improve the disease resistance of tilapia against the attack of A. hydrophila. This study was used tilapia juvenile with a size of 7 – 8 cm. …”
    Get full text
    Article
  18. 338

    SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data by Sudesh Kumar, Sunanda Gupta

    Published 2025-04-01
    “…The TCP-SYNC SDN dataset, a collection of labelled network traffic data for investigating DDoS attack detection in Software-Defined Networking (SDN) environments. …”
    Get full text
    Article
  19. 339

    The large and central Caligo martia eyespot may reduce fatal attacks by birds: a case study supports the deflection hypothesis in nature by Iserhard, Cristiano Agra, Malta, Shimene, Penz, Carla, Fraga, Brenda Barbon, Costa, Camila Abel, Schwantz, Taiane, Bordin, Kauane Maiara

    Published 2024-08-01
    “…In both experiments facsimiles were placed in two forest sites, organized in 50 blocks with four facsimiles each, and checked for predator attacks every 24 h for five consecutive days. While WE and UV facsimiles were mostly attacked in non-vital areas (wings), most bird attacks on CM were directed at vital body areas. …”
    Get full text
    Article
  20. 340

    Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley by Alaa Selim, Huadong Mo, Hemanshu Pota

    Published 2025-02-01
    “…These signals serve as a complementary example of adversarial attacks, demonstrating how such noise can destabilize estimation algorithms and lead to critical control errors. …”
    Get full text
    Article