-
321
Risk stratification for acute stroke development after a transient ischemic attack and the use of scoring systems in pre-hospital scenarios
Published 2024-01-01“…Introduction:Transient Ischemic Attack (TIA) is a temporary cerebral circulation disorder manifested by a neurological deficit that usually resolves within 60 minutes, as opposed to cerebrovascular insult, where the cerebral circulation disorder is permanent, and the neurological deficit doesn't resolve. …”
Get full text
Article -
322
-
323
The BBC, Daily Telegraph and Wikinews timelines of the terrorist attacks of 7th July 2006 in London: a comparison with contemporary discussions
Published 2006-01-01“…We compared published media timelines with blog postings and news stories related to the London attacks of July, 2005. Rich Site Summary (RSS) technology was used to gather data from 19,587 blog and news sites. …”
Get full text
Article -
324
Psychological Support for Individuals Experiencing Acute Trauma (Based on Experience Working with Victims of a Terrorist Attack at Crocus City Hall)
Published 2024-05-01“…The article analyzes domestic and international literature on the psychological consequences of terrorist attacks, considering the main mental disorders and symptoms associated with the trauma of being a witness, as well as methods and techniques for working with individuals who have experienced mental trauma. …”
Get full text
Article -
325
-
326
Transient Ischemic Attack and Ischemic Stroke in Danon Disease with Formation of Left Ventricular Apical Thrombus despite Normal Systolic Function
Published 2017-01-01“…Subsequently, her neurological manifestation progressed to transient ischemic attack (TIA) and eventually to ischemic stroke confirmed by CT scan with 1-day history of expressive aphasia followed by persistent left side weakness and numbness. …”
Get full text
Article -
327
Abdominal attack in a patient with hereditary angioedema due to C1 inhibitor deficiency complicated by a perforated peptic ulcer
Published 2024-02-01“…Differential diagnosis of reasons other than HAE attack should be made.…”
Get full text
Article -
328
-
329
The effectiveness of honey supplementation in feed for improving goldfish fingerling Carassius auratus immune system against Aeromonas hydrophila bacteria attack
Published 2019-01-01“…ABSTRACT The attack of Aeromonas hydrophila bacteria can cause mortality in goldfish approximately 100%. …”
Get full text
Article -
330
Experiencing Traumatic Violence: An Interpretative Phenomenological Analysis of One Man’s Lived Experience of a Violent Attack Involving a Knife
Published 2025-01-01“…Participant ‘J’ is the survivor of an extremely violent attack, involving the use of a knife, in his own home. …”
Get full text
Article -
331
Twitter fait-il parler les territoires ? Retour d'expériences à partir des tweets autour de l’attentat du 14 juillet 2016 à Nice
Published 2022-06-01Subjects: Get full text
Article -
332
Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks
Published 2025-01-01Subjects: Get full text
Article -
333
-
334
A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques
Published 2015-04-01“…However, most of them are insecure against various attacks. This paper summarizes attacks and security requirements for two-factor user authentication in WSNs. …”
Get full text
Article -
335
ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments
Published 2024-01-01“…Efficient resource and security management in multi-domain V2X environments is vital, especially with the growing threat of distributed denial-of-service (DDoS) attacks against critical V2X services within MEC. …”
Get full text
Article -
336
Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks
Published 2024-01-01“…The study implemented an event-triggered consensus-based attack detection scheme capable of distinguishing between replay (RA), denial-of-service (DoS), and false data injection (FDI) attacks. …”
Get full text
Article -
337
Utilizing of black cumin (Nigella sativa) flour to increase the immunity system of tilapia (Oreochromis niloticus) against Aeromonas hydrophila bacteria attack
Published 2022-10-01“… ABSTRACT This study aims to determine dose of black cumin flour in fish feed diets which can improve the disease resistance of tilapia against the attack of A. hydrophila. This study was used tilapia juvenile with a size of 7 – 8 cm. …”
Get full text
Article -
338
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01“…The TCP-SYNC SDN dataset, a collection of labelled network traffic data for investigating DDoS attack detection in Software-Defined Networking (SDN) environments. …”
Get full text
Article -
339
The large and central Caligo martia eyespot may reduce fatal attacks by birds: a case study supports the deflection hypothesis in nature
Published 2024-08-01“…In both experiments facsimiles were placed in two forest sites, organized in 50 blocks with four facsimiles each, and checked for predator attacks every 24 h for five consecutive days. While WE and UV facsimiles were mostly attacked in non-vital areas (wings), most bird attacks on CM were directed at vital body areas. …”
Get full text
Article -
340
Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley
Published 2025-02-01“…These signals serve as a complementary example of adversarial attacks, demonstrating how such noise can destabilize estimation algorithms and lead to critical control errors. …”
Get full text
Article