Showing 3,421 - 3,440 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 3421

    An Energy Modulation Interrogation Technique for Monitoring the Adhesive Joint Integrity Using the Full Spectral Response of Fiber Bragg Grating Sensors by Chow-Shing Shin, Tzu-Chieh Lin, Shun-Hsuan Huang

    Published 2024-12-01
    “…It has the advantages of being close to the damage and immune to environmental attack and electromagnetic interference. Damage and disbonding inside an adhesive joint will give rise to a non-uniform strain field that may bring about peak splitting and chirping of the FBG spectrum. …”
    Get full text
    Article
  2. 3422

    Mechanism analysis of the enhanced corrosion resistance of the Mg–2Y alloy after Mn addition by Jinhang Dong, Yuxiu Zhang, Jun Liang, Zonghui He, Xiangbin Li, Fei Long

    Published 2025-03-01
    “…The second reason was that the corrosion product films became more stable and compact after the addition of Mn, which was filled by the MnO and MnO2 layers and could effectively retard corrosion attack in the corrosive environment. As a result, the Mn-containing alloys had much better corrosion resistance than the Mg–2Y alloy did and the Mg–2Y–1Mn alloy had the highest corrosion resistance.…”
    Get full text
    Article
  3. 3423

    Clinical characteristics of anti-myelin oligodendrocyte glycoprotein antibody among aquaporin-4 negative neuromyelitis optica spectrum disorders in Egyptian patients by Sara I. Taha, Salwa I. Bakr, Nermeen T. Fouad, Dina Zamzam, Yasmine A. Mohamed

    Published 2025-01-01
    “…The presence of anti-MOG antibodies was not significantly associated with age (p = 0.696), gender (p = 0.232), type of relapse (p = 0.488), number of attacks (p = 0.968), family history of consanguinity (p = 0.211), family history of autoimmune disease (p = 0.608), nor with smoking (p = 0.608). …”
    Get full text
    Article
  4. 3424

    A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture by Navod Neranjan Thilakarathne, Muhammad Saifullah Abu Bakar, Pg Emeroylariffion Abas, Hayati Yassin

    Published 2025-01-01
    “…The agriculture sector has witnessed a surge in cyber-attacks targeting smart agriculture solutions despite being a relatively recent addition to the industry. …”
    Get full text
    Article
  5. 3425

    The Rate of Clinical Outcomes in Atrial Fibrillation according to Antithrombotic Strategy: The COOL-AF Registry by Rungroj Krittayaphong, Arjbordin Winijkul, Komsing Methavigul, Poom Sairat, C. O. O. L.-A. F. investigators

    Published 2022-01-01
    “…Ischemic stroke/transient ischemic attack (TIA), major bleeding, and death are common outcomes in atrial fibrillation (AF) patients, so appropriate antithrombotic therapy is crucial. …”
    Get full text
    Article
  6. 3426

    Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology by Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU

    Published 2022-04-01
    “…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
    Get full text
    Article
  7. 3427

    Improving the combat capability of small police tactical groups by I. V. Vlasenko, I. P. Lykhyi, Ya. O. Slatin

    Published 2024-12-01
    “…It is established that the most optimal location of the commander is in the centre of the formation, as this ensures fast communication and minimises the risk of losses during an attack. The criterion-based approach is proposed, which includes quantitative, spatial and tactical criteria for choosing the commander’s location. …”
    Get full text
    Article
  8. 3428

    Data-independent LC-MS/MS analysis of ME/CFS plasma reveals a dysregulated coagulation system, endothelial dysfunction, downregulation of complement machinery by Massimo Nunes, Mare Vlok, Amy Proal, Douglas B. Kell, Etheresia Pretorius

    Published 2024-07-01
    “…Complement machinery was also significantly downregulated, including C9 which forms part of the membrane attack complex. Additionally, we identified a significant upregulation of lactotransferrin, protein S100-A9, and an immunoglobulin variant. …”
    Get full text
    Article
  9. 3429

    Semantic Features-Based Discourse Analysis Using Deceptive and Real Text Reviews by Husam M. Alawadh, Amerah Alabrah, Talha Meraj, Hafiz Tayyab Rauf

    Published 2023-01-01
    “…Scammers leave deceptive reviews regarding services they never received, or inject fake promotions or fake feedback to lower the ranking of competitors. These malicious attacks will only increase in the future and will become a serious problem not only for merchants but also for hotel customers. …”
    Get full text
    Article
  10. 3430

    “We Will Not Change Our Attitude Towards You, Until You Change Your Attitude Towards Us”. How Washington Considered the Reaction of Western European Communist Parties to The Events... by V. T. Yungblud, M. V. Bakshaev

    Published 2022-09-01
    “…The article reveals to what extent the US administration was aware of the critical attacks against the USSR and the CPSU by the most powerful Western European Communist parties to determine how the factor of Eurocommunism influenced the Afghan vector of the US policy in 1979-1982 and how the American course turned out for the Communist parties themselves. …”
    Get full text
    Article
  11. 3431

    Explaining the interactions of city and border with the sustainable development approach Based on the logic of fuzzy multi-criteria decision making Case study: Zahedan ,Mijaveh, D... by reza mohammadi, zyinab karkaabadi, ghlam reza miri

    Published 2022-03-01
    “…"Establishing economic, political and environmental security to deal with crises, attacks and ... (ST2)" is the most desirable strategy of deciding on the issue of zero value. …”
    Get full text
    Article
  12. 3432

    A scoping review of conventional and laser acupuncture as a modality of treatment for migraine by Chizoba ANYIMUKWU, Vinayak K. NAHAR, Sunita KAPUR, Manoj SHARMA

    Published 2020-03-01
    “…Despite the wide variety of pharmacological medications, patients still experience frequent attacks or are unable to get complete relief from the prescribed medications. …”
    Article
  13. 3433

    Generalized Centered Binomial Distribution for Bimodal Lattice Signatures by Seungwoo Lee, Joo Woo, Jonghyun Kim, Jong Hwan Park

    Published 2025-01-01
    “…By incorporating the bimodal GCBD rejection sampling into BLISS, we present a new variant of BLISS that can be implemented in constant-time, thereby eliminating the side-channel vulnerabilities associated with timing attacks. Finally, we compare the performance of our variant to GALACTICS, a previous constant-time implementation of BLISS. …”
    Get full text
    Article
  14. 3434

    The New York Times on The NATO bombing of FR Yugoslavia in 1999 by Savić Aleksandra

    Published 2025-01-01
    “…Additionally, beyond the stereotypical depiction of the military attacks themselves, the relationship between the two opposing sides is portrayed in a clichéd and simplified manner. …”
    Get full text
    Article
  15. 3435

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum entanglement sources fortify secure communication protocols, improving resistance to attacks. Quantum information networks (QINs) enhance computing, sensing, and security capabilities over extended distances. …”
    Get full text
    Article
  16. 3436

    Ankylosing Spondylitis by Nazanin Ebrahimiadib, Sahar Berijani, Mohammadreza Ghahari, Fatemeh Golsoorat Pahlaviani

    Published 2021-07-01
    “…Short-term treatment with topical corticosteroids and cycloplegic agents control the uveitis attack. In resistant cases, local or systemic therapy with corticosteroids are recommended. …”
    Get full text
    Article
  17. 3437

    Prevalence, Awareness, Treatment, and Control of Hypertension and Its Associated Risk Factors: Results from Baseline Survey of SWADES Family Cohort Study by M. D. Saju, Komal Preet Allagh, Lorane Scaria, Shinto Joseph, Jotheeswaran Amuthavalli Thiyagarajan

    Published 2020-01-01
    “…The prevalence of hypertension was higher among persons with comorbidities (diabetes 64.5%, transient ischemic attack 54.7%, and heart disease 64.4%). Prevalence was lower among persons who did regular vigorous intensity exercise versus those who did moderate intensity exercise (32% vs. 45.7%) and among nonsmokers versus smokers (42.2% vs. 46.6%). …”
    Get full text
    Article
  18. 3438

    Association of body roundness index with cardiovascular disease in patients with cardiometabolic syndrome: a cross-sectional study based on NHANES 2009-2018 by Xiaohua He, Jingling Zhu, Wenfei Liang, Xiuling Yang, Weimin Ning, Zhan Zhao, Jingyi Chen, Qiuxing He

    Published 2025-02-01
    “…Therefore, this study intends to investigate the association of BRI with the risk of CVD and its components including congestive heart failure (CHF), coronary heart disease (CHD), angina, heart attack, and stroke in patients with CMS. At the same time, we hypothesized that BRI would identify CVD better than BMI or WC.MethodsData from the 2009-2018 National Health and Nutrition Examination Survey (NHANES). …”
    Get full text
    Article
  19. 3439

    Real Time Fractional Robust Adaptive Scheme for Frequency Regulation in Double Area Hybrid Power System With Renewables by Ahmed Ragab, Dalia Allam, Ahmed F. Zobaa, Hazem Ali Attia

    Published 2025-01-01
    “…To validate the superiority of the proposed controller, five challenging scenarios have been considered, encompassing load fluctuations, integration of renewable energy sources, changes in system parameters and time delay attacks. The proposed controller effectively minimizes area control error achieving stability and showing cost function enhancement of 15% to 152% compared to other tested controllers in all scenarios. …”
    Get full text
    Article
  20. 3440

    Combination therapy of low-dose radiotherapy and immunotherapy in advanced metastatic nasopharyngeal carcinoma: a case report and literature review by Chun-Qiao Chen, Hui Huang, Min Pan, Zhe Jia, Jing Zhang, Qiu-Qiu Chen

    Published 2025-01-01
    “…When combined with immune checkpoint inhibitors, LDRT has been shown to significantly improve the immune microenvironment of tumors, thereby promote the immune attack on tumor cells. However, the therapeutic effect of LDRT combined with immunotherapy in advanced NPC is not well understood. …”
    Get full text
    Article