Showing 3,481 - 3,500 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 3481

    Lebanon: An Ordinary “Consociational Democracy” in the Regional Context by A. V. Sarabiev

    Published 2019-09-01
    “…Heightened relations with Syria by 2005, the Israeli attack in 2006, the gravest threat from jihadi-caliphatists – all these factors have negatively affected intra-civil and inter-group relations. …”
    Get full text
    Article
  2. 3482

    Efficient task scheduling and computational offloading optimization with federated learning and blockchain in mobile cloud computing by Matheen Fathima G, Shakkeera L

    Published 2025-03-01
    “…The Android platform is more vulnerable to attacks since it is open-source, allows third-party app stores and it has extensive app screening. …”
    Get full text
    Article
  3. 3483

    PoWBWM: Proof of work consensus cryptographic blockchain-based adaptive watermarking system for tamper detection applications by P. Aberna, L. Agilandeeswari

    Published 2025-01-01
    “…In comparison with the existing system, the experimental findings of the suggested model show an effective tamper detection watermarking system as well as a robust against both intentional and unintentional attacks with an average NCC value of 0.98.…”
    Get full text
    Article
  4. 3484

    Scabies Outbreak Investigation and Risk Factors in East Badewacho District, Southern Ethiopia: Unmatched Case Control Study by Jarso Sara, Yusuf Haji, Achamyelesh Gebretsadik

    Published 2018-01-01
    “…A total of 4,532 scabies cases line listed with overall attack rate of 110/1,000 population. The mean age was 12 years, and most affected age group was 5–14 years. …”
    Get full text
    Article
  5. 3485

    Main threats to the state’s interests in the sphere of information security of Ukraine by O. Yu. Starostin

    Published 2024-03-01
    “…For the purpose of more comprehensive understanding of the main threats to the interests of the state in the field of information security of Ukraine, the following threats are identified: the use of information influence to distort political opinion and attitudes of the population to certain phenomena, processes, public authorities, political forces and individuals; imperfect regulatory and legal support for the information security of the state; deliberate distortion of information at the level of state leaders and diplomatic representatives and their negative impact on the opinion of the international community; insufficient participation of the Ukrainian population in countering information attacks; insufficient institutional and organisational support for information security education and the formation of an information security culture in society. …”
    Get full text
    Article
  6. 3486

    Explosive Performance Assessment of Buried Steel Pipeline by Seyed-Mohammad Seyed-Kolbadi, Mohammad Safi, Ayoub Keshmiri, S. Mahdi S. Kolbadi, Masoud Mirtaheri

    Published 2021-01-01
    “…It is so important to consider the passive defense problem in any places there have been attacks by varies kinds of military threats and terrorists. …”
    Get full text
    Article
  7. 3487

    Assessing the Adherence of ChatGPT Chatbots to Public Health Guidelines for Smoking Cessation: Content Analysis by Lorien C Abroms, Artin Yousefi, Christina N Wysota, Tien-Chin Wu, David A Broniatowski

    Published 2025-01-01
    “…All chatbots showed resilience to adversarial attacks that were intended to derail the conversation. …”
    Get full text
    Article
  8. 3488

    A high-throughput ResNet CNN approach for automated grapevine leaf hair quantification by Nagarjun Malagol, Tanuj Rao, Anna Werner, Reinhard Töpfer, Ludger Hausmann

    Published 2025-01-01
    “…A high leaf hair density present on the abaxial surface of the grapevine leaves influences their wettability by repelling forces, thus preventing pathogen attack such as downy mildew and anthracnose. Moreover, leaf hairs as a favorable habitat may considerably affect the abundance of biological control agents. …”
    Get full text
    Article
  9. 3489

    Coping, meaning in life, and quality of life during ongoing conflict: insights from Israeli populations by Orly Sarid, Liat Hamama, Yaira Hamama-Raz

    Published 2025-01-01
    “…Methods In May 2024, seven months post–October 7th attacks, we conducted a cross-sectional study with 366 participants (221 evacuated, 145 non-evacuated) via a survey company. …”
    Get full text
    Article
  10. 3490

    The Analysis of Dynamic Changes and Prognosis of Posner–Schlossman Syndrome with Cytomegalovirus Infection and Antiviral Therapy by Qilian Sheng, Ruyi Zhai, Xintong Fan, Xiangmei Kong

    Published 2021-01-01
    “…Clinical retrospective cohort study in the Eye & ENT Hospital of Fudan University, Shanghai, China. The attacked eyes of 98 eligible subjects diagnosed unilateral PSS were enrolled between 2016 and 2019. …”
    Get full text
    Article
  11. 3491

    A Pilot Study of Hemoglobin A1C Levels in Patients with Type 2 Diabetes after Creation of a Patient Assistance Program Enrollment Committee at a Student-Run Free Clinic by John D. Salvemini, Gregory R. Vance, Amanda Pham, Garner Fincher, Johnny Yang, Harshin Sanjanwala, Leonna Conley, Alan Penman, James Pitcock

    Published 2025-01-01
    “…ED visits and hospital admissions for heart attacks occurred only in the non-PAP group. Conclusion: While patients enrolled in PAPs showed a greater average reduction in A1C, the difference was not statistically significant. …”
    Get full text
    Article
  12. 3492

    Face Boundary Formulation for Harmonic Models: Face Image Resembling by Hung-Tsai Huang, Zi-Cai Li, Yimin Wei, Ching Yee Suen

    Published 2025-01-01
    “…The boundary and numerical techniques of face images in this paper can be used not only for pattern recognition but also for face morphing, morphing attack detection (MAD), and computer animation as Sora to greatly enhance further developments in AI.…”
    Get full text
    Article
  13. 3493

    Mechanistic insights and atmospheric implications of the degradation reaction of 3-methoxy-1-propanol by reaction with hydroxyl radicals and identification of the end products in t... by Abolfazl Shiroudi, Theo Kurtén, Jacek Czub

    Published 2025-01-01
    “…The rate coefficient for 3M1P degradation was calculated from the sum of the rate coefficients corresponding to the removal of H-atoms from primary (–CH3), secondary (–CH2–), tertiary (–CH< ), and alcohol (–ΟH) groups. The primary attack by hydroxyl radicals occurs at the hydrogen atom bonded to carbon atoms adjacent to the oxygen atom in the ether group, leading to the formation of alkyl radicals. …”
    Get full text
    Article
  14. 3494

    Regional Arterial Stiffness in Patients with Inflammatory Bowel Disease by V. V. Genkel, R. G. Portnova, T. V. Antipina, I. I. Shaposhnik

    Published 2019-06-01
    “…To study muscular (brachial and radial arteries) and elastic (aorta) regional arterial stiffness in IBD patients in comparison with those without IBD, as well as to establish the relationship between arterial stiffness and the characteristics of the IBD course (the duration of illness, severity of attack, activity of systemic inflammation). Materials and methods. …”
    Get full text
    Article
  15. 3495

    An Autonomous Underwater Vehicle Navigation Technique for Inspection and Data Acquisition in UWSNs by Arif Wibisono, Md. Jalil Piran, Hyoung-Kyu Song, Byung Moo Lee

    Published 2024-01-01
    “…Furthermore, in the inspection and data acquisition mission in UWSN simulated as node points (o) in pink, AUV (&#x002A;) in blue effectively follows the predetermined points while acquiring data, as indicated by green lines (-) within just 5 seconds, achievable by increasing the value of <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula> (angle of attack) of the target node to reduce delay time. The evaluation of the experimental simulations has raised issues and future research challenges, including the development of environmental simulation challenges that can closely resemble real conditions, the measurement of energy usage effectiveness to reach each target point, and the potential development of underwater recharging techniques. …”
    Get full text
    Article
  16. 3496

    One size does not fit all: Classical weed biological control across continents by Emily J. Le Falchier, T. Telmadarrehei, M.A. Rafter, C.R. Minteer

    Published 2025-01-01
    “…To evaluate the risk of non-target attack by P. ichini on three Australian native non-target species (Rhus taitensis, Pleiogynium timoriense, and Euroschinus falcatus), we performed a two-phase open-field experiment to simulate the spillover risk of the biological control agent in both the presence and absence of their preferred host, S. terebinthifolia. …”
    Get full text
    Article
  17. 3497

    2D physically unclonable functions of the arbiter type by V. N. Yarmolik, A. A. Ivaniuk

    Published 2023-03-01
    “…It seems promising to further develop the ideas of constructing two-dimensional physically unclonable functions of the arbiter type, as well as experimental study of their characteristics, as well as resistance to various types of attacks, including using machine learning.…”
    Get full text
    Article
  18. 3498

    Prehospital video triage of suspected stroke patients in Greater Manchester: pilot project report by Christopher Ashton, Adrian R Parry-Jones, Lisa Brunton, Ibrahim Alghamdi, David A Jenkins

    Published 2025-01-01
    “…Final diagnosis for PHVT patients was stroke in 15 (33%) of cases, non-stroke in 20 (43%) and transient ischaemic attack in 11 (24%).Patients/caregivers found PHVT beneficial in directing them to appropriate hospitals and streamlining admission and treatment. …”
    Get full text
    Article
  19. 3499

    Legal aspects of functional security standardisation of the Internet of Things by P. S. Klimushyn, V. Ye. Roh, T. P. Kolisnyk

    Published 2023-09-01
    “…A review of existing security infrastructures for IoT-based intelligent environments shows that every connected device can be a potential entry point for an attack. An overview of the key aspects of security standards for smart environments based on the Internet of Things has been provided in the following areas: potential solutions, intelligent environments, limits of security assessment, open issues and challenges. …”
    Get full text
    Article
  20. 3500

    Inhibition of Tannerpin-M encoded by periodontal pathogens on serine proteases released by granulocytes by PAN Zihao, XU Jiawei, ZHOU Aiwu

    Published 2024-12-01
    “…It revealed that Tannerpin-M possessed a significantly elongated reactive center loop and could undergo the classical conformational transition from a stressed to a relaxed state.Conclusion·Tannerpin-M, derived from oral pathogenic bacteria, is a typical inhibitory Serpin, and can effectively inhibit the serine protease released by granulocytes, by which it may protect the oral pathogenic bacteria from attacks of the human immune system.…”
    Get full text
    Article