-
341
State of Siege in South Dobrogea. Action plan and instructions against attacks by Bulgarian komitadjis developed by the 9th Romanian Division command
Published 2025-01-01“…Like an arch in time, in 1926, in peacetime, after 62 years since the vote on the Siege Law of 1864, the attacks of the Bulgarian comitages threatening the population, territory, and the exercise of state authority at the southern border imposed the extension of the provisions on the state of siege and their application by the War Council of the 9th Division. …”
Get full text
Article -
342
A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems
Published 2021-03-01“…It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks. …”
Get full text
Article -
343
Evaluation of Relationship between Schemas and Panic Disorder through a Case Treated with Schema Therapy
Published 2014-08-01Subjects: Get full text
Article -
344
A Probabilistic Analysis to Quantify the Effect of March 11, 2004, Attacks in Madrid on the March 14 Elections in Spain: A Dynamic Modelling Approach
Published 2015-01-01“…Using this model, we conclude that the probability is very low that the PSOE would have won had the attack not happened. Moreover, after the attack, the PSOE increased an average of 5.6% in voting on March 14 and an average of 11.2% of the Spanish people changed their vote between March 11 and March 14. …”
Get full text
Article -
345
Resolution of Refractory Status Epilepticus With Ketamine Without Intubation in a Patient With Stroke-Like Migraine Attacks After Radiation Therapy (SMART) Syndrome
Published 2025-01-01“…Stroke-like migraine attacks after radiation therapy (SMART) syndrome is an infrequently reported complication arising years after radiation therapy that manifests as a reversible syndrome marked by migraine-like headaches, focal neurologic signs, and/or seizures. …”
Get full text
Article -
346
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks
Published 2012-09-01“…Our scheme has the properties of constant storage, lower communication overhead, long lifespan, forward secrecy, backward secrecy, and resistance to collusion attacks.…”
Get full text
Article -
347
GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks
Published 2024-12-01“…The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. …”
Get full text
Article -
348
-
349
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01Subjects: Get full text
Article -
350
Influences of Flow Attack Angles and Flow Directions on Heat Transfer Rate, Pressure Loss, and Thermal Performance in Heat Exchanger Tube with V-Wavy Surface
Published 2018-01-01“…The vortex flow disturbs the thermal boundary layer on the heat transfer surface that is the reason for heat transfer and thermal performance enhancements. The optimum flow attack angles of the V-wavy surface for laminar and turbulent regimes are concluded.…”
Get full text
Article -
351
-
352
Sensitivity of Service Life Extension and CO2 Emission due to Repairs by Silane Treatment Applied on Concrete Structures under Time-Dependent Chloride Attack
Published 2018-01-01“…The complexity occurs due to time-dependent chloride attack and nonconstant diffusion coefficient of concrete with silane treatment. …”
Get full text
Article -
353
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01Subjects: “…DoS attacks…”
Get full text
Article -
354
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01Subjects: Get full text
Article -
355
A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION
Published 2024-01-01Subjects: “…distress detection, fuzzy logic, parameters, physical attack…”
Get full text
Article -
356
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01Subjects: Get full text
Article -
357
-
358
Structured follow-up pathway to support people after transient ischaemic attack and minor stroke (SUPPORT TIA): protocol for a feasibility study and process evaluation
Published 2022-06-01“…Introduction People who experience transient ischaemic attack (TIA) and minor stroke have limited follow-up despite rapid specialist review in hospital. …”
Get full text
Article -
359
«CULTURAL REVOLUTION» IN THE USSR IN 1929–1932 AND THE EARLY ATTACKS AGAINST N.I. VAVILOV’S SCHOOL. A STUDY BASED ON DOCUMENTS FROM ST....
Published 2014-12-01“…Already in the early attacks against Vavilov, which began in the years of the «cultural revolution», before T.D. …”
Get full text
Article -
360
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article