Showing 361 - 380 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 361
  2. 362

    Analysis of attacking styles and goal-scoring in the 2021/22 Women's Super League. by Lizzie Craven, Patrick Oxenham, Jayamini Ranaweera

    Published 2025-01-01
    “…The style of attack for each attacking sequence was characterised by research guided key performance indicators and recorded with the outcome of the subsequent shot on target. …”
    Get full text
    Article
  3. 363

    The Holling Type II Population Model Subjected to Rapid Random Attacks of Predator by Jevgeņijs Carkovs, Jolanta Goldšteine, Kārlis Šadurskis

    Published 2018-01-01
    “…We present the analysis of a mathematical model of the dynamics of interacting predator and prey populations with the Holling type random trophic function under the assumption of random time interval passage between predator attacks on prey. We propose a stochastic approximation algorithm for quantitative analysis of the above model based on the probabilistic limit theorem. …”
    Get full text
    Article
  4. 364
  5. 365

    Improvement of Early Recognition of Attacks in Karate Kumite Due to Training in Virtual Reality by Katharina Petri, Nicole Bandow, Steffen Masik, Kerstin Witte

    Published 2019-11-01
    “…Early steps for the preparation of the attack and the reduction of distance seem to be important signals for attack recognition. …”
    Get full text
    Article
  6. 366
  7. 367
  8. 368
  9. 369

    Literature Review and Clinical Presentation of Bilateral Acetabular Fractures Secondary to Seizure Attacks by Alexandre H. Nehme, Jihad F. Matta, Alaa G. Boughannam, Fouad C. Jabbour, Joseph Imad, Ramzi Moucharafieh

    Published 2012-01-01
    “…However, 26 cases that occurred as a result of a seizure attack appeared in the literature from 1970 to 2007, with the seizure attacks themselves caused by many different factors. …”
    Get full text
    Article
  10. 370

    Secure privacy-preserving record linkage system from re-identification attack. by Sejong Lee, Yushin Kim, Yongseok Kwon, Sunghyun Cho

    Published 2025-01-01
    “…Privacy-preserving record linkage (PPRL) technology, crucial for linking records across datasets while maintaining privacy, is susceptible to graph-based re-identification attacks. These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. …”
    Get full text
    Article
  11. 371
  12. 372
  13. 373
  14. 374
  15. 375

    Safety Analysis against Tsunami Attacks at a Nuclear Power Plant Site by Jeong-Wook Seo, Jin Woo Lee, Yong-Sik Cho

    Published 2013-01-01
    “…These nuclear power plant sites may be vulnerable to unexpected tsunami attacks. In this study, a coupled numerical model based on the shallow-water theory was employed to analyze the safety of the Uljin Nuclear Power Plant site against three historical and eleven virtual tsunami attacks. …”
    Get full text
    Article
  16. 376

    A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack by Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar

    Published 2016-01-01
    “…The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave), and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. …”
    Get full text
    Article
  17. 377

    Limits of deception in Islamic laws of war: the case of civilian disguises in suicide attacks by Fajri Matahati Muhammadin

    Published 2020-10-01
    “…The suicide attack is an infamous method of warfare mostly associated with Islamic militant groups. …”
    Get full text
    Article
  18. 378
  19. 379
  20. 380

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…The massive APT attack analysis reports and threat intelligence generated by security companies have significant research value. …”
    Get full text
    Article