Showing 401 - 420 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 401

    Limb-Shaking Transient Ischemic Attacks Successfully Treated with External Carotid Artery Stenting by George N. Kouvelos, Christos Nassis, Nektario Papa, George Papadopoulos, Miltiadis I. Matsagkas

    Published 2012-01-01
    “…Limb-shaking transient ischemic attacks (TIAs) are a relatively rare manifestation of carotid artery disease that may present with repetitive shaking movements of the affected limbs. …”
    Get full text
    Article
  2. 402
  3. 403
  4. 404

    Reversible Spectral Speech Watermarking with Variable Embedding Locations Against Spectrum-Based Attacks by Xuping Huang, Akinori Ito

    Published 2025-01-01
    “…The result of EER indicated that the adaptive hiding performed best against attacks by spectral analysis.…”
    Get full text
    Article
  5. 405

    Enhancing Adversarial Transferability With Intermediate Layer Feature Attack on Synthetic Aperture Radar Images by Xuanshen Wan, Wei Liu, Chaoyang Niu, Wanjie Lu, Yuanli Li

    Published 2025-01-01
    “…Existing SAR adversarial attack algorithms require access to the network structure, parameters, and training data, which are often inaccessible in real-world scenarios. …”
    Get full text
    Article
  6. 406
  7. 407
  8. 408
  9. 409
  10. 410
  11. 411
  12. 412

    Terminal Guidance with Attack Time and Impact Angle Constraints for Hypersonic Vehicle in Dive Phase by Zhao-ting Li, Hong-bo Zhang

    Published 2018-01-01
    “…The terminal guidance problem of hypersonic gliding missiles under multiple constraints was considered regarding a coordinated attack in time and space. In this paper, a three-dimensional terminal guidance method based on the real-time updating of parameters is proposed with consideration to the attack time and terminal angle. …”
    Get full text
    Article
  13. 413

    Distributed Energy Management for Port Power System under False Data Injection Attacks by Qihe Shan, Xin Zhang, Qiongyue Zhang, Qiuye Sun

    Published 2022-01-01
    “…This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. …”
    Get full text
    Article
  14. 414
  15. 415
  16. 416
  17. 417

    Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System by Dana Hasan, Rebeen R. Hama Amin, Masnida Hussin

    Published 2020-06-01
    Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
    Get full text
    Article
  18. 418

    A computational fluid dynamics analysis of the aerodynamic influence of angles of attack on the Skylon spaceplane by Vivekamanickam Koothan Venkateswaran, Unai Fernandez Gamiz, Ana Boyano, Jesus Maria Blanco

    Published 2025-01-01
    “…This paper explores the aerodynamic behavior of a reusable launch vehicle, the Skylon spaceplane, for different angles of attack at Mach 5. The goal is to determine how aerodynamic effects manifest at various angles of attack and compare it with the theoretical data along with the determination of total time required for such computational fluid dynamics (CFD) simulations. …”
    Get full text
    Article
  19. 419
  20. 420

    Damage and Degradation of Concrete under Coupling Action of Freeze-Thaw Cycle and Sulfate Attack by Wei Tian, Fangfang Gao

    Published 2020-01-01
    “…In this study, the mechanical behaviors, failure characteristics, and microstructure of concrete containing fly ash (FA) against combined freeze-thaw cycles and sulfate attack were studied compared with normal concrete, and the formation rates of corrosion products during coupling cycles were investigated. …”
    Get full text
    Article