-
561
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2024-11-01Subjects: Get full text
Article -
562
-
563
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks
Published 2018-11-01“…Wireless sensor networks face threats of selective forwarding attacks which are simple to implement but difficult to detect. …”
Get full text
Article -
564
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects
Published 2025-01-01Subjects: Get full text
Article -
565
The effect of the Ayas model to learning individual fast attack and high-order thinking skills of handball for students
Published 2025-01-01Subjects: Get full text
Article -
566
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Published 2020-01-01“…This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. …”
Get full text
Article -
567
False data injection attack sample generation using an adversarial attention-diffusion model in smart grids
Published 2024-12-01“…A false data injection attack (FDIA) indicates that attackers mislead system decisions by inputting false or tampered data into the system, which seriously threatens the security of power cyber-physical systems. …”
Get full text
Article -
568
Dynamic defense decision method for network real-time confrontation
Published 2019-12-01Subjects: “…attribute attack graph…”
Get full text
Article -
569
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Published 2024-12-01Subjects: “…cyber attacks…”
Get full text
Article -
570
Sequencing of game complexes in women’s volleyball: are there differences according to the set played?
Published 2024-12-01Subjects: Get full text
Article -
571
Attack Level of Brown Planthopper Nilaparvata lugens Stal (Hemiptera: Delphacidae) on Varieties of Rice from Pasaman in Greenhouse
Published 2021-07-01Subjects: “…Attack percentage…”
Get full text
Article -
572
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
Get full text
Article -
573
A single flow detection enabled method for DDoS attacks in IoT based on traffic feature reconstruction and mapping
Published 2024-01-01Subjects: “…DDoS attacks detection…”
Get full text
Article -
574
A Review of the Engineering Properties of Metakaolin Based Concrete: Towards Combatting Chloride Attack in Coastal/Marine Structures
Published 2020-01-01“…Hence, there is an increased need for alternate binder systems with the ability to reduce the effects of chloride attack in concrete. This paper presents a critical review of the engineering properties of metakaolin (MK) based concrete exposed to chloride attack. …”
Get full text
Article -
575
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
576
Security-reliability tradeoff scheme for cognitive relay networks with eavesdropping attack over Nakagami-m fading channels
Published 2018-12-01Subjects: Get full text
Article -
577
Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model
Published 2024-01-01Subjects: Get full text
Article -
578
Trauma echoes: factors associated with peritraumatic distress and anxiety five days following Iranian missile attack on Israel
Published 2025-12-01“…Introduction: On 13–14 April 2024, Iran launched ∼300 drones and missiles at Israel, in an unprecedented attack. As most studies examine the effects of trauma months or years later, less is known about its effects days later. …”
Get full text
Article -
579
IMPLICATIONS OF XENOPHOBIC ATTACKS ON NIGERIANS AND NIGERIA-SOUTH AFRICA DIPLOMATIC RELATIONS: A REVIEW OF RE-CURRENT ISSUES
Published 2024-07-01“… This study identifies factors that influence the rise in Xenophobia attacks in South Africa and how that affect diplomatic relations between Nigeria and South Africa on the global stage. …”
Get full text
Article -
580
Vortex Shedding Lock-In due to Pitching Oscillation of a Wind Turbine Blade Section at High Angles of Attack
Published 2019-01-01“…A prescribed sinusoidal pitching motion has been applied at a fixed amplitude of 7° for a range of high angles of attack 30°<α<150°. At these incidences, the airfoil will behave more like a bluff body and may experience periodic vortex shedding. …”
Get full text
Article