Showing 41 - 60 results of 2,093 for search '"Attacker"', query time: 0.05s Refine Results
  1. 41

    Similarity Property and Slide Attack of Block Cipher FESH by Yafei Zheng, Wenling Wu

    Published 2023-01-01
    “…Slide attack of FESH is exactly a concrete example of SPN structure.…”
    Get full text
    Article
  2. 42

    Prompt injection attacks on vision language models in oncology by Jan Clusmann, Dyke Ferber, Isabella C. Wiest, Carolin V. Schneider, Titus J. Brinker, Sebastian Foersch, Daniel Truhn, Jakob Nikolas Kather

    Published 2025-02-01
    “…Using a set of N = 594 attacks, we show that all of these models are susceptible. …”
    Get full text
    Article
  3. 43

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
    Get full text
    Article
  4. 44

    Analysis of the Fault Attack ECDLP over Prime Field by Mingqiang Wang, Tao Zhan

    Published 2011-01-01
    “…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
    Get full text
    Article
  5. 45
  6. 46
  7. 47

    A Panel of Blood Biomarkers for the Diagnosis of Transient Ischemic Attacks by Daisy Guamán-Pilco, Elena Palà, Marcel Lamana-Vallverdú, Anna Penalba, Paula García-Rodríguez, Marta Rubiera, Alejandro Bustamante, Soledad Pérez-Sánchez, Joan Montaner

    Published 2025-01-01
    “…Accurate diagnosis of transient ischemic attacks (TIAs) is challenging. This study was aimed at analyzing blood biomarkers to distinguish TIAs from mimics. …”
    Get full text
    Article
  8. 48
  9. 49
  10. 50

    Detecting and Defending against Replication Attacks in Wireless Sensor Networks by Xiang-yi Chen, Li-xia Meng, Yong-zhao Zhan

    Published 2013-06-01
    “…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. Existing replicas detection schemes can be further improved in regard of detection probabilities, detection overheads, and the balance of detection overheads among sensor nodes. …”
    Get full text
    Article
  11. 51
  12. 52

    Acute Attack of Pseudogout with the Wide Lesion in Lumbar Spondylolytic Spondylolisthesis by Hironari Kaneyama, Yuichiro Morishita, Osamu Kawano, Takuaki Yamamoto, Takeshi Maeda

    Published 2020-01-01
    “…To report a rare case of an acute attack of calcium pyrophosphate dihydrate (CPPD) deposition disease in a patient with lumbar spondylolytic spondylolisthesis, which demonstrated widespread lesion with neurological deficit. …”
    Get full text
    Article
  13. 53

    Dental Trauma following Animal Attack: A Case Report by Meetkumar Dedania, Nimisha Shah, Sankalp Mahajan, Riddhi Thakkar

    Published 2025-01-01
    “…Animal attacks are a common cause of human injuries worldwide, with human-leopard encounters frequently reported in India. …”
    Get full text
    Article
  14. 54

    Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks by Wassim Znaidi, Marine Minier, Stéphane Ubéda

    Published 2013-04-01
    “…If no specific detection mechanisms are established, the attacker could lead many insidious attacks. In this work, we first introduce a new hierarchical distributed algorithm for detecting node replication attacks using a Bloom filter mechanism and a cluster head selection (see also Znaidi et al. (2009)). …”
    Get full text
    Article
  15. 55

    My Pine Is Under Attack—What Should I Do? by Jiri Hulcr

    Published 2016-05-01
    “… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
    Get full text
    Article
  16. 56

    An Unusual Cause of Transient Ischemic Attack in a Patient with Pacemaker by Jagadeesh Kumar Kalavakunta, Vishal Gupta, Basil Paulus, William Lapenna

    Published 2014-01-01
    “…We present a 77-year-old man with history of atrial fibrillation and pacemaker placement who was admitted for transient ischemic attack. He was on aspirin, beta blocker, and warfarin with subtherapeutic international normalized ratio. …”
    Get full text
    Article
  17. 57
  18. 58

    Importance of Video-EEG Monitoring in the Diagnosis of Refractory Panic Attacks by Batool F. Kirmani, Diana Mungall

    Published 2013-01-01
    “…Partial seizures can be misdiagnosed as panic attacks. There is considerable overlap of symptoms between temporal lobe seizures and panic attacks making the diagnosis extremely challenging. …”
    Get full text
    Article
  19. 59

    Exploiting statistical effective fault attack in a blind setting by Navid Vafaei, Hadi Soleimany, Nasour Bagheri

    Published 2023-07-01
    “…A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). …”
    Get full text
    Article
  20. 60

    Dynamic Characteristics of the Rotating Penetrating Missile for Attacking Warship Vertically by Dong-ze Qin, Pei-hang Li

    Published 2021-01-01
    “…The paper aimed to analyze the dynamic response of a new type penetrating missile in rotary attacking warship. The dynamic response characteristics of the penetrator become more complex when attacking the ship target due to the special materials of the deck such as stiffeners. …”
    Get full text
    Article