-
41
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…Slide attack of FESH is exactly a concrete example of SPN structure.…”
Get full text
Article -
42
Prompt injection attacks on vision language models in oncology
Published 2025-02-01“…Using a set of N = 594 attacks, we show that all of these models are susceptible. …”
Get full text
Article -
43
On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas
Published 2013-08-01“…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
Get full text
Article -
44
Analysis of the Fault Attack ECDLP over Prime Field
Published 2011-01-01“…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
Get full text
Article -
45
A New Attack Recovery Approach and <italic>H</italic>∞ Performance Analysis for LFC Systems With FDI Attacks and Uncertainties
Published 2025-01-01Subjects: “…false data injection (FDI) attacks…”
Get full text
Article -
46
Prospective study of factors associated with asthma attack recurrence (ATTACK) in children from three Ecuadorian cities during COVID-19: a study protocol
Published 2022-06-01“…The primary outcome will be rate of asthma attack recurrence during up to 12 months of follow-up. …”
Get full text
Article -
47
A Panel of Blood Biomarkers for the Diagnosis of Transient Ischemic Attacks
Published 2025-01-01“…Accurate diagnosis of transient ischemic attacks (TIAs) is challenging. This study was aimed at analyzing blood biomarkers to distinguish TIAs from mimics. …”
Get full text
Article -
48
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01Subjects: Get full text
Article -
49
Guest Editorial: WACV 2020—Presentation attacks on biometric systems
Published 2021-07-01Get full text
Article -
50
Detecting and Defending against Replication Attacks in Wireless Sensor Networks
Published 2013-06-01“…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. Existing replicas detection schemes can be further improved in regard of detection probabilities, detection overheads, and the balance of detection overheads among sensor nodes. …”
Get full text
Article -
51
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
52
Acute Attack of Pseudogout with the Wide Lesion in Lumbar Spondylolytic Spondylolisthesis
Published 2020-01-01“…To report a rare case of an acute attack of calcium pyrophosphate dihydrate (CPPD) deposition disease in a patient with lumbar spondylolytic spondylolisthesis, which demonstrated widespread lesion with neurological deficit. …”
Get full text
Article -
53
Dental Trauma following Animal Attack: A Case Report
Published 2025-01-01“…Animal attacks are a common cause of human injuries worldwide, with human-leopard encounters frequently reported in India. …”
Get full text
Article -
54
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
Published 2013-04-01“…If no specific detection mechanisms are established, the attacker could lead many insidious attacks. In this work, we first introduce a new hierarchical distributed algorithm for detecting node replication attacks using a Bloom filter mechanism and a cluster head selection (see also Znaidi et al. (2009)). …”
Get full text
Article -
55
My Pine Is Under Attack—What Should I Do?
Published 2016-05-01“… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
Get full text
Article -
56
An Unusual Cause of Transient Ischemic Attack in a Patient with Pacemaker
Published 2014-01-01“…We present a 77-year-old man with history of atrial fibrillation and pacemaker placement who was admitted for transient ischemic attack. He was on aspirin, beta blocker, and warfarin with subtherapeutic international normalized ratio. …”
Get full text
Article -
57
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
Published 2006-01-01Get full text
Article -
58
Importance of Video-EEG Monitoring in the Diagnosis of Refractory Panic Attacks
Published 2013-01-01“…Partial seizures can be misdiagnosed as panic attacks. There is considerable overlap of symptoms between temporal lobe seizures and panic attacks making the diagnosis extremely challenging. …”
Get full text
Article -
59
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01“…A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). …”
Get full text
Article -
60
Dynamic Characteristics of the Rotating Penetrating Missile for Attacking Warship Vertically
Published 2021-01-01“…The paper aimed to analyze the dynamic response of a new type penetrating missile in rotary attacking warship. The dynamic response characteristics of the penetrator become more complex when attacking the ship target due to the special materials of the deck such as stiffeners. …”
Get full text
Article