-
681
Le microphone dans la balance : espaces et enjeux sonores des procès historiques des attentats de Paris et de Nice
Published 2024-10-01Subjects: Get full text
Article -
682
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: “…differential computation attack…”
Get full text
Article -
683
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01Subjects: Get full text
Article -
684
Influences of Flow Attack Angles and Flow Directions on Heat Transfer Rate, Pressure Loss, and Thermal Performance in Heat Exchanger Tube with V-Wavy Surface
Published 2018-01-01“…The vortex flow disturbs the thermal boundary layer on the heat transfer surface that is the reason for heat transfer and thermal performance enhancements. The optimum flow attack angles of the V-wavy surface for laminar and turbulent regimes are concluded.…”
Get full text
Article -
685
Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network
Published 2025-01-01Subjects: “…attack detection system…”
Get full text
Article -
686
-
687
Sensitivity of Service Life Extension and CO2 Emission due to Repairs by Silane Treatment Applied on Concrete Structures under Time-Dependent Chloride Attack
Published 2018-01-01“…The complexity occurs due to time-dependent chloride attack and nonconstant diffusion coefficient of concrete with silane treatment. …”
Get full text
Article -
688
-
689
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01Subjects: “…DoS attacks…”
Get full text
Article -
690
Twitter fait-il parler les territoires ? Retour d'expériences à partir des tweets autour de l’attentat du 14 juillet 2016 à Nice
Published 2022-06-01Subjects: Get full text
Article -
691
-
692
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01Subjects: Get full text
Article -
693
Research on LEO Satellite Network Routing Security
Published 2023-06-01Subjects: Get full text
Article -
694
Structured follow-up pathway to support people after transient ischaemic attack and minor stroke (SUPPORT TIA): protocol for a feasibility study and process evaluation
Published 2022-06-01“…Introduction People who experience transient ischaemic attack (TIA) and minor stroke have limited follow-up despite rapid specialist review in hospital. …”
Get full text
Article -
695
«CULTURAL REVOLUTION» IN THE USSR IN 1929–1932 AND THE EARLY ATTACKS AGAINST N.I. VAVILOV’S SCHOOL. A STUDY BASED ON DOCUMENTS FROM ST....
Published 2014-12-01“…Already in the early attacks against Vavilov, which began in the years of the «cultural revolution», before T.D. …”
Get full text
Article -
696
-
697
Novel method of constructing the zero-sum distinguishers
Published 2012-11-01Subjects: “…higher-order differential attack…”
Get full text
Article -
698
Evaluation of Relationship between Schemas and Panic Disorder through a Case Treated with Schema Therapy
Published 2014-08-01Subjects: Get full text
Article -
699
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01Subjects: Get full text
Article -
700
Application of Tchebichef moment in image watermarking techniques
Published 2003-01-01Subjects: Get full text
Article