Showing 61 - 80 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 61

    Predictors of infliximab efficacy in patients with severe attack of ulcerative colitis by A. O. Golovenko, I. L. Khalif, O. V. Golovenko, V. V. Veselov

    Published 2013-10-01
    “…The retrospective analysis of biological therapy results in 30 patients with severe steroid-resistant attack of ulcerative colitis, assessed by Truelove and Witts’ criteria was carried out.Results. …”
    Get full text
    Article
  2. 62

    Grievous Temporal and Occipital Injury Caused by a Bear Attack by Sampath Chandra Prasad, Nikhil Dinaker Thada, Pallavi Rao, Smitha Rani Thada, Kishore Chandra Prasad

    Published 2013-01-01
    “…Bear attacks are reported from nearly every part of the world. …”
    Get full text
    Article
  3. 63

    Inference Attacks on Genomic Data Based on Probabilistic Graphical Models by Zaobo He, Junxiu Zhou

    Published 2020-09-01
    “…We propose new inference attacks to predict unknown Single Nucleotide Polymorphisms (SNPs) and human traits of individuals in a familial genomic dataset based on probabilistic graphical models and belief propagation. …”
    Get full text
    Article
  4. 64

    Experimental Analysis of Neural Approaches for Synthetic Angle-of-Attack Estimation by Angelo Lerro, Piero Gili, Mario Luca Fravolini, Marcello Napolitano

    Published 2021-01-01
    “…Within modern digital avionics, synthetic sensors can be implemented and used for several purposes such as analytical redundancy or monitoring functions. The angle of attack, measured at air data system level, can be estimated using synthetic sensors exploiting several solutions, e.g., model-based, data-driven, and model-free state observers. …”
    Get full text
    Article
  5. 65

    Localization of multiple jamming attackers in vehicular ad hoc network by Liang Pang, Xiao Chen, Yong Shi, Zhi Xue, Rida Khatoun

    Published 2017-08-01
    “…In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming attackers. …”
    Get full text
    Article
  6. 66

    My Pine Is Under Attack—What Should I Do? by Jiri Hulcr

    Published 2016-05-01
    “… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
    Get full text
    Article
  7. 67
  8. 68

    Analysis of attacks on device manager in software-defined Internet of Things by Tri-Hai Nguyen, Myungsik Yoo

    Published 2017-08-01
    “…Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.…”
    Get full text
    Article
  9. 69

    Recurrent Transient Ischemic Attacks in a Patient with POEMS Syndrome by A. Akyol, B. Nazliel, H. Z. Batur Caglayan, Y. Oner, G. Turkoz Sucak

    Published 2014-01-01
    “…A 47-year-old female with a prior history of POEMS (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes) syndrome was admitted with transient ischemic attacks complicated by dysarthria and right-sided hemiparesis. …”
    Get full text
    Article
  10. 70
  11. 71

    Verification of serialising instructions for security against transient execution attacks by Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-07-01
    “…Abstract Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels. …”
    Get full text
    Article
  12. 72

    Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application by Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono

    Published 2022-01-01
    “…One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. …”
    Get full text
    Article
  13. 73
  14. 74

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…First, to effectively distinguish DoS attacks with different energy levels, the DoS attack detection method is established based on the maximum allowable delay of the system. …”
    Get full text
    Article
  15. 75

    Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets by Alexander DeTrano, Naghmeh Karimi, Ramesh Karri, Xiaofei Guo, Claude Carlet, Sylvain Guilley

    Published 2015-01-01
    “…Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. …”
    Get full text
    Article
  16. 76

    A survey of distributed denial-of-service attack, prevention, and mitigation techniques by Tasnuva Mahjabin, Yang Xiao, Guang Sun, Wangdong Jiang

    Published 2017-12-01
    “…Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. …”
    Get full text
    Article
  17. 77

    An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack by Mi Baigang, Yu Jingyi

    Published 2021-01-01
    “…The classical aerodynamic derivative model is widely used in flight dynamics, but its application is extremely limited in cases with complicated nonlinear flows, especially at high angles of attack. A modified nonlinear aerodynamic derivative model for predicting unsteady aerodynamic forces and moments at a high angle of attack is developed in this study. …”
    Get full text
    Article
  18. 78

    Robustness of Dengue Complex Network under Targeted versus Random Attack by Hafiz Abid Mahmood Malik, Faiza Abid, Mohamed Ridza Wahiddin, Zeeshan Bhatti

    Published 2017-01-01
    “…The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. …”
    Get full text
    Article
  19. 79

    Research on Sulfate Attack Mechanism of Cement Concrete Based on Chemical Thermodynamics by Peng Liu, Ying Chen, Zhiwu Yu, Lingkun Chen, Yongfeng Zheng

    Published 2020-01-01
    “…Based on principles of chemical thermodynamics, the relationship between temperature and the Gibbs free energy of erosion products generated during the sulfate attack on cement concrete was deduced. The orientation of chemical reactions of sulfate attack on cement concrete was theoretically determined as well as the critical sulfate ion concentration and the formation conditions of erosion products. …”
    Get full text
    Article
  20. 80