-
61
Predictors of infliximab efficacy in patients with severe attack of ulcerative colitis
Published 2013-10-01“…The retrospective analysis of biological therapy results in 30 patients with severe steroid-resistant attack of ulcerative colitis, assessed by Truelove and Witts’ criteria was carried out.Results. …”
Get full text
Article -
62
Grievous Temporal and Occipital Injury Caused by a Bear Attack
Published 2013-01-01“…Bear attacks are reported from nearly every part of the world. …”
Get full text
Article -
63
Inference Attacks on Genomic Data Based on Probabilistic Graphical Models
Published 2020-09-01“…We propose new inference attacks to predict unknown Single Nucleotide Polymorphisms (SNPs) and human traits of individuals in a familial genomic dataset based on probabilistic graphical models and belief propagation. …”
Get full text
Article -
64
Experimental Analysis of Neural Approaches for Synthetic Angle-of-Attack Estimation
Published 2021-01-01“…Within modern digital avionics, synthetic sensors can be implemented and used for several purposes such as analytical redundancy or monitoring functions. The angle of attack, measured at air data system level, can be estimated using synthetic sensors exploiting several solutions, e.g., model-based, data-driven, and model-free state observers. …”
Get full text
Article -
65
Localization of multiple jamming attackers in vehicular ad hoc network
Published 2017-08-01“…In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming attackers. …”
Get full text
Article -
66
My Pine Is Under Attack—What Should I Do?
Published 2016-05-01“… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
Get full text
Article -
67
Recurrent “transient ischemic attacks” caused by pulmonary arteriovenous malformation
Published 2025-01-01Subjects: Get full text
Article -
68
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.…”
Get full text
Article -
69
Recurrent Transient Ischemic Attacks in a Patient with POEMS Syndrome
Published 2014-01-01“…A 47-year-old female with a prior history of POEMS (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes) syndrome was admitted with transient ischemic attacks complicated by dysarthria and right-sided hemiparesis. …”
Get full text
Article -
70
Enhancing the Diagnosis of Transient Ischemic Attacks Through Biomarker Innovation
Published 2025-01-01Get full text
Article -
71
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…Abstract Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels. …”
Get full text
Article -
72
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. …”
Get full text
Article -
73
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
74
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
Published 2022-01-01“…First, to effectively distinguish DoS attacks with different energy levels, the DoS attack detection method is established based on the maximum allowable delay of the system. …”
Get full text
Article -
75
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Published 2015-01-01“…Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. …”
Get full text
Article -
76
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Published 2017-12-01“…Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. …”
Get full text
Article -
77
An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack
Published 2021-01-01“…The classical aerodynamic derivative model is widely used in flight dynamics, but its application is extremely limited in cases with complicated nonlinear flows, especially at high angles of attack. A modified nonlinear aerodynamic derivative model for predicting unsteady aerodynamic forces and moments at a high angle of attack is developed in this study. …”
Get full text
Article -
78
Robustness of Dengue Complex Network under Targeted versus Random Attack
Published 2017-01-01“…The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. …”
Get full text
Article -
79
Research on Sulfate Attack Mechanism of Cement Concrete Based on Chemical Thermodynamics
Published 2020-01-01“…Based on principles of chemical thermodynamics, the relationship between temperature and the Gibbs free energy of erosion products generated during the sulfate attack on cement concrete was deduced. The orientation of chemical reactions of sulfate attack on cement concrete was theoretically determined as well as the critical sulfate ion concentration and the formation conditions of erosion products. …”
Get full text
Article -
80
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01Subjects: Get full text
Article