Showing 81 - 100 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 81

    Leveraging the Chain on Goals Model in Football: Applications for Attack and Defensive Play by Blanca De-la-Cruz-Torres, Miguel Navarro-Castro, Anselmo Ruiz-de-Alarcón-Quintero

    Published 2025-01-01
    “…Variables analyzed included team performance, attack and defensive performance, goals saved above average (GSAA), goals and possession value (PV), expected goals (xG), and xG on target (xGOT) for attack and defensive phases. …”
    Get full text
    Article
  2. 82

    A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks by Yasmin M. Amin, Amr T. Abdel-Hamid

    Published 2016-01-01
    “…In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. …”
    Get full text
    Article
  3. 83

    Altered Effective Connectivity of the Primary Motor Cortex in Transient Ischemic Attack by Zeqi Hao, Yulin Song, Yuyu Shi, Hongyu Xi, Hongqiang Zhang, Mengqi Zhao, Jiahao Yu, Lina Huang, Huayun Li

    Published 2022-01-01
    “…This study is aimed at exploring alteration in motor-related effective connectivity in individuals with transient ischemic attack (TIA). Methods. A total of 48 individuals with TIA and 41 age-matched and sex-matched healthy controls (HCs) were recruited for this study. …”
    Get full text
    Article
  4. 84
  5. 85

    Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs by Youngho Cho, Gang Qu

    Published 2013-08-01
    “…Furthermore, we design two attacker-aware protocols to reroute victim nodes' packets by avoiding the attackers. …”
    Get full text
    Article
  6. 86
  7. 87

    Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures by Stephanie Ness

    Published 2025-01-01
    Subjects: “…Adversarial attacks…”
    Get full text
    Article
  8. 88

    Higher P-Wave Dispersion in Migraine Patients with Higher Number of Attacks by A. Koçer, M. Eryılmaz, H. Tutkan, N. Ercan, Z. S. Küçükbayrak

    Published 2012-01-01
    “…P WD was positively correlated with P max (P<0.01). Attacks number per month and male gender were the factors related to the P WD (P<0.01). …”
    Get full text
    Article
  9. 89

    Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS by Kefei Mao, Jianwei Liu, Jie Chen

    Published 2016-01-01
    “…However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. …”
    Get full text
    Article
  10. 90

    Pixel‐wise supervision for presentation attack detection on identity document cards by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, Naser Damer

    Published 2022-09-01
    “…In this paper, a pixel‐wise supervision on DenseNet is proposed to detect presentation attacks of the printed and digitally replayed attacks. …”
    Get full text
    Article
  11. 91

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. …”
    Get full text
    Article
  12. 92
  13. 93
  14. 94
  15. 95

    Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations by Aleksėjus Michalkovič, Jokūbas Žitkevičius

    Published 2023-11-01
    “… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
    Get full text
    Article
  16. 96

    Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects by Bader Rasheed, Adil Khan, Muhammad Ahmad, Manuel Mazzara, S. M. Ahsan Kazmi

    Published 2022-01-01
    “…However, AT usually decreases the model’s accuracy on clean samples and could overfit to a specific attack, inhibiting its ability to generalize to new attacks. …”
    Get full text
    Article
  17. 97
  18. 98

    Optimal Decisions and Pricing in Mail Service Systems Subject to Virus Attacks by Sheng Zhu, Jinting Wang

    Published 2020-01-01
    “…We consider an optimal decision problem of the service providers in public mail service systems subject to virus attacks. Two scenarios, i.e., free service systems and payment systems, are investigated in the paper. …”
    Get full text
    Article
  19. 99

    Face presentation attack detection. A comprehensive evaluation of the generalisation problem by Artur Costa‐Pazo, Daniel Pérez‐Cabo, David Jiménez‐Cabello, José Luis Alba‐Castro, Esteban Vazquez‐Fernandez

    Published 2021-07-01
    “…However, it still needs to increase robustness against imposter attacks. In this regard, face Presentation Attack Detection (face‐PAD) is a key component in providing trustable facial access to digital devices. …”
    Get full text
    Article
  20. 100

    Suspected Transient Ischemic Attack Related to Dysfunctional Quadricuspid Aortic Valve by Arun Katwaroo MBBS, Jessica Kawall MBBS, Priya Ramcharan MBBS, Valmiki Seecheran MBBS, MSc, Rajeev Seecheran MBBS, MHA, Nafeesah Ali MBBS, Shari Khan MBBS, Naveen Anand Seecheran MBBS, MD, MSc

    Published 2025-01-01
    “…We describe a 30-year-old Caribbean-Black woman with a clinical presentation suggestive of a transient ischemic attack (TIA) with no conventional cerebrovascular risk factors, albeit with a newly diagnosed quadricuspid aortic valve (QAV) with moderate aortic regurgitation (AR). …”
    Get full text
    Article