Showing 101 - 120 results of 2,093 for search '"Attacker"', query time: 0.07s Refine Results
  1. 101

    Serum Leptin Is not a Diagnostic Marker for Familial Mediterranean Fever Attacks by Bülent Toy, Orhan Tarçın, Sait Bağcı, Yücel Üstündağ, Ali Inal, Arzu Tiftikçi

    Published 2006-01-01
    “…The mean serum leptin levels before the attacks were 6.45±1.05 (Mean ± SEM) and during the attacks were 7.59±1.3 (Mean ± SEM) in FMF group, respectively. …”
    Get full text
    Article
  2. 102

    Research on Aircraft Attack Angle Control Considering Servo-Loop Dynamics by Xiaodong Liu, Yan Wang, Wanwei Huang, Zongxia Jiao

    Published 2015-01-01
    “…This paper presents a novel robust attack angle control approach, which can effectively suppress the impacts from system uncertainties and servo-loop dynamics. …”
    Get full text
    Article
  3. 103

    Estimation of the Occurrence Time of Thaumasite Sulfate Attack on Tunnel Lining Concrete by Chongbang Xu, Xiaojing Gao, Xuefeng Li, Kaishun Zhang

    Published 2020-01-01
    “…The thaumasite sulfate attack (TSA) on tunnel concrete structure has been reported increasingly in the past decades. …”
    Get full text
    Article
  4. 104
  5. 105

    MARPUF: physical unclonable function with improved machine learning attack resistance by Somanath Tripathy, Vikash Kumar Rai, Jimson Mathew

    Published 2021-08-01
    “…Ssome of the popular ML techniques are used to test the ML attack resistance and compare the results with some existing PUFs. …”
    Get full text
    Article
  6. 106

    Effects of Sodium Sulfate Attack on Concrete Incorporated with Drying-Wetting Cycles by Fang Liu, Zhanping You, Rui Xiong, Xu Yang

    Published 2021-01-01
    “…It has been widely observed that sulfate attack can damage the durability of concrete. This research investigated the mass loss and damage degree of concrete under sodium sulfate attack incorporated with drying-wetting cycles. …”
    Get full text
    Article
  7. 107

    Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version by M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan

    Published 2015-01-01
    “…The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. …”
    Get full text
    Article
  8. 108

    AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid by Jongbin Ko, Hyunwoo Lim, Seokjun Lee, Taeshik Shon

    Published 2014-01-01
    “…To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. …”
    Get full text
    Article
  9. 109

    An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid by Yihe Wang, Mingli Zhang, Kun Song, Tie Li, Na Zhang

    Published 2021-01-01
    “…Then, the evolution mechanism of the dispatch system of the microgrid under different attack scenarios is adequately discussed. On this basis, an optimal attack strategy based on enumerating-search algorithm is presented to allocate the limited attack resources reasonably, so as to maximize the effect of DoS attacks. …”
    Get full text
    Article
  10. 110

    Serum Leptin Is not a Diagnostic Marker for Familial Mediterranean Fever Attacks

    Published 2006-01-01
    “…We investigated serum levels of leptin, interleukin-6 (IL-6) erythrocyte sedimentation rate (ESR),} C-reactive protein (CRP),fibrinogen, and leukocyte counts before the attack and 8–12 hours after the attack started. …”
    Get full text
    Article
  11. 111
  12. 112

    Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication by Haiqing Liu, Shiqiang Zheng, Shuhua Hao, Yuancheng Li

    Published 2018-01-01
    “…However, facial recognition has also been subjected to criticism due to security concerns. The main attack methods include photo, video, and three-dimensional model attacks. …”
    Get full text
    Article
  13. 113
  14. 114

    Robust Integrated Guidance and Control Design for Angle Penetration Attack of Multimissiles by Huan Zhou, Xin Zhao

    Published 2022-01-01
    “…Angle penetration attack ability plays a more and more important role for missiles in modern warfare, and the traditional separate guidance and control system design problem is the key to restrict the improvement of time-sensitive attack and cooperative attack ability of multimissiles. …”
    Get full text
    Article
  15. 115

    Trabeculectomy versus stepwise treatment for breaking the attack of acute primary angle closure in patients with long attack duration: study design and protocol for a multicentre randomised controlled trial (LAAAC) by Jing Jiang, Qing Zhang, Bo Qu, Chao Dai, Mingguang He, Ye Zhang, Ning-Li Wang, Shuning Li, Guangxian Tang, Su Jie Fan, Zhi Li, Chi Liu, Xinqi Chang, Yanyan Cheng

    Published 2025-02-01
    “…However, patients with APAC in China and developed countries differ in disease characteristics as the Chinese have longer attack duration and lower success rate in breaking the attack with solely medication or laser therapy. …”
    Get full text
    Article
  16. 116

    Personalized biological treatment with lanadelumab in a patient with recurrent attacks of hereditary angioedema by Artur Gęsicki, Maciej F. Kozlowski, Karolina Żurawska, Weronika Ossowska, Jakub Sikora, Szymon Dyguś, Iwona Poziomkowska-Gęsicka

    Published 2024-08-01
    “…Long-term treatment to prevent further attacks consists of continuous and regular administration of medications to reduce the number and severity of oedema attacks in HAE patients, thereby reducing the indirect burden of the disease. …”
    Get full text
    Article
  17. 117
  18. 118

    Using Electrocardiogram Signal Features and Heart Rate Variability to Predict Epileptic Attacks by Ying Jiang, Yuan Feng, Danni Lu, Lin Yang, Qun Zhang, Haiyan Yang, Ning Li

    Published 2025-01-01
    “…Since the increase in neuronal activity during an epileptic attack affects the voluntary nervous system, and the voluntary nervous system also affects the heart rate variability, it can be concluded that seizures can be predicted by monitoring heart rate variability. …”
    Get full text
    Article
  19. 119
  20. 120

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malicious attack. In this paper, we propose to apply game theory into solving the network security problem of wireless network. …”
    Get full text
    Article