Showing 1,301 - 1,320 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1301

    Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae) by Howard V. Weems

    Published 2012-03-01
    “… The cherry fruit fly (adult) or cherry maggot (larva) attacks cherry and causes wormy fruits. In Florida, it attacks wild cherries and is of little economic importance. …”
    Get full text
    Article
  2. 1302

    Study on shared key management scheme for WSN based on LEACH protocol by Min FAN, Jue JIANG, Lin TANG, Mo-ran QIU, Chao LI

    Published 2016-08-01
    “…In order to achieve transmission safety,nodes longer life and higher operation efficiency for the hierar-chical wireless sensor network,a shared secret key management scheme for WSN based on LEACH protocol was proposed.The scheme has good integrity and timeliness,dynamic key safety,node security independence and key survival,and also has the ability to resist the man-in-the-middle attack,DDoS attacks and so on.Furthermore,en-ergy consumption is lower to distribute shared key,and efficiency is higher to operate network.…”
    Get full text
    Article
  3. 1303

    Multipurpose zero watermarking algorithm for medical image based on SVD and SAE by Jieli SUN, Yanxia ZHAO, Zenghui ZHOU, Sheng XING

    Published 2017-11-01
    “…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
    Get full text
    Article
  4. 1304

    Hierarchical location-diversity-based low-delay anonymous communication framework by CHEN Xin1, HU Hua-ping1, LIU Bo1, XIAO Feng-tao1, HUANG Zun-guo1

    Published 2009-01-01
    “…The theoretic analysis and simulation experiment indicate that the HLLACF based on the mechanism can prevent AS-level passive attack and other familiar attacks well while decreasing commnunicaton delay, and HLLACF also scales well.…”
    Get full text
    Article
  5. 1305

    Dummy location selection algorithm based on location semantics and query probability by Jie WANG, Chunru WANG, Jianfeng MA, Hongtao LI

    Published 2020-03-01
    “…Aiming at the problem of privacy leakage caused by attackers possessing background knowledge in traditional location privacy protection schemes,a dummy location selection algorithm based on location semantics and query probability was proposed.Under the conditions that the locations in the dummy location set satisfied semantic difference,similar query probability,and geographically dispersed,it avoided attackers who filter dummy locations by combining background knowledge,and the accuracy of query results was guaranteed.Simulation experiments verify that the proposed algorithm can effectively protect the user’s location privacy.…”
    Get full text
    Article
  6. 1306

    Life Threatening Idiopathic Recurrent Angioedema Responding to Cannabis by Amit Frenkel, Aviel Roy-Shapira, Brotfain Evgeni, Koyfman Leonid, Abraham Borer, Moti Klein

    Published 2015-01-01
    “…In the last few months before prescribing cannabis, the frequency and severity of the attacks worsened and included several presyncope events, associated with scrotal and neck swelling. …”
    Get full text
    Article
  7. 1307

    Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network by Xiujie Zhang, Xingbing Fu, Lu Hong, Yu Liu, Liangliang Wang

    Published 2020-06-01
    “…More specifically, our formal security proofs analysis indicates that the proposed scheme can guarantee security even if partial information of the secret key is continually leaked due to side-channel attacks or fault injection attacks. Above all, compared to the existing identity-based online/offline encryption schemes, an identity-based online/offline encryption scheme with continual leakage resilient meets wireless sensor networks with strong security.…”
    Get full text
    Article
  8. 1308

    A Resilience-Based Security Assessment Approach for CBTC Systems by Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang

    Published 2021-01-01
    “…Two typical attacking scenarios are analyzed, and the simulation results illustrate the effectiveness of the proposed assessment approach.…”
    Get full text
    Article
  9. 1309

    STATISTICS AS INSTRUMENT OF COUNTERACTION TO INDIVIDUAL TERRORISM by S. Kuzin, M. Karmanov, V. Kuznetsov

    Published 2017-09-01
    “…Authors come to a conclusion that in this case not only the number of individually conducted terrorist attacks in a year will be taken into consideration (or for any other period of time), but also that damage which was caused (a death toll and the wounded and cumulative damages of material property as a result of individual terrorist attacks). …”
    Get full text
    Article
  10. 1310

    Constitute the passive infrastructure in network by YANG Shu-fan1, LI Fang-min1, ZHU Jian-qiu2, LIU Xin-fen 3

    Published 2003-01-01
    “…It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology.…”
    Get full text
    Article
  11. 1311

    Type 1 Kounis Syndrome in Patient with Idiopathic Anaphylaxis by Tajda Keber, Jana Makuc, Gregor Sekavčnik

    Published 2017-01-01
    “…We present a case of male who experienced attacks of dyspnoea, hypoxemia, hypotension, purple-red skin, and chest pain over several years. …”
    Get full text
    Article
  12. 1312

    Correlation probability indistinguishable location privacy protection algorithm by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-08-01
    “…The attack of corre1ation probabi1ity used by the adversary in snapshot query and continuous query services were measured.Then,on account of these attacks,a privacy protection framework based on the differentia1 privacy and a 1ocation-shift scheme to achieve the indistinguishab1e of corre1ation probabi1ities was provided,and the protection effectiveness of this method was proved.At 1ast,security ana1ysis and the experiment resu1ts further verify the protection effectiveness and guarantee the execution efficiency of the proposed scheme.…”
    Get full text
    Article
  13. 1313

    Research on color QR code watermarking technology based on chaos theory by Xi YIN, Weiqing HUANG

    Published 2018-07-01
    “…In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.…”
    Get full text
    Article
  14. 1314

    Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy by Diah Ratih Destyorini, Ari Kusyanti, Reza Andria Siregar

    Published 2022-12-01
    “…Active attack testing using a known-plaintext attack (KPA) is declared to have failed in obtaining the plaintext value. …”
    Get full text
    Article
  15. 1315

    A Risk Management Approach to Global Pandemics of Infectious Disease and Anti-Microbial Resistance by Annie Sparrow, Meghan Smith-Torino, Samuel M. Shamamba, Bisimwa Chirakarhula, Maranatha A. Lwaboshi, Christine Stabell Benn, Konstantin Chumakov

    Published 2024-11-01
    “…We discuss the growing trend of attacks on healthcare and differentiate between types: community-driven attacks targeting vaccinators in regions like Pakistan, and state-sponsored attacks by governments such as those of Syria and Russia that weaponize healthcare to deliberately harm whole populations. …”
    Get full text
    Article
  16. 1316

    CFD-Modeling of the Airfoil of the Blades of a Wind Power Plant with a Vertical Axis in the Ansys Fluent System by G. N. Uzakov, V. A. Sednin, A. B. Safarov, R. A. Mamedov, I. A. Khatamov

    Published 2024-04-01
    “…Based on the results of a study of the dependence of the ratio of the drag and lift coefficients on changes in the angle of attack, carried out using the SST k – omega (k – ω) and k – epsilon (k – ε) turbulence models, it has been found that the maximum value of the ratio of the drag and lift coefficients is 21 at the optimal angle attack inclination equal to 5°.…”
    Get full text
    Article
  17. 1317

    The Environmentally IPM Package for Controlling Fall Armyworm (Spodoptera frugiperda) in Maize Field by Nova Yurina, My Syahrawati, Arneti Arneti, Munzir Busniah

    Published 2023-07-01
    “…The variables observed were the population of S. frugiperda (individual/plant), attack rate (%), attack intensity (%), cob weight (g/cob), and farming cost (IDR). …”
    Get full text
    Article
  18. 1318

    A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets. by Jiamin Hu, Xiaofan Yang

    Published 2024-01-01
    “…Since large-scale botnets based on the Internet of Things (IoT) have been hotbeds for launching DDoS attacks, it is crucial to defend against DDoS-capable IoT botnets effectively. …”
    Get full text
    Article
  19. 1319

    Effectiveness of Wood Vinegar from Tobacco Stalk on Termite Resistance in Bamboo (Dendrocalamus asper Backer) by Okta Prima Indahsari

    Published 2024-10-01
    “…Consequently, treatment E is recommended for bamboo used in curing barns to enhance resistance against subterranean termite attacks.…”
    Get full text
    Article
  20. 1320

    Basmacı İsyanı ve Sovyet-Afgan Sınır Anlaşmazlığı (1925-1926) by Mehmet Erkan KILLIOĞLU

    Published 2022-06-01
    “…During this revolt, the Basmachi’s attacked the Soviet targets in Turkestan and returned to Afghanistan after these attacks. …”
    Get full text
    Article