Showing 121 - 140 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124

    An exploratory study of interpretability for face presentation attack detection by Ana F. Sequeira, Tiago Gonçalves, Wilson Silva, João Ribeiro Pinto, Jaime S. Cardoso

    Published 2021-07-01
    “…Abstract Biometric recognition and presentation attack detection (PAD) methods strongly rely on deep learning algorithms. …”
    Get full text
    Article
  5. 125

    Attacks on the United States: Index, Icons and Intericonicity in Photojournalism by Jane BAYLY

    Published 2015-12-01
    “…Despite the fact that deadly attacks on the United States involving large numbers of innocent people are quite rare in its history, photographic coverage suggests a general similarity even though each event is unique in its particularity. …”
    Get full text
    Article
  6. 126
  7. 127

    Vegetative status in patients with transient ischemic attack and stroke by N. V. Halinouskaya, S. V. Samsonau

    Published 2018-06-01
    Subjects: “…transient ischemic attack…”
    Get full text
    Article
  8. 128

    Similarity Property and Slide Attack of Block Cipher FESH by Yafei Zheng, Wenling Wu

    Published 2023-01-01
    “…Slide attack of FESH is exactly a concrete example of SPN structure.…”
    Get full text
    Article
  9. 129

    Prompt injection attacks on vision language models in oncology by Jan Clusmann, Dyke Ferber, Isabella C. Wiest, Carolin V. Schneider, Titus J. Brinker, Sebastian Foersch, Daniel Truhn, Jakob Nikolas Kather

    Published 2025-02-01
    “…Using a set of N = 594 attacks, we show that all of these models are susceptible. …”
    Get full text
    Article
  10. 130

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
    Get full text
    Article
  11. 131

    Analysis of the Fault Attack ECDLP over Prime Field by Mingqiang Wang, Tao Zhan

    Published 2011-01-01
    “…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
    Get full text
    Article
  12. 132
  13. 133
  14. 134
  15. 135
  16. 136

    A general attack model based on Android system vulnerability by Xihai DENG, Weimiao FENG, Luping MA, Ying LI

    Published 2016-10-01
    “…The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. Furthermore, the evaluation framework can assess the influence of system vulnerabilities on the security of Android ecosystem.…”
    Get full text
    Article
  17. 137
  18. 138

    A Panel of Blood Biomarkers for the Diagnosis of Transient Ischemic Attacks by Daisy Guamán-Pilco, Elena Palà, Marcel Lamana-Vallverdú, Anna Penalba, Paula García-Rodríguez, Marta Rubiera, Alejandro Bustamante, Soledad Pérez-Sánchez, Joan Montaner

    Published 2025-01-01
    “…Accurate diagnosis of transient ischemic attacks (TIAs) is challenging. This study was aimed at analyzing blood biomarkers to distinguish TIAs from mimics. …”
    Get full text
    Article
  19. 139
  20. 140