-
141
Cardiac Calcified Amorphous Tumor of the Mitral Valve Presenting as Transient Ischemic Attack
Published 2017-01-01Get full text
Article -
142
Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks
Published 2025-01-01Subjects: Get full text
Article -
143
Countering detector manipulation attacks in quantum communication through detector self-testing
Published 2025-01-01“…Apart from various side channels, a vulnerability of single-photon detectors to blinding attacks has been one of the biggest concerns and has been addressed both by technical means as well as advanced protocols. …”
Get full text
Article -
144
A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks
Published 2014-01-01“…Attacking leads to a failure of one round of communication between the source nodes and destination nodes. …”
Get full text
Article -
145
Analysis of attacking styles and goal-scoring in the 2021/22 Women's Super League.
Published 2025-01-01“…The style of attack for each attacking sequence was characterised by research guided key performance indicators and recorded with the outcome of the subsequent shot on target. …”
Get full text
Article -
146
The Holling Type II Population Model Subjected to Rapid Random Attacks of Predator
Published 2018-01-01“…We present the analysis of a mathematical model of the dynamics of interacting predator and prey populations with the Holling type random trophic function under the assumption of random time interval passage between predator attacks on prey. We propose a stochastic approximation algorithm for quantitative analysis of the above model based on the probabilistic limit theorem. …”
Get full text
Article -
147
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Published 2025-01-01Get full text
Article -
148
Improvement of Early Recognition of Attacks in Karate Kumite Due to Training in Virtual Reality
Published 2019-11-01“…Early steps for the preparation of the attack and the reduction of distance seem to be important signals for attack recognition. …”
Get full text
Article -
149
Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm
Published 2014-01-01Get full text
Article -
150
Literature Review and Clinical Presentation of Bilateral Acetabular Fractures Secondary to Seizure Attacks
Published 2012-01-01“…However, 26 cases that occurred as a result of a seizure attack appeared in the literature from 1970 to 2007, with the seizure attacks themselves caused by many different factors. …”
Get full text
Article -
151
Learning-based DoS attack game strategy over multi-process systems
Published 2024-12-01Subjects: Get full text
Article -
152
Safety Analysis against Tsunami Attacks at a Nuclear Power Plant Site
Published 2013-01-01“…These nuclear power plant sites may be vulnerable to unexpected tsunami attacks. In this study, a coupled numerical model based on the shallow-water theory was employed to analyze the safety of the Uljin Nuclear Power Plant site against three historical and eleven virtual tsunami attacks. …”
Get full text
Article -
153
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack
Published 2016-01-01“…The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave), and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. …”
Get full text
Article -
154
Limits of deception in Islamic laws of war: the case of civilian disguises in suicide attacks
Published 2020-10-01“…The suicide attack is an infamous method of warfare mostly associated with Islamic militant groups. …”
Get full text
Article -
155
Sequencing of game complexes in women’s volleyball: are there differences according to the set played?
Published 2024-12-01Subjects: Get full text
Article -
156
Attack Level of Brown Planthopper Nilaparvata lugens Stal (Hemiptera: Delphacidae) on Varieties of Rice from Pasaman in Greenhouse
Published 2021-07-01Subjects: “…Attack percentage…”
Get full text
Article -
157
An Acute Transverse Myelitis Attack after Total Body Irradiation: A Rare Case
Published 2013-01-01“…In this paper, we presented an ATM attack developed after TBI in a patient with acute lymphoblastic leukemia (ALL) as it is a rarely seen case.…”
Get full text
Article -
158
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…Abstract Social engineering attacks are a growing threat to modern complex systems. …”
Get full text
Article -
159
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01“…We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. …”
Get full text
Article -
160
Enhancing Heart Attack Prediction with Machine Learning: A Study at Jordan University Hospital
Published 2024-01-01Get full text
Article