Showing 141 - 160 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 141
  2. 142
  3. 143

    Countering detector manipulation attacks in quantum communication through detector self-testing by Lijiong Shen, Christian Kurtsiefer

    Published 2025-01-01
    “…Apart from various side channels, a vulnerability of single-photon detectors to blinding attacks has been one of the biggest concerns and has been addressed both by technical means as well as advanced protocols. …”
    Get full text
    Article
  4. 144

    A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks by Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li

    Published 2014-01-01
    “…Attacking leads to a failure of one round of communication between the source nodes and destination nodes. …”
    Get full text
    Article
  5. 145

    Analysis of attacking styles and goal-scoring in the 2021/22 Women's Super League. by Lizzie Craven, Patrick Oxenham, Jayamini Ranaweera

    Published 2025-01-01
    “…The style of attack for each attacking sequence was characterised by research guided key performance indicators and recorded with the outcome of the subsequent shot on target. …”
    Get full text
    Article
  6. 146

    The Holling Type II Population Model Subjected to Rapid Random Attacks of Predator by Jevgeņijs Carkovs, Jolanta Goldšteine, Kārlis Šadurskis

    Published 2018-01-01
    “…We present the analysis of a mathematical model of the dynamics of interacting predator and prey populations with the Holling type random trophic function under the assumption of random time interval passage between predator attacks on prey. We propose a stochastic approximation algorithm for quantitative analysis of the above model based on the probabilistic limit theorem. …”
    Get full text
    Article
  7. 147
  8. 148

    Improvement of Early Recognition of Attacks in Karate Kumite Due to Training in Virtual Reality by Katharina Petri, Nicole Bandow, Steffen Masik, Kerstin Witte

    Published 2019-11-01
    “…Early steps for the preparation of the attack and the reduction of distance seem to be important signals for attack recognition. …”
    Get full text
    Article
  9. 149
  10. 150

    Literature Review and Clinical Presentation of Bilateral Acetabular Fractures Secondary to Seizure Attacks by Alexandre H. Nehme, Jihad F. Matta, Alaa G. Boughannam, Fouad C. Jabbour, Joseph Imad, Ramzi Moucharafieh

    Published 2012-01-01
    “…However, 26 cases that occurred as a result of a seizure attack appeared in the literature from 1970 to 2007, with the seizure attacks themselves caused by many different factors. …”
    Get full text
    Article
  11. 151
  12. 152

    Safety Analysis against Tsunami Attacks at a Nuclear Power Plant Site by Jeong-Wook Seo, Jin Woo Lee, Yong-Sik Cho

    Published 2013-01-01
    “…These nuclear power plant sites may be vulnerable to unexpected tsunami attacks. In this study, a coupled numerical model based on the shallow-water theory was employed to analyze the safety of the Uljin Nuclear Power Plant site against three historical and eleven virtual tsunami attacks. …”
    Get full text
    Article
  13. 153

    A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack by Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar

    Published 2016-01-01
    “…The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave), and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. …”
    Get full text
    Article
  14. 154

    Limits of deception in Islamic laws of war: the case of civilian disguises in suicide attacks by Fajri Matahati Muhammadin

    Published 2020-10-01
    “…The suicide attack is an infamous method of warfare mostly associated with Islamic militant groups. …”
    Get full text
    Article
  15. 155
  16. 156
  17. 157

    An Acute Transverse Myelitis Attack after Total Body Irradiation: A Rare Case by Muzaffer Keklik, Leylagul Kaynar, Afra Yildirim, Serdar Sivgin, Celalettin Eroglu, Serife Cingoz, Cigdem Pala, Bulent Eser, Mustafa Cetin, Ali Unal

    Published 2013-01-01
    “…In this paper, we presented an ATM attack developed after TBI in a patient with acute lymphoblastic leukemia (ALL) as it is a rarely seen case.…”
    Get full text
    Article
  18. 158

    Defending against social engineering attacks: A security pattern‐based analysis framework by Tong Li, Chuanyong Song, Qinyu Pang

    Published 2023-07-01
    “…Abstract Social engineering attacks are a growing threat to modern complex systems. …”
    Get full text
    Article
  19. 159

    Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems by Xile Kang, Hideaki Ishii

    Published 2025-01-01
    “…We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. …”
    Get full text
    Article
  20. 160