Showing 1,581 - 1,600 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1581

    Blockchain-Based Anonymous Reputation System for Performance Appraisal by Hye Jin Lee, Duc Anh Luong, Jong Hwan Park, Hyoseung Kim

    Published 2025-01-01
    “…Our protocol addresses the risks of Sybil attacks, ensures review limitation and unforgeability. …”
    Get full text
    Article
  2. 1582

    Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture by Mohammad Hossein Modirrousta, Parisa Forghani Arani, Reza Kazemi, Mahdi Aliyari‐Shoorehdeli

    Published 2024-12-01
    “…AbstractTo gain access to networks, various intrusion attack types have been developed and enhanced. The increasing importance of computer networks in daily life is a result of our growing dependence on them. …”
    Get full text
    Article
  3. 1583

    Investigating the Effect of Olfactory Stimulation in Preterm Infants: A Review Study by Hashem Lashgari Kalat, Mohammad Hasan Mohammadi, Shahabaddin Sorouri, Hossein Ali Kharazmi, Zahra Ramazanian Bafghi, Masumeh Ghazanfarpour, Najmeh Soltani Nejad

    Published 2024-10-01
    “…There are controversial results about the aromatherapy effect of pleasant odor vanillin on apnea attacks in preterm infants. Rosa damascenes odor had a therapeutic effect on apnea attacks, but not breast milk odor. …”
    Get full text
    Article
  4. 1584

    ‘I should like to see a woman smoking while she was nursing her baby’: The New Woman, Crossdressing, and Humour in Horace William Bleackley’s Une Culotte (1894) by Mariam Zarif

    Published 2022-10-01
    “…While the New Woman was often mocked and caricatured as a mannish and destructive figure in the late Victorian press, New Woman writers also used humour to attack the status quo and parry ridicule with ridicule. …”
    Get full text
    Article
  5. 1585

    Modelling of Electromagnetic Scattering by a Hypersonic Cone-Like Body in Near Space by Ji-Wei Qian, Hai-Li Zhang, Ming-Yao Xia

    Published 2017-01-01
    “…Typically, the BRCS is influenced by 5~10 dBm for a change of attack angle within 0~15 degrees, or for a change of elevation within 30~70 km above the ground.…”
    Get full text
    Article
  6. 1586

    Smart contract-based secure cooperative spectrum sensing algorithm by Chu Ji, Qi Zhu

    Published 2021-12-01
    “…With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.…”
    Get full text
    Article
  7. 1587

    Ectoparasite Infestation on Beef Cattle (Bos Indicus) in Kendit Sub-District, Situbondo District by Nizar Bachrudin Prihandono, Endang Suprihati, Lilik Maslachah, Poedji Hastutiek, mufasirin mufasirin

    Published 2021-09-01
    “…The purpose of this study was to determine the type and percentage of ectoparasites attacking the cattle cow in the Kendit Sub-District, Situbondo District. …”
    Get full text
    Article
  8. 1588

    Ligustrum Weevil (suggested common name), Ochyromera ligustri Warner (Insecta: Coleoptera: Curculionidae: Tychiinae: Tychiini: Endaeina) by James P. Cuda, M. C. Zellar, Michael C. Thomas

    Published 2005-06-01
    “… A seed-attacking weevil was recently found attacking Chinese privet in Tallahassee, Leon County, Florida (Cuda and Zeller 1998). …”
    Get full text
    Article
  9. 1589

    Antigenic Complementarity in the Origins of Autoimmunity: A General Theory Illustrated With a Case Study of Idiopathic Thrombocytopenia Purpura by Robert Root-Bernstein, Jacob Couturier

    Published 2006-01-01
    “…Pairs of stereochemically complementary antigens induce complementary immune responses (antibody or T-cell) that create loss of regulation and civil war within the immune system itself. Antibodies attack antibodies creating circulating immune complexes; T-cells attack T-cells creating perivascular cuffing. …”
    Get full text
    Article
  10. 1590

    Structure Characteristics of the International Stock Market Complex Network in the Perspective of Whole and Part by Guangxi Cao, Yingying Shi, Qingchen Li

    Published 2017-01-01
    “…Robustness is applied to analyze the stability of the network and the result shows that ISMN has robustness against random attack but intentional attack breaks the connection integrity of ISMN rapidly. …”
    Get full text
    Article
  11. 1591

    Modelling the strategies for age specific vaccination scheduling during influenza pandemic outbreaks by Diána H. Knipl, Gergely Röst

    Published 2010-12-01
    “…For the best scheme, the attack rateswere up to 10% lower than for other strategies. …”
    Get full text
    Article
  12. 1592

    Insect Pest occurrence on Cultivated Amaranthus Spp in Benin City, Edo State, Nigeria by AE Ezeh, ABO Ogedegbe, SA Ogedegbe

    Published 2015-07-01
    “…Unfortunately, one of the major factors limiting the productivity of Amaranthus is the incidence of insect pests attack. The aim of this study was to determine the insect pest occurrence on cultivated Amaranths in Benin City, Nigeria. …”
    Get full text
    Article
  13. 1593

    Overview on industrial Internet honeynet technology by CHEN Xi, JIANG Yaguang, LIN Xin, ZHOU Wen

    Published 2024-10-01
    “…Honeynets emerged as a powerful cybersecurity measure, employing virtual or simulated systems, services, or resources to lure attackers. Upon interaction with the honeynet, monitoring and recording of attack activities were conducted, which aided in the early detection of novel cybersecurity threats, enhanced network security defenses, and contributed valuable data for security research. …”
    Get full text
    Article
  14. 1594

    Producing secure multimodal biometric descriptors using artificial neural networks by Dogu Cagdas Atilla, Raghad Saeed Hasan Alzuhairi, Cagatay Aydin

    Published 2021-03-01
    “…The inclusion of the timestamp enables the system to detect and deny replay attacks, while the unique system identifier maintains the privacy of the users. …”
    Get full text
    Article
  15. 1595

    Types of Accidents and Causes of Their Occurrence in Outdoor Sports: A Conceptual Review by Erdoğan EKİNCİ

    Published 2024-08-01
    “…These risks include drowning, dehydration, poisoning, burn injuries, fires, hypothermia and frostbite, natural disasters, sunstroke, wild animal attacks, and high-altitude sickness. Consequently, it can be said that participants in outdoor sports activities are exposed to a range of risks. …”
    Article
  16. 1596

    « C’est eux contre nous » ou « Qui a peur de qui ? » : la rhétorique post-11 septembre de l’administration américaine vue par la caricature de presse by Dominique CADINOT

    Published 2011-09-01
    “…In the months following the September 11 attacks on New York and Washington when the anti-terrorist phobia was at its peak, very few Americans dared voice criticism of the Bush administration’s assault on civil liberties. …”
    Get full text
    Article
  17. 1597

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  18. 1598

    Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security by Lu Zhexi

    Published 2025-01-01
    “…A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information. …”
    Get full text
    Article
  19. 1599

    A New Scalar Quantization Method for Digital Image Watermarking by Yevhen Zolotavkin, Martti Juhola

    Published 2016-01-01
    “…Efficiency of the technique is measured in terms of distortions of the original image and robustness under different kinds of attacks, with particular focus on Additive White Gaussian Noise (AWGN) and Gain Attack (GA). …”
    Get full text
    Article
  20. 1600

    Research on key technologies of safety monitoring data sharing for railway engineering construction based on blockchain by Yuhong LIU, Liang YANG, Chunhui PIAO, Zhiguo ZHANG

    Published 2021-08-01
    “…In order to solve the problems that the monitoring data was easy to be tampered with in the process of railway engineering construction safety monitoring, and the authenticity of the data might be questioned during the accountability of accidents, a blockchain-based railway engineering construction safety monitoring data sharing model was proposed.The characteristics of automatic execution of smart contracts ensured the transparency of the process of monitoring data on the chain.In the PBFT algorithm, there was a problem that the Byzantine nodes and the normal nodes were selected as the master node with the same probability, a reputation-based practical Byzantine fault tolerance algorithm was proposed.Streaming data on the chain might cause network congestion, which simplified the consensus protocol and reduced the time complexity from O(n<sup>2</sup>) to O(n).A comparative experiment was conducted using Hyperledger Caliper to prove that the delay of the improved algorithm is lower than PBFT algorithm, and the throughput is higher than PBFT algorithm.A quantitative analysis of the possibility of attack and the probability of successful attack was carried out, and it was determined that the smart contract provides tamper-proof modification for the monitoring data on the chain.Comparative analysis proves that the proposed blockchain-based railway engineering construction safety monitoring data sharing model is good than other models in terms of consensus efficiency, TPS and block generation speed.…”
    Get full text
    Article