-
1621
South American Fruit Fly, Anastrepha fraterculus (Wiedemann) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“… This species is of great economic importance because of the wide variety of plants that it attacks and its extensive distribution. In most of South America, it probably is the most important species of Anastrepha. …”
Get full text
Article -
1622
South American Fruit Fly, Anastrepha fraterculus (Wiedemann) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“… This species is of great economic importance because of the wide variety of plants that it attacks and its extensive distribution. In most of South America, it probably is the most important species of Anastrepha. …”
Get full text
Article -
1623
Security Study of Software-Defined Enterprise Data Center Network
Published 2014-11-01“…Security threats of novel data center using software-defined networking were analyzed, and then three protection phases for defending were proposed, which solved unique problems and overcame current security product defects, and finally a software-defined security architecture to defend various quick and advanced attacks was designed.…”
Get full text
Article -
1624
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
Published 2025-01-01“…On the other hand, cyber threats and attacks against these systems have greatly expanded as a result of the enormous spread of sensors and smart IoT devices inside the energy sector as well as traditional power grids. …”
Get full text
Article -
1625
Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes
Published 2022-09-01“…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
Get full text
Article -
1626
Forebrain Ischemia-Reperfusion Simulating Cardiac Arrest in Mice Induces Edema and DNA Fragmentation in the Brain
Published 2007-05-01“…Brain injury affects one-third of persons who survive after heart attack, even with restoration of spontaneous circulation by cardiopulmonary resuscitation. …”
Get full text
Article -
1627
Numerical Simulation for Engine/Airframe Interaction Effects of the BWB300 on Aerodynamic Performances
Published 2019-01-01“…Moreover, at low-speed high attack angles, the separated flow from the blended area caused serious distortion at the fan inlet of the engine.…”
Get full text
Article -
1628
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Published 2022-01-01“…The robustness of information hiding is analyzed using a noise attack on the received image. This work achieved 45.6 dB of Peak Signal-to-Noise Ratio (PSNR) and 0.965 of Structural Similarity Index (SSIM), which is the best when compared to the conventional image encryption standards.…”
Get full text
Article -
1629
Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors
Published 2024-01-01“…The Routing Protocol for Low-Power and Lossy Networks (RPL) is crucial for efficient data transmission in IoT networks, but its performance can be significantly degraded by attacks such as Rank, Sinkhole and Wormhole attacks. …”
Get full text
Article -
1630
Revocable identity-based proxy re-signature scheme in the standard model
Published 2019-05-01“…User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.…”
Get full text
Article -
1631
Ephedra alte (Joint Pine): An Invasive, Problematic Weedy Species in Forestry and Fruit Tree Orchards in Jordan
Published 2012-01-01“…A. communis, F. carica, R. palaestina, and C. azarolus were most frequently attacked.…”
Get full text
Article -
1632
Machine Learning-Based Network Detection Research for SDNs
Published 2025-01-01“…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. To accomplish this, this study constructed a rigorously designed simulated SDN environment, which served as the cornerstone for meticulously assembling a comprehensive dataset encompassing a diverse array of attack vectors, with particular emphasis on DoS. …”
Get full text
Article -
1633
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
1634
Weighted Complex Network Analysis of Shanghai Rail Transit System
Published 2016-01-01“…This study also indicates that the intentional attacks are more detrimental to the RTS network than to the random weighted network, but the random attacks can cause slightly more damage to the random weighted network than to the RTS network. …”
Get full text
Article -
1635
THE STRUGGLE OF IDEAS AND «THE NEW TURKEY»
Published 2016-04-01“…In 2013 he criticized Erdogan for the police attacks against mass demonstrations of protest in Istanbul. …”
Get full text
Article -
1636
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
Published 2015-09-01“…To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.…”
Get full text
Article -
1637
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01“…In order to solve the inadequacy of traditional blind signature schemes in resisting quantum computing attacks during interactions between users, signers, and verifiers was addressed, a novel quantum-resistant blind signature scheme named CDBS was proposed. …”
Get full text
Article -
1638
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution
Published 2024-01-01“…These cutting-edge technologies could result in unique network attacks that present security risks. This intrusion launches many attacks on the communication network which is to be monitored. …”
Get full text
Article -
1639
Diversity of Species and Behavior of Hymenopteran Parasitoids of Ants: A Review
Published 2012-01-01“…Some species parasitize adult worker ants while foraging or performing other activities outside the nest; however, in most cases, parasitoids attack ant larvae either inside or outside their nests. …”
Get full text
Article -
1640
Lightweight Block and Stream Cipher Algorithm: A Review
Published 2024-06-01“…Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. …”
Get full text
Article