Showing 1,641 - 1,660 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1641

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…Furthermore, the simulation results prove that this scheme can resist quantum attacks in the Internet of things.…”
    Get full text
    Article
  2. 1642

    Patent Foramen Ovale Closure for Treating Migraine: A Meta-Analysis by Yu Zhang, Haijiao Wang, Ling Liu

    Published 2022-01-01
    “…Treatment with PFO closure could reduce the frequency of headaches and monthly migraine days and is an efficient treatment for migraine attacks with aura.…”
    Get full text
    Article
  3. 1643

    Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network by Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, Jun Song

    Published 2015-01-01
    “…Security analysis and experimental results showed that the proposed scheme could protect data transmission between wireless sensor nodes from being attacked, and significantly reduced the communication overhead for the whole system compared to the existing ECC_AES scheme, thus satisfying the real-time data transmission requirement of ITS.…”
    Get full text
    Article
  4. 1644

    Theatrical Colours: Cosmetics, Rhetoric and Theatre in Webster’s The White Devil by Natascha WANNINGER

    Published 2015-06-01
    “…This change was marked by the development of painting techniques as well as by the attacks on cosmetics and the “false colouring” (Quintilianus 8, 3, 7) of rhetoric prevalent during this period. …”
    Get full text
    Article
  5. 1645

    Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability by Muhammad Usman, Insoo Koo

    Published 2014-01-01
    “…We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. …”
    Get full text
    Article
  6. 1646

    Steepest-Ascent Revisited: Unconstrained Missile Trajectory by Elsayed M. Khalil, Hao Zhou, Wanchun Chen

    Published 2014-01-01
    “…A Steepest-Ascent numerical procedure for offline trajectory optimization of a surface-to-surface missile attacking a stationary target is presented. A detailed numerical solution, starting from building the mathematical formulation till generating an offline angle of attack control history, is illustrated. …”
    Get full text
    Article
  7. 1647

    Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform by Dekai Li, Yen‐wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

    Published 2022-11-01
    “…A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
    Get full text
    Article
  8. 1648

    DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks by Claudio M. de Farias, Luci Pirmez, Luiz F. R. C. Carmo, Davidson Boccardo, Flávia C. Delicato, Igor L. dos Santos, Renato Pinheiro, Rafael O. Costa

    Published 2015-11-01
    “…In scenarios involving unprotected hostile outdoor areas, SSNs are prone to different types of attacks that can compromise reliability, integrity, and availability of the sensor data traffic and sensor lifetime as well. …”
    Get full text
    Article
  9. 1649

    Preoperative Inflammatory Control and Surgical Outcome of Vitrectomy in Intermediate Uveitis by Yong Un Shin, Joo Young Shin, Dae Joong Ma, Heeyoon Cho, Hyeong Gon Yu

    Published 2017-01-01
    “…The numbers of uveitis attacks, local steroid injections, and systemic medications significantly decreased, and vision meaningfully improved after vitrectomy. …”
    Get full text
    Article
  10. 1650

    Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms by Marco De Vincenzi, John Moore, Bradley Smith, Sanjay E. Sarma, Ilaria Matteucci

    Published 2025-01-01
    “…By analyzing case studies such as Android Automotive, Message Queuing Telemetry Transport (MQTT), and the Robot Operating System (ROS), we identify the primary security threats, including malware attacks, data manipulation, and Denial of Service (DoS) attacks. …”
    Get full text
    Article
  11. 1651

    The Influence of Aggregate Size and Binder Material on the Properties of Pervious Concrete by Tun Chi Fu, Weichung Yeih, Jiang Jhy Chang, Ran Huang

    Published 2014-01-01
    “…Moreover, compared with the control, the cement paste containing silica fume demonstrated poor resistance to sulfate attacks, and the difference in the water permeability between such specimen and the control was not noticeable.…”
    Get full text
    Article
  12. 1652

    Jak se ubránit před válkou? Snahy šlechticů o ochranu vrchnostenských měst za třicetileté války (Vilém Slavata a Jindřichův Hradec 1631–1633) by Josef Hrdlička

    Published 2015-10-01
    “… Using the particular example, the contribution analyzes the defence strategies by means of which, in the early 1630s – in connection with the Saxon invasion of the Czech lands - Bohemian Obristkanzler Wilhelm Slavata attempted to protect his estates on the border of southern Bohemia and southern Moravia both from attacks of enemy troops and the soldiers passing through and staying in seigniorial services. …”
    Get full text
    Article
  13. 1653

    Adjusted automata learning algorithm for security protocol adaptive model checking by Jing YANG, Dan FAN, Yu-qing ZHANG

    Published 2015-11-01
    “…Modifications and improvements for adjusted automata learning algorithms,which were enabled by recent developments.Adjusted automata learning algorithm L<sub>a</sub>* is correct and efficient.It will be helpful to improve adaptive model checking efficiency,reduce the cost,solve state space explosion problem and resist many kinds of attack methods for security protocols.…”
    Get full text
    Article
  14. 1654

    Two improved content extraction signature schemes by Min WANG, Jin-hua MA, Jiang-hua LIU, Wei WU

    Published 2017-04-01
    “…Motivated by the idea of batch signatures,two variants of content extraction signature schemes based on commit vector and RSA respectively were presented.In the proposed schemes,the efficiency of signing and verification were improved by unifying certain message.The analysis show that the proposed schemes are existentially unforgeable under chosen message attacks in the random oracle model.…”
    Get full text
    Article
  15. 1655

    La Mauritanie à l’épreuve de l’islamisme et des menaces terroristes by Armelle Choplin

    Published 2008-04-01
    “…Since a few weeks, Mauritania is in front of several terrorist attacks claimed by Al-Qaïda in Maghreb. Radical Islamism is not new in this country but terrorism and violence of these acts are totally unheard. …”
    Get full text
    Article
  16. 1656

    Research of location privacy protection in wireless sensor network by Ren-ji HUANG, Qing YE, Qian WU

    Published 2017-11-01
    “…For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.…”
    Get full text
    Article
  17. 1657

    Being proactive about media engagement in first aid education

    Published 2019-02-01
    “…Having used Google Analytics to monitor the correlation between first aid phone app usage spikes and external media events such as news reports of terrorist attacks and popular shows featuring medical emergencies in their content, the conference explores the potential of appropriately utilizing media engagement to various ends based on timing, circumstance, and locational proximity.…”
    Get full text
    Article
  18. 1658

    ID-based transitive signature schemes without random oracle by MA Xiao-long1, GU Li-ze1, CUI Wei4, YANG Yi-xian1, HU Zheng-ming1

    Published 2010-01-01
    “…Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.…”
    Get full text
    Article
  19. 1659

    Battue ou chasse à courre, en Somalie ou en Asie by Eric Frécon

    Published 2024-03-01
    “…Since last August, there were markedly more attacks registered off the Horn of Africa. The lack of coordination between the numerous initiatives is making surveillance operations inefficient. …”
    Get full text
    Article
  20. 1660

    Florida's Invaders: Exotic Pests by Center for Natural Resources

    Published 2003-02-01
    “… Florida's natural ecosystems are increasingly coming under attack by invading exotic species which displace native species, thereby degrading the diversity of floral and faunal resources. …”
    Get full text
    Article