-
1701
Annosum Root Rot of Southern Pines
Published 2010-08-01“…FOR269, a 3-page illustrated fact sheet by Tyler Dreaden and Jason Smith, describes this damaging forest pathogen that infects a wide range of species, including southern pine, and can cause tree mortality, reduced growth rates, susceptibility to attack by bark beetles, and regeneration failure. …”
Get full text
Article -
1702
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Published 2025-01-01“…The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. …”
Get full text
Article -
1703
Uncovering a novel SERPING1 pathogenic variant: insights into the aggregation of C1-INH in hereditary angioedema
Published 2024-09-01“…Despite its severity, there is a notable lack of effective methods for predicting and preventing HAE attacks. This study aims to thoroughly investigate the underlying pathological mechanisms of HAE and identify potential biomarkers that could aid in its prediction and prevention. …”
Get full text
Article -
1704
End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Published 2024-01-01“…Experimental results demonstrate that the proposed strategy achieves 99% accuracy on different datasets, where at least 89.6% wireless communication cost is reduced and tampering/injecting attacks are defended.…”
Get full text
Article -
1705
Edge-Aware Dual-Task Image Watermarking Against Social Network Noise
Published 2024-12-01“…The framework is further equipped with a social network noise simulator (SNNS) and a secret recovery module (SRM) to enhance robustness against common image noise attacks. Extensive experiments on three public datasets demonstrate that our framework achieves superior watermark imperceptibility, with PSNR and SSIM values exceeding 40.82 dB and 0.9867, respectively, while maintaining an over 99% decoding accuracy under various noise attacks, outperforming existing methods by significant margins.…”
Get full text
Article -
1706
Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions
Published 2025-01-01“…In online services, password-based authentication, a prevalent method for user verification, is inherently vulnerable to keyboard input data attacks. To mitigate these vulnerabilities, image-based authentication methods have been introduced. …”
Get full text
Article -
1707
Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection
Published 2025-01-01“…The simulations demonstrate that the proposed system improves the precision of detecting phishing attacks by up to 95.2%. At the same time, the authentication latency is reduced to 15 ms in networks with 1000 connected devices, 66.6% faster than traditional solutions. …”
Get full text
Article -
1708
Serum Magnesium and Vitamin D Levels as Indicators of Asthma Severity
Published 2016-01-01“…Increased asthma severity, frequency of attacks, and exacerbation are associated with lower levels of one or both. …”
Get full text
Article -
1709
Applying Big Data Based Deep Learning System to Intrusion Detection
Published 2020-09-01“…This strategy can increase the detection rate of intrusive attacks as compared to the previous single learning model approaches. …”
Get full text
Article -
1710
Decreased Expression of CD14 in MSU-Mediated Inflammation May Be Associated with Spontaneous Remission of Acute Gout
Published 2019-01-01“…At high levels, uric acid crystallizes and the crystals deposit in joints and surrounding tissues, resulting in an attack of gout. Interestingly, the gout attack can spontaneously resolve within a few days. …”
Get full text
Article -
1711
Himma K. E. The Logic of Showing Possibility Claims: A Positive Argument for Inclusive Legal Positivism and Moral Grounds of Law / trans. from English V. V. Ogleznev, D. V. Shvedov
Published 2021-12-01“…Up to this point, the debate has taken the shape of attacks on the coherence of MIT with the defender of MIT merely attempting to refute the attacking argument. …”
Get full text
Article -
1712
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01“… The frequency of cyber-attacks has been rising in recent years due to the fact that startup developers have failed to overlook security issues in the core web services. …”
Get full text
Article -
1713
Identification, Prevalence, and Infestation Patterns of Ectoparasitic In MP Hybrid Type Culled Laying Ducks In Gedang Sub Village, Modopuro Village, Mojosari Sub District, Mojokert...
Published 2024-03-01“…A. crassicornis mostly attacked the MP hybrid type of culled laying ducks on the wings, compared to the back, abdomen and tail. …”
Get full text
Article -
1714
Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems
Published 2025-01-01“…However, their increasing integration with IT systems exposes them to sophisticated cyberattacks, particularly lateral attacks targeting Programmable Logic Controllers (PLCs). …”
Get full text
Article -
1715
O polemică la sfârşitul secolului al XIX-lea: C. Stere versus A. A. Bădărău
Published 2008-12-01“…The conflict began with a series of attacks launched by the conservative newspaper “Opinia” towards the liberal prime minister D. …”
Get full text
Article -
1716
Review of iOS malicious application analysis
Published 2017-02-01“…The security architecture and distribution of iOS were introduced.The threats to user's data security and privacy from iOS malicious applications were analyzed.The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed.The attacking methods of emerging iOS malicious applications were summed up.And prospect for future mitigation and confrontation strategies were given.…”
Get full text
Article -
1717
La bande dessinée pour construire une mémoire des « mille jours » de l’Unité populaire au Chili
Published 2024-07-01“…It shows that the coup did not come by surprise: attacks, strikes and scandals were imposed in response to the implementation of the Popular Unity program. …”
Get full text
Article -
1718
Firmware vulnerability analysis based on formal verification of software and hardware
Published 2016-07-01“…In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was modeled and analyzed.By adjusting the attack model,a secure vulnerability in the update process of the firmware was found,and its existence by an experiment,which proved the reliability of formal verification was demonstrated.…”
Get full text
Article -
1719
Privacy and Biometric Passports
Published 2011-01-01“…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
Get full text
Article -
1720
L’intégration régionale vue par le prisme de la frontière Canada/États-Unis : l’entre-deux comme un processus remis en question par la politique de sécurisation post 9/11
Published 2022-12-01“…In the wake of the 9/11 terrorist attacks, the Canada/US border experienced a rebordering phenomenon. …”
Get full text
Article