Showing 1,701 - 1,720 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1701

    Annosum Root Rot of Southern Pines by Tyler Dreaden, Jason Smith

    Published 2010-08-01
    “…FOR269, a 3-page illustrated fact sheet by Tyler Dreaden and Jason Smith, describes this damaging forest pathogen that infects a wide range of species, including southern pine, and can cause tree mortality, reduced growth rates, susceptibility to attack by bark beetles, and regeneration failure. …”
    Get full text
    Article
  2. 1702

    Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling by Lei Wang, Wenjun Song, Jiali Di, Xuncai Zhang, Chengye Zou

    Published 2025-01-01
    “…The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. …”
    Get full text
    Article
  3. 1703

    Uncovering a novel SERPING1 pathogenic variant: insights into the aggregation of C1-INH in hereditary angioedema by Lingxi Jiang, Chao Dai, Suyang Duan, Tingting Wang, Chunbao Xie, Luhan Zhang, Zimeng Ye, Xiumei Ma, Yi Shi

    Published 2024-09-01
    “…Despite its severity, there is a notable lack of effective methods for predicting and preventing HAE attacks. This study aims to thoroughly investigate the underlying pathological mechanisms of HAE and identify potential biomarkers that could aid in its prediction and prevention. …”
    Get full text
    Article
  4. 1704

    End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems by Chi Xu, Xinyi Du, Lin Li, Xinchun Li, Haibin Yu

    Published 2024-01-01
    “…Experimental results demonstrate that the proposed strategy achieves 99% accuracy on different datasets, where at least 89.6% wireless communication cost is reduced and tampering/injecting attacks are defended.…”
    Get full text
    Article
  5. 1705

    Edge-Aware Dual-Task Image Watermarking Against Social Network Noise by Hao Jiang, Jiahao Wang, Yuhan Yao, Xingchen Li, Feifei Kou, Xinkun Tang, Limei Qi

    Published 2024-12-01
    “…The framework is further equipped with a social network noise simulator (SNNS) and a secret recovery module (SRM) to enhance robustness against common image noise attacks. Extensive experiments on three public datasets demonstrate that our framework achieves superior watermark imperceptibility, with PSNR and SSIM values exceeding 40.82 dB and 0.9867, respectively, while maintaining an over 99% decoding accuracy under various noise attacks, outperforming existing methods by significant margins.…”
    Get full text
    Article
  6. 1706

    Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions by Jinwook Kim, Kyungroul Lee, Hanjo Jeong

    Published 2025-01-01
    “…In online services, password-based authentication, a prevalent method for user verification, is inherently vulnerable to keyboard input data attacks. To mitigate these vulnerabilities, image-based authentication methods have been introduced. …”
    Get full text
    Article
  7. 1707

    Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection by William Villegas-Ch, Jaime Govea, Rommel Gutierrez, Aracely Mera-Navarrete

    Published 2025-01-01
    “…The simulations demonstrate that the proposed system improves the precision of detecting phishing attacks by up to 95.2%. At the same time, the authentication latency is reduced to 15 ms in networks with 1000 connected devices, 66.6% faster than traditional solutions. …”
    Get full text
    Article
  8. 1708

    Serum Magnesium and Vitamin D Levels as Indicators of Asthma Severity by Mohammed Nadeem Shaikh, Brahma Reddy Malapati, Ruchi Gokani, Bhavita Patel, Mitul Chatriwala

    Published 2016-01-01
    “…Increased asthma severity, frequency of attacks, and exacerbation are associated with lower levels of one or both. …”
    Get full text
    Article
  9. 1709

    Applying Big Data Based Deep Learning System to Intrusion Detection by Wei Zhong, Ning Yu, Chunyu Ai

    Published 2020-09-01
    “…This strategy can increase the detection rate of intrusive attacks as compared to the previous single learning model approaches. …”
    Get full text
    Article
  10. 1710

    Decreased Expression of CD14 in MSU-Mediated Inflammation May Be Associated with Spontaneous Remission of Acute Gout by Lihua Duan, Jiao Luo, Qiang Fu, Ke Shang, Yingying Wei, Youlian Wang, Yan Li, Jie Chen

    Published 2019-01-01
    “…At high levels, uric acid crystallizes and the crystals deposit in joints and surrounding tissues, resulting in an attack of gout. Interestingly, the gout attack can spontaneously resolve within a few days. …”
    Get full text
    Article
  11. 1711

    Himma K. E. The Logic of Showing Possibility Claims: A Positive Argument for Inclusive Legal Positivism and Moral Grounds of Law / trans. from English V. V. Ogleznev, D. V. Shvedov by V. V. Ogleznev, D. V. Shvedov

    Published 2021-12-01
    “…Up to this point, the debate has taken the shape of attacks on the coherence of MIT with the defender of MIT merely attempting to refute the attacking argument. …”
    Get full text
    Article
  12. 1712

    WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM by Sarbast H. Ali, Arman I. Mohammed, Sarwar MA. Mustafa, Sardar Omar Salih

    Published 2025-01-01
    “… The frequency of cyber-attacks has been rising in recent years due to the fact that startup developers have failed to overlook security issues in the core web services. …”
    Get full text
    Article
  13. 1713
  14. 1714

    Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems by Denis Benka, Dusan Horvath, Lukas Spendla, Gabriel Gaspar, Maximilian Stremy

    Published 2025-01-01
    “…However, their increasing integration with IT systems exposes them to sophisticated cyberattacks, particularly lateral attacks targeting Programmable Logic Controllers (PLCs). …”
    Get full text
    Article
  15. 1715

    O polemică la sfârşitul secolului al XIX-lea: C. Stere versus A. A. Bădărău by Victor Durnea

    Published 2008-12-01
    “…The conflict began with a series of attacks launched by the conservative newspaper “Opinia” towards the liberal prime minister D. …”
    Get full text
    Article
  16. 1716

    Review of iOS malicious application analysis by Yixiang ZHU, Kang ZHANG, Weiqing WANG

    Published 2017-02-01
    “…The security architecture and distribution of iOS were introduced.The threats to user's data security and privacy from iOS malicious applications were analyzed.The reasons that the number of iOS malicious applications is less than Android malicious applications were discussed.The attacking methods of emerging iOS malicious applications were summed up.And prospect for future mitigation and confrontation strategies were given.…”
    Get full text
    Article
  17. 1717

    La bande dessinée pour construire une mémoire des « mille jours » de l’Unité populaire au Chili by Elsa Marsande

    Published 2024-07-01
    “…It shows that the coup did not come by surprise: attacks, strikes and scandals were imposed in response to the implementation of the Popular Unity program. …”
    Get full text
    Article
  18. 1718

    Firmware vulnerability analysis based on formal verification of software and hardware by Peng-hui ZHANG, Xi TIAN, Kang-wei LOU

    Published 2016-07-01
    “…In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was modeled and analyzed.By adjusting the attack model,a secure vulnerability in the update process of the firmware was found,and its existence by an experiment,which proved the reliability of formal verification was demonstrated.…”
    Get full text
    Article
  19. 1719

    Privacy and Biometric Passports by Ioannis Vakalis

    Published 2011-01-01
    “…The description includes the digital data structure, and the communication and reading mechanisms of the e-Passport, indicating the possible points and methods of attack.…”
    Get full text
    Article
  20. 1720