-
1741
Representing 9/11: Alejandro González Iñárritu’s short film in 11'09"01: September 11
Published 2011-09-01“…Stressing the fact that the film uses images of the ‘jumpers’ that were widely censored by the media in the aftermath of the 9/11 attacks, it analyses how the director transcends the sphere of representation by deconstructing the viewers’ habitual cinematic experience. …”
Get full text
Article -
1742
MDAPT: Multi-Modal Depth Adversarial Prompt Tuning to Enhance the Adversarial Robustness of Visual Language Models
Published 2025-01-01“…Not only that, our method still has a very good performance improvement under different attack methods. With our efficient settings, compared with traditional manual prompts, our average accuracy and robustness are improved by 32.16% and 21.00%, respectively, under three different attacks.…”
Get full text
Article -
1743
Survey on Ethereum phishing detection technology
Published 2023-04-01“…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
Get full text
Article -
1744
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى
Published 2018-07-01“…So wecan point out that the Arab community awareness of social engineering is one ofits priorities for protecting their accounts in all social networks and the requiredskills to prevent attacks of this social engineering in all social networks.A sample of 336 individuals was applied to the current study. …”
Get full text
Article -
1745
PENGARUH PEMBERIAN Trichoderma Sp UNTUK MENGENDALIKAN PENYAKIT LAYU FUSARIUM PADA BEBERAPA JENIS PISANG DI LAHAN YANG TELAH TERINFEKSI
Published 2018-08-01“…Observations made include: Intensity of Fusarium oxysporum wilting attack, number of leaves, Leaf length and stem diameeter. …”
Get full text
Article -
1746
Evolution characteristics and invulnerability simulation analysis of global zirconium ore trade network
Published 2025-01-01“…China plays a crucial role as a bridge connecting various countries, while Japan exerts significant influence within the network; (2) the network is particularly vulnerable to targeted attacks based on node degree and betweenness centrality, highlighting the potential for significant disruption following the removal of key nodes. …”
Get full text
Article -
1747
Availability based trust evaluation model for MANET
Published 2010-01-01“…Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability.…”
Get full text
Article -
1748
Discrimination in a General Algebraic Setting
Published 2015-01-01“…Algebraic geometry over groups became the main method of attack on the solution of the celebrated Tarski conjectures. …”
Get full text
Article -
1749
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01“…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
Get full text
Article -
1750
A new RS steganalysis algorithm of detecting UnderMP3Cover
Published 2018-04-01“…A new RS steganalysis algorithm to attack UnderMP3Cover was proposed.By analyzing the error caused by the RS algorithm,the choice of resolution function,the initial bias and the fitting method were modified,the flip operator was also selected in the experiment.Experimental results demonstrate that the proposed method can estimate the length of embedded message effectively and the average error reduces to 2%,which is better than the existing algorithms.…”
Get full text
Article -
1751
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01“…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
Get full text
Article -
1752
Research on enhancing the security of IoT terminals based on non-IP and SCEF technology
Published 2017-02-01“…Android intelligent terminal system was studied,and Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism was put forward.The security problems that Android system showed were analyzed,and the advantage of the Android security reinforcing scheme was compared with Android system.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.…”
Get full text
Article -
1753
The German Coal Phase-Out in 2030 Under Current Developments
Published 2022-09-01“…Abstract The Russian attack on Ukraine and the German energy industry’s dependence on Russian gas are currently leading to a very tight supply situation, which could worsen in the coming winter. …”
Get full text
Article -
1754
Nematodes and Their Management
Published 2012-01-01“… Plant parasitic nematodes are microscopic roundworms which live in the soil and attack the roots of plants. Crop production problems induced by nemotodes therefore generally occur as a result of root dysfuntion, reducing rooting volume and foraging and utilization efficiency of water and nurtients. …”
Get full text
Article -
1755
Nematodes and Their Management
Published 2012-01-01“… Plant parasitic nematodes are microscopic roundworms which live in the soil and attack the roots of plants. Crop production problems induced by nemotodes therefore generally occur as a result of root dysfuntion, reducing rooting volume and foraging and utilization efficiency of water and nurtients. …”
Get full text
Article -
1756
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. …”
Get full text
Article -
1757
Non-complete mappings characteristics of RSA
Published 2003-01-01“…At the same time, a conceive of attack to RSA digital signature scheme is given based on non-complete mappings characteristics of RSA.…”
Get full text
Article -
1758
A Retrospective Cohort Study with Blood Parameters for Early Estimation of Multiple Sclerosis: Ratio Suggestion
Published 2024-07-01“…The MS group was evaluated in three periods: the new diagnosis period, in which patients did not use any medication for MS, the relapse period, and the 6-month attack-free remission period. Results: The results revealed that the neutrophil-to-lymphocyte ratio (NLR) and erythrocyte-to-lymphocyte ratio increased in MS patients, especially during the attack period. …”
Get full text
Article -
1759
Characteristics of Siblings with Familial Mediterranean Fever: A Single-Center Experience
Published 2025-01-01“…The age of disease onset in group I was statistically lower than in group II (P = .031). Genetic mutations, attack symptoms, and colchicine response were the same in twin pairs. …”
Get full text
Article -
1760
Position-specific biomarker responses to match vs. VAMEVAL test modalities in elite female soccer players: a comparative analysis study
Published 2025-12-01“…VAMEVAL test) and playing position on biomarker responses in elite female soccer players, twenty-one athletes (seven each: defenders, midfielders, attackers) participated in this cohort-based study. …”
Get full text
Article