Showing 1,741 - 1,760 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1741

    Representing 9/11: Alejandro González Iñárritu’s short film in 11'09"01: September 11 by Marie-Christine CLEMENTE

    Published 2011-09-01
    “…Stressing the fact that the film uses images of the ‘jumpers’ that were widely censored by the media in the aftermath of the 9/11 attacks, it analyses how the director transcends the sphere of representation by deconstructing the viewers’ habitual cinematic experience. …”
    Get full text
    Article
  2. 1742

    MDAPT: Multi-Modal Depth Adversarial Prompt Tuning to Enhance the Adversarial Robustness of Visual Language Models by Chao Li, Yonghao Liao, Caichang Ding, Zhiwei Ye

    Published 2025-01-01
    “…Not only that, our method still has a very good performance improvement under different attack methods. With our efficient settings, compared with traditional manual prompts, our average accuracy and robustness are improved by 32.16% and 21.00%, respectively, under three different attacks.…”
    Get full text
    Article
  3. 1743

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  4. 1744

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى by د. مها أحمد ابراهیم محمد

    Published 2018-07-01
    “…So wecan point out that the Arab community awareness of social engineering is one ofits priorities for protecting their accounts in all social networks and the requiredskills to prevent attacks of this social engineering in all social networks.A sample of 336 individuals was applied to the current study. …”
    Get full text
    Article
  5. 1745

    PENGARUH PEMBERIAN Trichoderma Sp UNTUK MENGENDALIKAN PENYAKIT LAYU FUSARIUM PADA BEBERAPA JENIS PISANG DI LAHAN YANG TELAH TERINFEKSI by BUKHARI BUKHARI, NURYULSEN SAFRIDAR

    Published 2018-08-01
    “…Observations made include: Intensity of Fusarium oxysporum wilting attack, number of leaves, Leaf length and stem diameeter. …”
    Get full text
    Article
  6. 1746

    Evolution characteristics and invulnerability simulation analysis of global zirconium ore trade network by Fanjie Luo, Wei Liu, Mao Xu, Qunyi Liu, Junbo Wang

    Published 2025-01-01
    “…China plays a crucial role as a bridge connecting various countries, while Japan exerts significant influence within the network; (2) the network is particularly vulnerable to targeted attacks based on node degree and betweenness centrality, highlighting the potential for significant disruption following the removal of key nodes. …”
    Get full text
    Article
  7. 1747

    Availability based trust evaluation model for MANET by ZHAO Xi-bin1, YOU Zhi-yang1, ZHAO Zhi-feng3

    Published 2010-01-01
    “…Furthermore malicious nodes can be isolated to protect the network from the attack of them, and which will significantly increases system avail- ability.…”
    Get full text
    Article
  8. 1748

    Discrimination in a General Algebraic Setting by Benjamin Fine, Anthony Gaglione, Seymour Lipschutz, Dennis Spellman

    Published 2015-01-01
    “…Algebraic geometry over groups became the main method of attack on the solution of the celebrated Tarski conjectures. …”
    Get full text
    Article
  9. 1749

    Discovery and research of network security vulnerabilities based on Web application by Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU

    Published 2016-06-01
    “…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
    Get full text
    Article
  10. 1750

    A new RS steganalysis algorithm of detecting UnderMP3Cover by Jian ZHANG, Rangding WANG, Diqun YAN

    Published 2018-04-01
    “…A new RS steganalysis algorithm to attack UnderMP3Cover was proposed.By analyzing the error caused by the RS algorithm,the choice of resolution function,the initial bias and the fitting method were modified,the flip operator was also selected in the experiment.Experimental results demonstrate that the proposed method can estimate the length of embedded message effectively and the average error reduces to 2%,which is better than the existing algorithms.…”
    Get full text
    Article
  11. 1751

    Identity-based roaming protocol with anonymity for heterogeneous wireless networks by JIANG Qi1, MA Jian-feng1, LI Guang-song1, LIU Hong-yue1

    Published 2010-01-01
    “…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
    Get full text
    Article
  12. 1752

    Research on enhancing the security of IoT terminals based on non-IP and SCEF technology by Yao HE, Hai HUANG

    Published 2017-02-01
    “…Android intelligent terminal system was studied,and Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism was put forward.The security problems that Android system showed were analyzed,and the advantage of the Android security reinforcing scheme was compared with Android system.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.…”
    Get full text
    Article
  13. 1753

    The German Coal Phase-Out in 2030 Under Current Developments by Jonas Egerer, Veronika Grimm, Lukas M. Lang, Ulrike Pfefferer

    Published 2022-09-01
    “…Abstract The Russian attack on Ukraine and the German energy industry’s dependence on Russian gas are currently leading to a very tight supply situation, which could worsen in the coming winter. …”
    Get full text
    Article
  14. 1754

    Nematodes and Their Management by J. W. Noling

    Published 2012-01-01
    “… Plant parasitic nematodes are microscopic roundworms which live in the soil and attack the roots of plants. Crop production problems induced by nemotodes therefore generally occur as a result of root dysfuntion, reducing rooting volume and foraging and utilization efficiency of water and nurtients. …”
    Get full text
    Article
  15. 1755

    Nematodes and Their Management by J. W. Noling

    Published 2012-01-01
    “… Plant parasitic nematodes are microscopic roundworms which live in the soil and attack the roots of plants. Crop production problems induced by nemotodes therefore generally occur as a result of root dysfuntion, reducing rooting volume and foraging and utilization efficiency of water and nurtients. …”
    Get full text
    Article
  16. 1756

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. …”
    Get full text
    Article
  17. 1757

    Non-complete mappings characteristics of RSA by XU Jie-l? XU Han-liang, HUANG Hong-mei, LV Shu-wang

    Published 2003-01-01
    “…At the same time, a conceive of attack to RSA digital signature scheme is given based on non-complete mappings characteristics of RSA.…”
    Get full text
    Article
  18. 1758

    A Retrospective Cohort Study with Blood Parameters for Early Estimation of Multiple Sclerosis: Ratio Suggestion by Esra Tekin, Sibel Canbaz Kabay, Ayşegül Küçük

    Published 2024-07-01
    “…The MS group was evaluated in three periods: the new diagnosis period, in which patients did not use any medication for MS, the relapse period, and the 6-month attack-free remission period. Results: The results revealed that the neutrophil-to-lymphocyte ratio (NLR) and erythrocyte-to-lymphocyte ratio increased in MS patients, especially during the attack period. …”
    Get full text
    Article
  19. 1759

    Characteristics of Siblings with Familial Mediterranean Fever: A Single-Center Experience by Elif Arslanoglu Aydin, Esra Baglan, İlknur Bagrul, Emine Nur Sunar Yayla, Nesibe Gokce Kocamaz, Semanur Ozdel

    Published 2025-01-01
    “…The age of disease onset in group I was statistically lower than in group II (P = .031). Genetic mutations, attack symptoms, and colchicine response were the same in twin pairs. …”
    Get full text
    Article
  20. 1760

    Position-specific biomarker responses to match vs. VAMEVAL test modalities in elite female soccer players: a comparative analysis study by Manel Slimani, Hatem Ghouili, Wissem Dhahbi, Zouhaier Farhani, Mohamed Ben Aissa, Marouen Souaifi, Noomen Guelmami, Ismail Dergaa, Lamia Ben Ezzeddine

    Published 2025-12-01
    “…VAMEVAL test) and playing position on biomarker responses in elite female soccer players, twenty-one athletes (seven each: defenders, midfielders, attackers) participated in this cohort-based study. …”
    Get full text
    Article