-
161
How Prepared Are We for Possible Bioterrorist Attacks: An Approach from Emergency Medicine Perspective
Published 2018-01-01“…Preparedness for bioterrorist attacks and early recognition of specific agents are essential for public health. …”
Get full text
Article -
162
An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks
Published 2024-06-01“…The current large-scale Internet of Things (IoT) networks typically generate high-velocity network traffic streams. Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc. …”
Get full text
Article -
163
Effect of Limestone Powder on Thaumasite Form of Sulfate Attack (TSA) of Cement-Based Materials
Published 2021-01-01“…Limestone powder can cause the thaumasite form of sulfate attack (TSA) of cement-based materials, but the relationship between the content of limestone powder and the degree of TSA is unclear. …”
Get full text
Article -
164
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…Abstract Text‐based CAPTCHAs have been widely deployed by many popular websites, and many have been attacked. However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training samples, thus making such attacks complicated and costly. …”
Get full text
Article -
165
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
Get full text
Article -
166
Estimation of the Secondary Attack Rate for Delta Hepatitis Coinfection among Injection Drug Users
Published 1993-01-01“…The secondary attack rate for delta hepatitis coinfection was estimated among a cluster of injection drug users (IDUs). …”
Get full text
Article -
167
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: “…DDoS attacks…”
Get full text
Article -
168
Limb-Shaking Transient Ischemic Attacks Successfully Treated with External Carotid Artery Stenting
Published 2012-01-01“…Limb-shaking transient ischemic attacks (TIAs) are a relatively rare manifestation of carotid artery disease that may present with repetitive shaking movements of the affected limbs. …”
Get full text
Article -
169
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
170
Expecting the Unexpected: Predicting Panic Attacks From Mood, Twitter, and Apple Watch Data
Published 2024-01-01Subjects: “…Panic attacks…”
Get full text
Article -
171
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01Subjects: Get full text
Article -
172
Tehrik-i-Taliban Pakistan: considerations 3 years after the school attack in Peshawar
Published 2018-07-01Get full text
Article -
173
International study of the perceived stress and psychological impact of the 7 October attacks on Holocaust survivors
Published 2025-12-01Subjects: Get full text
Article -
174
Terminal Guidance with Attack Time and Impact Angle Constraints for Hypersonic Vehicle in Dive Phase
Published 2018-01-01“…The terminal guidance problem of hypersonic gliding missiles under multiple constraints was considered regarding a coordinated attack in time and space. In this paper, a three-dimensional terminal guidance method based on the real-time updating of parameters is proposed with consideration to the attack time and terminal angle. …”
Get full text
Article -
175
Distributed Energy Management for Port Power System under False Data Injection Attacks
Published 2022-01-01“…This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. …”
Get full text
Article -
176
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
177
-
178
Defending Deep Neural Networks Against Backdoor Attack by Using De-Trigger Autoencoder
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
179
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
180
A computational fluid dynamics analysis of the aerodynamic influence of angles of attack on the Skylon spaceplane
Published 2025-01-01“…This paper explores the aerodynamic behavior of a reusable launch vehicle, the Skylon spaceplane, for different angles of attack at Mach 5. The goal is to determine how aerodynamic effects manifest at various angles of attack and compare it with the theoretical data along with the determination of total time required for such computational fluid dynamics (CFD) simulations. …”
Get full text
Article