Showing 161 - 180 results of 2,093 for search '"Attacker"', query time: 0.07s Refine Results
  1. 161

    How Prepared Are We for Possible Bioterrorist Attacks: An Approach from Emergency Medicine Perspective by Ali Kemal Erenler, Murat Güzel, Ahmet Baydin

    Published 2018-01-01
    “…Preparedness for bioterrorist attacks and early recognition of specific agents are essential for public health. …”
    Get full text
    Article
  2. 162

    An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks by Selvam Saravanan, Uma Maheswari Balasubramanian

    Published 2024-06-01
    “…The current large-scale Internet of Things (IoT) networks typically generate high-velocity network traffic streams. Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc. …”
    Get full text
    Article
  3. 163

    Effect of Limestone Powder on Thaumasite Form of Sulfate Attack (TSA) of Cement-Based Materials by Yuxin Gao, Yaoling Luo, Lili Jia, Wen Yang, Chong Wang

    Published 2021-01-01
    “…Limestone powder can cause the thaumasite form of sulfate attack (TSA) of cement-based materials, but the relationship between the content of limestone powder and the degree of TSA is unclear. …”
    Get full text
    Article
  4. 164

    A deep learning‐based attack on text CAPTCHAs by using object detection techniques by Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo

    Published 2022-03-01
    “…Abstract Text‐based CAPTCHAs have been widely deployed by many popular websites, and many have been attacked. However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training samples, thus making such attacks complicated and costly. …”
    Get full text
    Article
  5. 165

    Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding by Jen-Yeu Chen, Yi-Ying Tseng

    Published 2012-12-01
    “…Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
    Get full text
    Article
  6. 166

    Estimation of the Secondary Attack Rate for Delta Hepatitis Coinfection among Injection Drug Users by Christiane Poulin, Theresa Gyorkos, Lawrence Joseph

    Published 1993-01-01
    “…The secondary attack rate for delta hepatitis coinfection was estimated among a cluster of injection drug users (IDUs). …”
    Get full text
    Article
  7. 167
  8. 168

    Limb-Shaking Transient Ischemic Attacks Successfully Treated with External Carotid Artery Stenting by George N. Kouvelos, Christos Nassis, Nektario Papa, George Papadopoulos, Miltiadis I. Matsagkas

    Published 2012-01-01
    “…Limb-shaking transient ischemic attacks (TIAs) are a relatively rare manifestation of carotid artery disease that may present with repetitive shaking movements of the affected limbs. …”
    Get full text
    Article
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173
  14. 174

    Terminal Guidance with Attack Time and Impact Angle Constraints for Hypersonic Vehicle in Dive Phase by Zhao-ting Li, Hong-bo Zhang

    Published 2018-01-01
    “…The terminal guidance problem of hypersonic gliding missiles under multiple constraints was considered regarding a coordinated attack in time and space. In this paper, a three-dimensional terminal guidance method based on the real-time updating of parameters is proposed with consideration to the attack time and terminal angle. …”
    Get full text
    Article
  15. 175

    Distributed Energy Management for Port Power System under False Data Injection Attacks by Qihe Shan, Xin Zhang, Qiongyue Zhang, Qiuye Sun

    Published 2022-01-01
    “…This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. …”
    Get full text
    Article
  16. 176
  17. 177
  18. 178
  19. 179

    Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System by Dana Hasan, Rebeen R. Hama Amin, Masnida Hussin

    Published 2020-06-01
    Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
    Get full text
    Article
  20. 180

    A computational fluid dynamics analysis of the aerodynamic influence of angles of attack on the Skylon spaceplane by Vivekamanickam Koothan Venkateswaran, Unai Fernandez Gamiz, Ana Boyano, Jesus Maria Blanco

    Published 2025-01-01
    “…This paper explores the aerodynamic behavior of a reusable launch vehicle, the Skylon spaceplane, for different angles of attack at Mach 5. The goal is to determine how aerodynamic effects manifest at various angles of attack and compare it with the theoretical data along with the determination of total time required for such computational fluid dynamics (CFD) simulations. …”
    Get full text
    Article