Showing 1,801 - 1,820 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1801

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…But if the Server is exposed to a malicious attack (i.e., flooded with ClientHello messages, the DTLS protocol may no longer serve the purpose) as it may lead to Denial-of-Service (DoS). …”
    Get full text
    Article
  2. 1802

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. …”
    Get full text
    Article
  3. 1803

    Effect of Aspect Ratio, Channel Orientation, Rib Pitch-to-Height Ratio, and Number of Ribbed Walls on Pressure Drop Characteristics in a Rotating Channel with Detached Ribs by K. Arun, S. V. Prabhu

    Published 2007-01-01
    “…Pitch-to-rib height ratios (P/e) of 5 and 10 at constant rib height-to-hydraulic diameter ratio (e/D) of 0.1 and a clearance ratio (C/e) of 0.38 are considered. The rib angle of attack with respect to mainstream flow is 90∘. The channel orientation at which the ribbed wall becomes trailing surface (pressure side on which the Coriolis force acts) is considered as the 0∘ orientation angle. …”
    Get full text
    Article
  4. 1804

    Counteracting Mobbing in Labor Legal Relations by V. V. Honcharuk

    Published 2020-09-01
    “…Harassment at the workplace can provoke feelings of social inferiority, leads to a number of nervous diseases, nervous breakdowns, sleep problems, depression, heart attacks and possible suicide. It has been noted that one of the most important current tasks of labor protection at enterprises is to create a proper psychological climate for each employee at his workplace. …”
    Get full text
    Article
  5. 1805

    Joint Analysis of Morphological Parameters and In Silico Haemodynamics of the Left Atrial Appendage for Thrombogenic Risk Assessment by Maria Isabel Pons, Jordi Mill, Alvaro Fernandez-Quilez, Andy L. Olivares, Etelvino Silva, Tom de Potter, Oscar Camara

    Published 2022-01-01
    “…Statistical analysis, regression models, and random forests were used to analyse the differences between morphological and haemodynamics parameters, extracted from computational simulations built on 3D rotational angiography images, between patients with and without transient ischemic attack (TIA) or cerebrovascular accident (CVA). Results. …”
    Get full text
    Article
  6. 1806

    Effect of perampanel in reducing depression in patients with focal epilepsy by Min Ming, Long Chen, Jian Huang, Ying Huang, Jiali Yin

    Published 2025-06-01
    “…Multiple Regression Analysis was found that annual family income, etiology, the frequency of attacks in recent years, types of ASMs and the age were the influence factors of pirampanel in reducing depression (P<0.05). …”
    Get full text
    Article
  7. 1807

    Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform by Ka‐Wing Tse, Kevin Hung

    Published 2022-03-01
    “…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
    Get full text
    Article
  8. 1808

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…In this context, by explaining the importance of cyber power, the need for cyber power to be considered as one of the elements of national power and the importance of providing security against cyber attacks with deterrence by cyber power are discussed, while a new and integrated approach for the creation and implementation of a NCSS and an authoritarian organizational structure responsible for this strategy is proposed. …”
    Get full text
    Article
  9. 1809

    THE ROLE OF ACUPUNCTURE THERAPY TO OVERCOME ONE-SIDE HEAD PAIN (MIGRAINE) by Mut Mainnah, Wurlina Wurlina, Maya Septriana

    Published 2022-03-01
    “…Background: Migraine is a primary headache, usually described as pain attacks lasting 4 - 72 hours, unilateral, throbbing, with moderate to severe pain intensity that can be exacerbated by activity, and can be accompanied by nausea and vomiting, photophobia and phonophobia. …”
    Get full text
    Article
  10. 1810

    Framework to analyze and exploit the smart home IoT firmware by Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya

    Published 2025-02-01
    “…Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning of 2025, there will likely be 25 to 35 billion IoT devices globally. …”
    Get full text
    Article
  11. 1811

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
    Get full text
    Article
  12. 1812

    An insight into the genome-wide analysis of bacterial defense mechanisms in a uropathogenic Morganella morganii isolate from Bangladesh. by Syed Muktadir Al Sium, Barna Goswami, Sanjana Fatema Chowdhury, Showti Raheel Naser, Mihir Kanti Sarkar, Md Jobaid Faruq, Md Ahashan Habib, Shahina Akter, Tanjina Akhtar Banu, Md Murshed Hasan Sarkar, Md Salim Khan

    Published 2025-01-01
    “…The genome contained mobile genetic components and defense mechanisms, such as restriction modification and CRISPR-Cas systems, indicating the bacterium's ability to defend itself against viral attacks. This thorough investigation sheds important light on M. morganii's pathogenicity and adaptive tactics by revealing its genetic characteristics, AMR, virulence components, and defense mechanisms. …”
    Get full text
    Article
  13. 1813

    Analyzing the Mechanical, Durability, and Microstructural Impact of Partial Cement Replacement with Pumice Powder and Bamboo Leaf Ash in Concrete by Haris Hassen Adem, Fikreyesus Demeke Cherkos

    Published 2024-01-01
    “…It also improved resistance to sulfuric acid attack, and Mix-3 had the least strength reduction of 9.59%. …”
    Get full text
    Article
  14. 1814

    Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies by Alaa Omran Almagrabi, Rafiq Ahmad Khan

    Published 2025-01-01
    “…Data and model manipulation, data theft, and adversarial attacks as well as model inference threats which we do a systematic analysis to disrupt the integrity, confidentiality as well as availability of AI models. …”
    Get full text
    Article
  15. 1815

    Special International Tribunal on the investigation of the russian aggression against Ukraine: legal analysis, international jurisdiction and challenges by A. V. Voitsikhovskyi, O. S. Bakumov

    Published 2023-09-01
    “…It has been noted that the establishment of a Special International Tribunal to investigate the crime of russian aggression against Ukraine should become an effective mechanism for investigating and documenting violations of International Human Rights Law and International Humanitarian Law committed by russia on the territory of Ukraine with the identification of those responsible; compensation for victims and restoration of justice for the Ukrainian people from russia's full-scale armed attack; deterrence of aggressive and destabilising actions of the russian federation, which violates the sovereignty and territorial integrity of Ukraine. …”
    Get full text
    Article
  16. 1816

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise the reliability and safety of vehicular communications. …”
    Get full text
    Article
  17. 1817

    Elements of forensic description of threats or violence against a law enforcement officer by I. P. Fedorishchev

    Published 2023-07-01
    “…Proper legal regulation of the protection of law enforcement officers from unlawful attacks should be one of the most important tasks of a developed state governed by the rule of law, especially in the context of active hostilities, because even in peacetime law enforcement officers put their health and lives at risk. …”
    Get full text
    Article
  18. 1818

    Field-scale detection of Bacterial Leaf Blight in rice based on UAV multispectral imaging and deep learning frameworks. by Guntaga Logavitool, Teerayut Horanont, Aakash Thapa, Kritchayan Intarat, Kanok-On Wuttiwong

    Published 2025-01-01
    “…Bacterial Leaf Blight (BLB) usually attacks rice in the flowering stage and can cause yield losses of up to 50% in severely infected fields. …”
    Get full text
    Article
  19. 1819

    Synthetic data as external control arms in scarce single-arm clinical trials. by Severin Elvatun, Daan Knoors, Simon Brant, Christian Jonasson, Jan F Nygård

    Published 2025-01-01
    “…Clinical trials typically comprise only a few hundred patients usually with high-cardinality features, which makes individual data instances more exposed to re-identification attacks. We examine whether synthetic data can serve as a proxy for the empirical control arm data by providing the same research outcomes while reducing the risk of information disclosure. …”
    Get full text
    Article
  20. 1820

    Fulminant Diabetes in a Patient with Advanced Melanoma on Nivolumab by Nora Chokr, Hafsa Farooq, Elizabeth Guadalupe

    Published 2018-01-01
    “…Fulminant diabetes is an immune endocrinopathy that results from a violent immune attack leading to complete destruction of pancreatic beta cells in genetically predisposed people. …”
    Get full text
    Article