-
1861
BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System
Published 2024-01-01“…In this context, there is a need to develop datasets of attacks on these systems to evaluate the risks and allow researchers to develop proper monitoring algorithms. …”
Get full text
Article -
1862
Influence of the Chemical Composition in the Electrochemical Response of Permanent Magnets
Published 2015-01-01“…Analysis by scanning electron microscopy has shown that pitting attack is the main mode of degradation of the magnets, while Co addition reduces it and Pr addition increases it.…”
Get full text
Article -
1863
Trustworthy identity system based on IPv6 source address validation
Published 2014-10-01“…In the Internet,there are no mechanisms to verify the identity of a message sender,resulting in a large number of forged identity attacks,such as phishing websites.By mapping the user identity into the rightmost 64 bit of the IPv6 address,this paper tries to make every message embedded with an identity,which lay a credible foundation for communications on the Internet.We design and realize a true identity communication system based on source address validation improvement,which can protect the privacy of the users,and ensure the verifiability and authenticity of the user identities.…”
Get full text
Article -
1864
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01“…Methodological advances in combinatorics and mathematics play a vital role in artificial intelligence and machine learning for data analysis and artificial intelligence-based cybersecurity for protection of the computing systems, devices, networks, programs and data from cyber-attacks. In connection with these ideas, this article is prepared for applications in computing science and cybersecurity. …”
Get full text
Article -
1865
Adaptive security architecture defense platform based on software defined security
Published 2020-12-01“…Based on continuous monitoring and retrospective analysis,adaptive security architecture was constructed to be security defense system integrating prevention,detection,response and prediction,which possesses intelligent and elastic defense ability concerning about advanced directive attacks.An essential implementable adaptive security defense platform was therefore introduced and applied correspondingly according to a thorough research of adaptive security architecture and software defined security,combined with internet security environment.Besides,website application security issues were also analyzed.…”
Get full text
Article -
1866
Research of survivability enhancement algorithm based on autonomous configuration
Published 2007-01-01“…Based on redundancy and diversity,the method of enhancing system survivability was proposed by dynami-cally configuring atomic modules.According to the history average response time,survivability curves were drawn.The autonomous configuration algorithm was designed based on the survivability of atomic modules,system efficiency and quality of service.The contrast experiment validated the algorithm’s correctness and validity in the condition of atomic modules have different failure rate.The simulation confirmed that this algorithm can enhance the service survivability when atomic module under attack or be ageing…”
Get full text
Article -
1867
Effectiveness and tolerability of rimegepant in the acute treatment of migraine: a real-world, prospective, multicentric study (GAINER study)
Published 2025-01-01“…Participants were instructed to treat one migraine attack with rimegepant 75 mg orally disintegrating tablet. …”
Get full text
Article -
1868
Security Analysis in Wireless Sensor Networks
Published 2014-10-01“…The paper also presents characteristics, security requirements, attacks, encryption algorithms, and operation modes. …”
Get full text
Article -
1869
Inflation Outlook — The Costs of War drive prices up to new heights
Published 2022-03-01“…Abstract The Russian government’s attack on Ukraine and the spiral of sanctions that has been set in motion have heightened inflationary pressure — especially in Europe. …”
Get full text
Article -
1870
Whiteflies on Landscape Ornamentals
Published 2013-04-01“…The most frequently attacked plants include allamanda, avocado, chinaberry, citrus, fig, fringe tree, gardenia, gumbo limbo, ligustrum, mango, various palms, persimmon, viburnum, and many annuals. …”
Get full text
Article -
1871
POSTMODERNISM AND POSITIVISM
Published 1998-01-01“… Positivism is a favorite object of postmodernist attacks. With an interesting exception, namely Hume, it is regarded by postmodernists as an embodiment of everything what is the worst in the Spirit of Enlightenment: its emphasis on wholeness, unity, and unequivocalness of knowledge. …”
Get full text
Article -
1872
Gambaran Faktor yang Berhubungan dengan Timbulnya Kejang Demam Berulang pada Pasien yang Berobat di Poliklinik Anak RS. DR. M. Djamil Padang Periode Januari 2010 – Desember 2012
Published 2016-09-01“…It was found that most patients who develop recurrent febrile seizures had their first attack in age of 11 – 20 months old (47.5%), female sex (62.5%), had febrile seizure family history (72.5%), had no epilepsy family history (97.5%), and had simple febrile seizure on their first attack (60%). …”
Get full text
Article -
1873
Identifikasi Dan Pengendalian Hama Tanaman Jambu Air Dengan Pendekatan Case Based Reasoning Berbasiskan Sistem Pakar
Published 2023-07-01“…Several pests can attack water guava plants, including Pests Bactrocera spp, Pests Pagodiella hekmeyeri, Pests Attacus atlas L, Pests Phenacoccus manihoti, Pests Liriomyza sp, Pests Leptocorisa oratorius, and Pests Mites. …”
Get full text
Article -
1874
Novel Derivatives of Phenylisoxazole-3/5-Carbaldehyde Semicarbazone: Synthesis, Characterization, and Computational Studies
Published 2024-01-01“…The MEP descriptors indicate that the oxygen atom of the carbonyl group C=O is susceptible to electrophilic attack, while the hydrogen atoms of the amide and hydrazone fragments are sensitive to nucleophilic attack. …”
Get full text
Article -
1875
Intrusion detection in metaverse environment internet of things systems by metaheuristics tuned two level framework
Published 2025-01-01“…A two-leveled architecture was designed to manage intricate data, enabling the detection and classification of attacks within IoT networks. A thorough analysis utilizing a real-world IoT network attacks dataset validates the proposed architecture’s efficacy in identification of the specific variants of malevolent assaults, that is a classic multi-class classification challenge. …”
Get full text
Article -
1876
Causal Analysis and Prevention Strategies for Safety Risks in Prefabricated Building Construction Based on Accident Data and Complex Network Theory
Published 2025-01-01“…Research shows that the attack strategies of betweenness centrality and degree centrality can significantly affect the stability of the network structure, and the EffG attack strategy performs better in identifying key nodes. …”
Get full text
Article -
1877
Novel Node Centrality-Based Efficient Empirical Robustness Assessment for Directed Network
Published 2020-01-01“…Some further research studies have indicated that the online social network has high robustness to random removals of nodes but fails to the intentional attacks, particularly to those attacks based on node betweenness or node directed coefficient. …”
Get full text
Article -
1878
Methods Used in Urban Search and Rescue in Disasters and Evaluation of Current Approaches
Published 2020-01-01“…Disaster is an event that results in serious physical and death of large number of people, because of earthquake, tsunami, flood, landslide, volcano eruption, hurricane, hose, airplane accidents, train accidents, nuclear power plant accidents, explosions and terrorist attacks. Urban search and rescue works are important for finding people and animals trapped under the collapsed structure after the collapse of buildings as a result of earthquakes, terrorist attacks and landslides. …”
Get full text
Article -
1879
Neuromyelitis optica spectrum disorder: epidemiology, pathogenesis, diagnosis, treatment, and prognosis
Published 2021-03-01“…Factors leading to a worse prognosis include the severity of the first attack, higher number of relapses in the first two years, older age at the disease onset, and association with other autoimmune disorders. …”
Get full text
Article -
1880
ReMAV: Reward Modeling of Autonomous Vehicles for Finding Likely Failure Events
Published 2024-01-01“…Autonomous vehicles are advanced driving systems that revolutionize transportation, but their vulnerability to adversarial attacks poses significant safety risks. Consider a scenario in which a slight perturbation in sensor data causes an autonomous vehicle to fail unexpectedly, potentially leading to accidents. …”
Get full text
Article