Showing 1,921 - 1,940 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1921

    Secure Pesticide Storage: Security Against Terrorist Threats by Frederick M. Fishel

    Published 2005-06-01
    “… Many farmers and managers of pesticide storage facilities had concerns about biosecurity and agroterrorism even before the Oklahoma City bombing and the September 11, 2001 terrorist attacks on our nation. Businesses that manufacture, reformulate, sell, distribute, transport, store, or apply pesticides have long known the mitigation steps for safety of their workers, customers and communities. …”
    Get full text
    Article
  2. 1922

    Design of Ice Tolerance Flight Envelope Protection Control System for UAV Based on LSTM Neural Network for Detecting Icing Severity by Ting Yue, Xianlong Wang, Bo Wang, Shang Tai, Hailiang Liu, Lixin Wang, Feihong Jiang

    Published 2025-01-01
    “…At present, most flight control methods for icing-affected aircraft adopt a conservative control strategy, in which small control inputs are used to keep the aircraft’s angle of attack and other state variables within a limited range. …”
    Get full text
    Article
  3. 1923

    Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data by Youssra Cheriguene, Wael Jaafar, Halim Yanikomeroglu, Chaker Abdelaziz Kerrache

    Published 2024-01-01
    “…Through experiments, we assess the effectiveness of our scheme in resisting different attack scenarios, in terms of convergence and achieved model accuracy. …”
    Get full text
    Article
  4. 1924

    Karhunen–Loeve orthogonal decomposition method for problems of EEG assessment of patients with migraine by Egorov, Evgenij Nikolaevich, Zhuravlev, Maksim Olegovich, Runnova, Anastasia Evgenevna, Evstropov, Maksim Arkad`evich, Redzhepova, Alena Садуллаевна

    Published 2025-01-01
    “…For the frontal lobe of the brain, significant differences in the distribution of the first mode were demonstrated, assessed for groups of patients with rare and frequent migraine attacks.…”
    Get full text
    Article
  5. 1925

    A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application by Abid Mahboob, Muhammad Asif, Imran Siddique, Aysha Saleem, Muhammad Nadeem, Dariusz Grzelczyk, Jan Awrejcewicz

    Published 2022-01-01
    “…S-boxes with low value of differential uniformity and high value of nonlinearity are considered more secure against cryptanalysis attacks. For the construction of <inline-formula> <tex-math notation="LaTeX">$8\times 8$ </tex-math></inline-formula> S-boxes, an efficient and novel scheme is presented in this paper. …”
    Get full text
    Article
  6. 1926

    Phytophthora Identification and Sampling in Citrus Nurseries by Jamie D. Burrow, Diane B. Bright, Tim D. Riley, James H. Graham

    Published 2015-09-01
    “… Phytophthora species are important soil-borne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
    Get full text
    Article
  7. 1927

    Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map by Jian-feng Zhao, Shu-ying Wang, Li-tao Zhang, Xiao-yan Wang

    Published 2017-01-01
    “…The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks.…”
    Get full text
    Article
  8. 1928

    Nonislet Cell Tumor Hypoglycemia in a Patient with Adrenal Cortical Carcinoma by Se Won Kim, Seung-Eun Lee, Young Lyun Oh, Seokhwi Kim, Sun Hee Park, Jae Hyeon Kim

    Published 2016-01-01
    “…The serum level of the IGF-II/IGF-I ratio was normalized after removal of the tumor, and the hypoglycemic attacks no longer occurred after the operation.…”
    Get full text
    Article
  9. 1929

    Some Graph-Based Encryption Schemes by Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid

    Published 2021-01-01
    “…The need of new nonstandard encryption algorithms has been raised to prevent the communication from traditional attacks. This paper proposes some new encryption algorithms for secure transmission of messages using some special corona graphs and bipartite graph along with some algebraic properties. …”
    Get full text
    Article
  10. 1930

    Reducing Your Risk for Heart Disease: The Power of Food by Elena B. Smith, Jodi Fitzgerald, Danielle Nelson, Madison Woodard, Jeanette Andrade

    Published 2021-01-01
    “…Heart disease is an umbrella term for the following heart conditions: • Angina • Irregular heartbeats • Heart attacks • Heart failure • Stroke This new 8-page publication of the UF/IFAS Food Science and Human Nutrition Department describes the modifiable risk factors for heart disease and tips to reduce one’s risk for heart disease. …”
    Get full text
    Article
  11. 1931

    Application research of optical communication network based on artificial intelligence technique by Gangxiang SHEN

    Published 2020-01-01
    “…The applications of artificial intelligence (AI) technique in optical communication networks were explored.Some representative AI applications and potential risks due to the failure of the AI technique were discussed.To address these risks,methods including systematic AI modeling through unitizing and miniaturizing sub-systems and cooperation with traditional network modeling and planning methods were proposed,which were expected to help improve the effectiveness and practicality of the application of the AI technique.Finally,to recover a system from the failure of its employed AI technique or attacks,some protection strategies were proposed.…”
    Get full text
    Article
  12. 1932

    Real time database system data security collection scheme by Zhenyang SHANG, Ruixian YANG

    Published 2016-10-01
    “…With application status of the China Petroleum Refining and Chemicals run system MES(manufacturing execution system)in subordinate enterprises as well as the data acquisition interface program in real-time database module, the security risks such as virus, attacks and illegal invasions in production unit automatic control system (DCS, PLC)because of the “two-network integration”were analyzed. …”
    Get full text
    Article
  13. 1933

    Black thread scale, Ischnaspis longirostris (Signoret) (Insecta: Hemiptera: Diaspididae) by Adriana Espinosa, Amanda Hodges, Greg Hodges, Catharine Mannion

    Published 2009-07-01
    “…It describes this one of the most serious armored scale pests worldwide, attacking over 50 families of host plants — its distribution, field characteristics, life cycle, hosts, plant damage and economic importance, and management. …”
    Get full text
    Article
  14. 1934

    South American Fruit Fly, Anastrepha fraterculus (Wiedemann) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-11-01
    “…This species is of great economic importance because of the wide variety of plants which it attacks and its extensive distribution. In most of South America it probably is the most important species of Anastrepha. …”
    Get full text
    Article
  15. 1935

    Phytophthora Identification and Sampling in Citrus Nurseries by Jamie D. Burrow, Diane B. Bright, Tim D. Riley, James H. Graham

    Published 2015-09-01
    “… Phytophthora species are important soil-borne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
    Get full text
    Article
  16. 1936

    Encryption based on reversible cellular automata by PING Ping, ZHOU Yao, ZHANG Hong, LIU Feng-yu

    Published 2008-01-01
    “…Compared with the general irreversible toggle cellular automata cryptosystem,the proposed method greatly improves the speed of encryption and has large keys space,it can resist bruce attack and differ-ential cryptanalysis.…”
    Get full text
    Article
  17. 1937

    Detection of Paroxysmal Atrial Fibrillation in Stroke/Tia Patients by Muhib Khan, Daniel J. Miller

    Published 2013-01-01
    “…One-third of stroke and transient ischemic attack (TIA) are cryptogenic, and paroxysmal atrial fibrillation (PAF) has been suggested as a possible cause for these cryptogenic strokes. …”
    Get full text
    Article
  18. 1938

    Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration by Han Qiu, Julong Lan, Yangfeng Ou, Chuanhao Zhang, Yanhong Wang

    Published 2015-06-01
    “…The system can detect network attacks passing through the border in real time with four notable features,non-aided deployment,high reliable operation,not able to be detected to ensure its own safety and fu11 data collection,and hopefully it can give a simple and easy-to-accomplish solution to protect the border safety.…”
    Get full text
    Article
  19. 1939

    A Forward-Secure Digital Signature Based on Elliptic Curve by Huiyan Chen, Yong Yuan, Zongjie Wan, Le Liu, Yi Yang

    Published 2015-10-01
    “…The forward-secure digital signature is an important digital signature scheme.It requires that even if the attackers have already been given a signature key by invading a system in t time,it still can’t forge signatures before time t.In other words,the forward-secure digital signature provides an assurance that any signatures in the previous periods are still valid before the key compromises.Based on the elliptic curve discrete logarithm problem and the factoring problem,a forward-secure digital signature scheme was put forward,and the safety and efficiency of the program was analyzed and proved systematically.…”
    Get full text
    Article
  20. 1940

    Black thread scale, Ischnaspis longirostris (Signoret) (Insecta: Hemiptera: Diaspididae) by Adriana Espinosa, Amanda Hodges, Greg Hodges, Catharine Mannion

    Published 2009-07-01
    “…It describes this one of the most serious armored scale pests worldwide, attacking over 50 families of host plants — its distribution, field characteristics, life cycle, hosts, plant damage and economic importance, and management. …”
    Get full text
    Article