Showing 1,941 - 1,960 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1941

    Movahed's sign of left ventricle on myocardial perfusion scintigraphy in a case with chronic thromboembolic pulmonary hypertension by Fatih Bati, Guler Si̇lov, Nilufer Bicakci, Banu Kirtiloglu

    Published 2024-04-01
    “…In this case, a 75-year-old female patient who was followed up with a diagnosis of chronic pulmonary thromboembolism and had an acute embolism attack covering the entire right lung was retrospectively reviewed. …”
    Get full text
    Article
  2. 1942

    Approach for information systems security situation evaluation using improved FAHP and Bayesian network by FU Yu, WU Xiao-ping, YE Qing

    Published 2009-01-01
    “…An approach for the information systems security situation assessment based on an improved FAHP and Bayesian network was proposed to solve the problem of obtaining the risk grade.The improved FAHP was used to quantify the factor of attack severity which was hard to scale.Simultaneously, the conditional probability matrices for all fac-tors were defined with the expert knowledge.Then a model for information security situation assessment was established by the Bayesian network inference, and the corresponding approach was presented.Finally, an illustrative instance was given to demonstrate its rationality and feasibility.Thus it may provide a new way for assessing information systems security situation.…”
    Get full text
    Article
  3. 1943

    Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Hemiptera: Miridae) by Wayne N. Dixon, Thomas R. Fasulo

    Published 2009-12-01
    “…It describes this insect that attacks over half of the cultivated plant species grown in the United States, including increasing feeding damage on conifer seedlings — distribution, description, life history, hosts, damage, survey and detection, and management. …”
    Get full text
    Article
  4. 1944

    South American Fruit Fly, Anastrepha fraterculus (Wiedemann) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-11-01
    “…This species is of great economic importance because of the wide variety of plants which it attacks and its extensive distribution. In most of South America it probably is the most important species of Anastrepha. …”
    Get full text
    Article
  5. 1945

    Sporadic Hemiplegic Migraine with Seizures and Transient MRI Abnormalities by Harsha Bhatia, Fawzi Babtain

    Published 2011-01-01
    “…Hemiplegic migraines are characterised by attacks of migraine with aura accompanied by transient motor weakness. …”
    Get full text
    Article
  6. 1946

    Synchronization and blind detect algorithm for dual channel audio watermark by FENG Tao1, HAN Ji-qing1

    Published 2006-01-01
    “…A synchronization and a blind detect algorithm based on character of dual-channel audio was presented by calculating Mel frequency spectrum coefficient and using correlation between left and right channel,the synchronized segment was fix on and the performance was analyzed.After the watermarking was embedded into synchronized segment in both channels at the same time,it could be detected without original audio and watermarking information by calculat-ing the correlation of them between left and right channels.Experimental results show that the proposed approach can significantly improve the watermarking robustness under the attacks of adding noise,MP3 compression,resample and requantization.…”
    Get full text
    Article
  7. 1947

    Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm by Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU

    Published 2021-03-01
    “…The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.…”
    Get full text
    Article
  8. 1948

    Sporadic Pemphigus Foliaceus in a 3-Year-Old Vietnamese Girl: A Case Report and Literature Review by Trinh Thi Diem Nguyen, Trinh Ngoc To Chau, Phuong Thi Doan Vo, Hao Trong Nguyen

    Published 2024-01-01
    “…Pemphigus foliaceus is an uncommon autoimmune intraepidermal blistering disease characterized by immunoglobulin (Ig) G autoantibodies that attack desmoglein-1 in the epidermis. There are two predominant forms of pemphigus foliaceus, sporadic and endemic. …”
    Get full text
    Article
  9. 1949

    La symbolique des lieux urbains en France lors des attentats de janvier 2015 by Charles-Edouard Houllier-Guibert

    Published 2016-01-01
    “…We can see the creation of a kind of memorial in this square where no attacks occurred but there were the largest gatherings for many years.…”
    Get full text
    Article
  10. 1950

    Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Hemiptera: Miridae) by Wayne N. Dixon, Thomas R. Fasulo

    Published 2009-12-01
    “…It describes this insect that attacks over half of the cultivated plant species grown in the United States, including increasing feeding damage on conifer seedlings — distribution, description, life history, hosts, damage, survey and detection, and management. …”
    Get full text
    Article
  11. 1951

    Extraintracranial Bypass as a Rescue Therapy for Symptomatic Flow Diverter Thrombosis by Luigi A. Lanterna, Alessandro Lunghi, Carlo Brembilla, Paolo Gritti, Claudio Bernucci

    Published 2015-01-01
    “…Three months after the procedure, in concomitance with the discontinuation of one of the antiplatelet medications, the patient suffered from a minor stroke and relapsing transient ischemic attacks. The angiography demonstrated the occlusion of the internal carotid artery, and a perfusion-weighted CT scan showed a condition of hypoperfusion. …”
    Get full text
    Article
  12. 1952

    Reducing Your Risk for Heart Disease: The Power of Food by Elena B. Smith, Jodi Fitzgerald, Danielle Nelson, Madison Woodard, Jeanette Andrade

    Published 2021-01-01
    “…Heart disease is an umbrella term for the following heart conditions: • Angina • Irregular heartbeats • Heart attacks • Heart failure • Stroke This new 8-page publication of the UF/IFAS Food Science and Human Nutrition Department describes the modifiable risk factors for heart disease and tips to reduce one’s risk for heart disease. …”
    Get full text
    Article
  13. 1953

    Bronchial asthma in elderlies: an approach to this issue in Cuba by Marisela Pérez Pacaréu, Alina de la Caridad González Paredes, Julio Romero Cabrera, Nivia Ramirez López, Idalis Álvarez Toledo, Vivian Macías Carrera

    Published 2011-03-01
    “…In elderlies it is an underdiagnosed and undertreated disease often confused with chronic lung disease, so it is very important to able to evaluate the specific characteristics it presents in elderlies in order to attack the disease effectively, and promote the life quality of asthmatic elderlies.…”
    Get full text
    Article
  14. 1954

    Research on Satellite Internet Security Simulation Test Technology by Hao LI, Linjie ZHANG, Yifei ZHANG

    Published 2023-06-01
    “…Aiming at the challenges of continuous evolution of large-scale systems, massive attack data management and control, and flexible implementation of diversified test tasks, a system architecture and technical structure based on software-defined network and cloud platform were proposed.Key technologies such as high-fidelity large-scale network element simulation, high concurrent traffic generation, and dynamic choreography of security service chain based on SDN were studied in depth, and solutions were proposed.The experimental results showed that these three technologies were innovative and could be applied to the construction of the integrated simulation test platform.…”
    Get full text
    Article
  15. 1955

    Secure efficient and verifiable large linear equations solve outsourcing computing scheme by Xing-lan ZHANG, Xiang LIU

    Published 2017-06-01
    “…A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.…”
    Get full text
    Article
  16. 1956

    Multi-feature based authentication watermarking scheme for MPEG videos by YE Deng-pan1, SHANG Yue-yun2

    Published 2008-01-01
    “…Experimental results show that the scheme is more robust than the single-feature one to the common processing such as code-switching and recompression, while sensitive to the malicious attacks such as erasure and insertion and replacement. …”
    Get full text
    Article
  17. 1957

    Stable Fly (Dog Fly) Control by Phillip E. Kaufman, Emma N. I. Weeks

    Published 2012-09-01
    “…Stable flies primarily attack animals for a blood meal, but in the absence of an animal host, they will bite people. …”
    Get full text
    Article
  18. 1958

    Tobacco Budworm, Heliothis virescens (Fabricius) (Insecta: Lepidoptera: Noctuidae) by John L. Capinera

    Published 2012-10-01
    “…It is principally a field crop pest, attacking such crops as alfalfa, clover, cotton, flax, soybean, and tobacco. …”
    Get full text
    Article
  19. 1959

    Squash Bug, Anasa tristis (DeGeer) (Insecta: Hemiptera: Coreidae) by John L. Capinera

    Published 2002-08-01
    “… The squash bug, Anasa tristis, attacks cucurbits (squash and relatives) throughout Central America, the United States, and southern Canada. …”
    Get full text
    Article
  20. 1960

    Cyberbullying by Kate Fogarty

    Published 2012-08-01
    “…This involves put-downs, publicly sharing personal information, stalking, and other overt attacks upon a person, all using electronic communication.” …”
    Get full text
    Article