Showing 10,261 - 10,280 results of 31,041 for search '"strategy"', query time: 0.12s Refine Results
  1. 10261

    Automated Windows domain penetration method based on reinforcement learning by Lige ZHAN, Letian SHA, Fu XIAO, Jiankuo DONG, Pinchang ZHANG

    Published 2023-08-01
    “…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
    Get full text
    Article
  2. 10262

    Smoking Avoidance, Physical Activity and Diet as Preventative Behaviours for Lung, Prostate and Colorectal Cancer - A Comparison of the Extended Parallel Process Model Groups by Katarzyna Domosławska-Żylińska, Dorota Włodarczyk

    Published 2025-02-01
    “…Respondents perceived smoking avoidance to be the most effective intervention, while considering this to be the least feasible strategy to implement for lung cancer. In all of the behaviours, the Indifferent group was the most numerous. …”
    Get full text
    Article
  3. 10263

    Improved Salt Tolerance of Lamtoro (Leucaena leucocephala) through the Application of Indigenous Mycorrhiza by Delvian Delvian, Adrian Hartanto

    Published 2021-01-01
    “…Arbuscular mycorrhizal fungi (AMF) have been implemented as a strategy to mitigate the adverse effects due to an impact of salt stress through the structural and physiological adjustment. …”
    Get full text
    Article
  4. 10264

    Effect of N-Acetylation Degree on the Properties of Chitosan-Stabilized Pickering Emulsions by WU Jun, SHI Zhaojuan, YUAN Chuanxun, WANG Xingting, JIN Risheng

    Published 2024-12-01
    “…The aim of this study is to apply a modification strategy based on covalently grafting acetyl groups onto polysaccharide chains to improve the emulsifying properties of chitosan. …”
    Get full text
    Article
  5. 10265

    Effective Design of Profiling Float Network for Oceanic Heat-Content Monitoring by Shuhei Masuda, Shigeki Hosoda

    Published 2014-01-01
    “…We demonstrate a more effective geographic deployment strategy for the profiling floats monitoring changes in the oceanic heat content on a decadal timescale.…”
    Get full text
    Article
  6. 10266

    Russia and the Issues of the Korean Peninsula by G. D. Toloraya

    Published 2014-08-01
    “…The importance of Korean Peninsula in Russian foreign strategy is based on the need to preserve peace and stability in the Russia's Far East "soft underbelly" and to be a part of international efforts to solve the Korean problem, as well as to promote regional economic cooperation. …”
    Get full text
    Article
  7. 10267

    Fault-Tolerant Model Predictive Control for Autonomous Underwater Vehicles Considering Unknown Disturbances by Yimin Chen, Shaowen Hao, Jian Gao, Jiarun Wang, Le Li

    Published 2025-01-01
    “…Specifically, additive faults in the rudders are addressed, and an active fault-tolerant control strategy is employed. Fault models of autonomous underwater vehicles have been established to develop the fault-tolerant control method. …”
    Get full text
    Article
  8. 10268

    Anterior Abdominal Wall Pain by A. I. Dolgushina, M. I. Karpova, I. A. Karpov, N. B. Nadtochiy, A. A. Saenko

    Published 2023-12-01
    “…Knowledge of pathognomonic clinical and instrumental signs is the basis for differential diagnosis and choice of treatment strategy for pathology of the anterior abdominal wall.…”
    Get full text
    Article
  9. 10269

    Role of Verticillium dahliae effectors in interaction with cotton plants by Lingling Yang, Tingyuan Fu, Ruichen Sha, Guihuan Wei, Yuhe Shen, Zhen Jiao, Bing Li

    Published 2025-01-01
    “…Evading plant immunity by suppressing host recognition or successive immune signaling is a successful infection strategy employed by various microbial pathogens, posing a significant challenge to effectively utilizing host hereditary resistance genes in sustainable disease management. …”
    Get full text
    Article
  10. 10270

    Real-Time Integrated Limited-Stop and Short-Turning Bus Control with Stochastic Travel Time by Hu Zhang, Shuzhi Zhao, Yang Cao, Huasheng Liu, Shidong Liang

    Published 2017-01-01
    “…This paper formulates such an integrated strategy, presents the solution method of the formulation, and proves the validity of the real-time control method.…”
    Get full text
    Article
  11. 10271

    The Effects of a Professional Development Program on the Classroom Practices of Physics Teachers by Ozlem Oktay, Ali Eryilmaz

    Published 2022-05-01
    “…When the results were examined in relation to teaching strategies, materials/technologies, and assessment techniques used for various purposes, there was a clear increase in the number, variety, and quality of strategies, materials, and technologies used in these dimensions.…”
    Get full text
    Article
  12. 10272

    Clean-Room Air Conditioning Control Based on Improved Min-Max Robust Model Predictive Control Algorithm by Qiang Luo, Ting Wang

    Published 2025-01-01
    “…To improve the comfort of indoor environment in clean-room and to reduce the operating cost of the equipment, the study proposes an improved Min-Max robust model predictive control algorithm for clean-room air conditioning control strategy. Firstly, for the comfort of indoor air conditioning, the MPC algorithm is investigated to regulate the air conditioning air supply based on indoor temperature and humidity ratio in order to control the indoor comfort of the clean-room. …”
    Get full text
    Article
  13. 10273

    VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION by E. V. Batueva

    Published 2014-06-01
    “…The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. …”
    Get full text
    Article
  14. 10274

    Searchable encryption scheme based on attribute policy hiding in a cloud environment by Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG

    Published 2022-04-01
    “…Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.…”
    Get full text
    Article
  15. 10275

    A Decentralized Energy Flow Control Framework for Regional Energy Internet by Guofeng Wang, Kangli Zhao, Yu Yang, Junjie Lu, Youbing Zhang

    Published 2019-01-01
    “…The numerical results of real-world traces show that the regional EI can better absorb the renewable energy under the optimized control strategy, which proves the feasibility and economy of the proposed decentralized energy flow control framework.…”
    Get full text
    Article
  16. 10276

    The Engineering Pedagogy Evolution: The Foundation and Three Measurements by D. P. Danilaev, N. N. Malivanov

    Published 2021-11-01
    “…Based on the general foundations and laws of pedagogy, three measurements of engineering pedagogy enable to reveal its interdisciplinary strategy in different subject areas. Engineering pedagogy can participate in various formats– as teacher training technology both for school and university teachers.…”
    Get full text
    Article
  17. 10277

    Parental Knowledge, Attitudes, and Behaviours towards Human Papillomavirus Vaccination for Their Children: A Systematic Review from 2001 to 2011 by Kristina Trim, Naushin Nagji, Laurie Elit, Katherine Roy

    Published 2012-01-01
    “…A systematic review of parental surveys about HPV and/or child HPV vaccination to understand parental knowledge, attitudes, and behaviour before and after FDA approval of the quadrivalent HPV vaccine and the bivalent HPV vaccine. Search Strategy. Searches were conducted using electronic databases limited to published studies between 2001 and 2011. …”
    Get full text
    Article
  18. 10278

    Scheduling in Targeted Transient Surveys and a New Telescope for CHASE by Francisco Förster, Nicolás López, José Maza, Petr Kubánek, G. Pignata

    Published 2010-01-01
    “…In order to test this scheduling strategy we use a modified version of the genetic scheduler developed for the telescope control system RTS2. …”
    Get full text
    Article
  19. 10279

    Exploring distance learning in higher education: satisfaction and insights from Mexico, Saudi Arabia, Romania, Turkey by Miltiadis D. Lytras, Andreea Claudia Serban, Stamatios Ntanos

    Published 2025-02-01
    “…Our research promotes the strategic deployment of DL in the current context as a resilient strategy of institutions for high-impact training and targeting of huge audiences, with emphasis on the deployment of new tools and teaching methods customized for a new, unique value proposition of the DL. …”
    Get full text
    Article
  20. 10280

    Cognitive flexibility in urban yellow mongooses, Cynictis penicillata by Mijke Müller, Neville Pillay

    Published 2024-03-01
    “…The mongooses successfully unlearned their previously learned response in favour of learning a new response, possibly through a win-stay, lose-shift strategy. Attention task experiments were conducted using one puzzle box surrounded by zero, one, two or three objects, introducing various levels of distraction while solving the task. …”
    Get full text
    Article