Showing 401 - 420 results of 81,006 for search 'AT*', query time: 0.14s Refine Results
  1. 401

    A general attack model based on Android system vulnerability by Xihai DENG, Weimiao FENG, Luping MA, Ying LI

    Published 2016-10-01
    “…The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. Furthermore, the evaluation framework can assess the influence of system vulnerabilities on the security of Android ecosystem.…”
    Get full text
    Article
  2. 402

    Vestibular and balance dysfunction in attention deficit hyperactivity disorder and cognitive disengagement syndrome risk groups by Zuhal Koc Apaydın, Emre Soylemez, Nefise Demir

    Published 2025-02-01
    “…Abstract Background In the past, cognitive disengagement syndrome (CDS) and attention deficit hyperactivity disorder (ADHD) were considered similar concepts. …”
    Get full text
    Article
  3. 403
  4. 404
  5. 405

    Quel(s) besoin(s) d’accomplissement pour quelles carrières ? Une exploration dans le contexte tunisien pour mieux comprendre l’attrait pour la carrière entrepreneuriale by Ilia Taktak Kallel

    Published 2012-09-01
    “…The results reveal in particular that the need of fulfillment is especially congruent with situations of indecision in terms of career preferences, while the choice of the entrepreneurship career significantly keeps pace with the search for a certain quality of life, what brought to us to advance the idea of "feminization" of the values of individuals attracted to new business start-up, even if this last one remains a widely male career.…”
    Get full text
    Article
  6. 406
  7. 407

    Invective Metaphors in the Bulgarian Language. An Attempt at a General Characteristic by Dilyana Dencheva

    Published 2025-01-01
    “…Additionally, within the framework of the aforementioned aspects, efforts are made to systematize and delineate specific characteristics. Special attention is dedicated to examining Turkisms and insults prevalent not only among individuals, but also between distinct societal fractions, such as football fans.…”
    Get full text
    Article
  8. 408

    Efficacy of malic and tartaric acid in mitigation of cadmium stress in Spinacia oleracea L. via modulations in physiological and biochemical attributes by Ansa Shabbir, Anis Ali Shah, Sheeraz Usman, Shakil Ahmed, Muhammad Kaleem, Shiffa Shafique, Mansour K. Gatasheh

    Published 2025-01-01
    “…The results of this study revealed that Cd stress (100 µM) significantly reduced growth attributes, photosynthetic pigments and related parameters and gas exchange attributes. …”
    Get full text
    Article
  9. 409

    Des occupations laténiennes sur le plateau de Champeigne tourangelle, communes d’Athée-sur-Cher et de Truyes (Indre-et-Loire) by Fabrice Couvin, Sandrine Linger-Riquier, Gaëlle Robert, Gwenaël Roy

    Published 2015-12-01
    “…In an area of less than 2.5 km2, three excavations of the A85 motorway and the evaluation of a carry, at Athée-sur-Cher and Truyes (Indre-et-Loire), have delivered late Iron Age settlements. …”
    Get full text
    Article
  10. 410

    Nutrient Availability and Changes on Chemical Attributes of a Paleudult Soil Amended with Liquid Sewage Sludge and Cropped with Surinam Grass by Luiz Carlos Ceolato, Ronaldo Severiano Berton, Aline Renée Coscione

    Published 2011-01-01
    “…The liquid sewage sludge (LSS) was applied on a field experiment during four years at successive applications to evaluate the changes in soil attributes and on Surinam grass (Brachiaria decumbens) uptake of nutrients. …”
    Get full text
    Article
  11. 411
  12. 412

    MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network by Wenjie Guo, Wenbiao Du, Xiuqi Yang, Jingfeng Xue, Yong Wang, Weijie Han, Jingjing Hu

    Published 2025-01-01
    “…Firstly, to ensure semantic richness, a Bidirectional Encoder Representations from Transformers-based (BERT) attribute-enhanced function embedding method is proposed for the extraction of node attributes in the function call graph. …”
    Get full text
    Article
  13. 413
  14. 414
  15. 415
  16. 416
  17. 417

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
    Get full text
    Article
  18. 418

    Control de niveles poblacionales endémicos de la avispa de los pinos sirex noctilio (hymenoptera: siricidae) mediante el raleo sanitario de hospederos atacados by J. M. Villacide, J. C. Corley

    Published 2006-01-01
    “…Realizamos un censo total de los árboles de una plantación e identificamos todos aquellos con ataque de la plaga para su posterior raleo y eliminación. …”
    Get full text
    Article
  19. 419
  20. 420