Showing 3,561 - 3,580 results of 16,989 for search 'Defekt~', query time: 3.78s Refine Results
  1. 3561
  2. 3562
  3. 3563

    Optimal defense strategy based on the mean field game model for cyber security by Li Miao, Lina Wang, Shuai Li, Haitao Xu, Xianwei Zhou

    Published 2019-02-01
    “…Focusing on the balance between individual cost and overall network cost, we present an application of mean field game in large-scale defenders in cyber security, where players seek to construct an optimal defense strategy at their minimum cost. …”
    Get full text
    Article
  4. 3564

    Capsule network approach for monkeypox (CAPSMON) detection and subclassification in medical imaging system by M. Nuthal Srinivasan, Mohamed Yacin Sikkandar, Maryam Alhashim, M. Chinnadurai

    Published 2025-01-01
    “…Abstract In response to the pressing need for the detection of Monkeypox caused by the Monkeypox virus (MPXV), this study introduces the Enhanced Spatial-Awareness Capsule Network (ESACN), a Capsule Network architecture designed for the precise multi-class classification of dermatological images. …”
    Get full text
    Article
  5. 3565

    Blastomyces dermatitidis Yeast Lysate Antigen Combinations: Antibody Detection in Dogs with Blastomycosis by Alex R. Boyd, Jamie L. VanDyke, Gene M. Scalarone

    Published 2013-01-01
    “…All of the 6 antigenic preparations were able to detect antibody in the serum specimens, but the antigen combinations detected antibody to a higher degree than the individual antigen. …”
    Get full text
    Article
  6. 3566
  7. 3567
  8. 3568

    Account hijacking threat attack detection for OAuth2.0 authorization API by Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU

    Published 2019-06-01
    “…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
    Get full text
    Article
  9. 3569
  10. 3570
  11. 3571
  12. 3572
  13. 3573
  14. 3574

    Utilization of nanomaterials functionalized bio-field-effect transistors for detection of cancer biomarkers by Keerthana Madhivanan, Raji Atchudan, Sandeep Arya, Ashok K. Sundramoorthy

    Published 2024-06-01
    “…Despite of all the advanced treatments in cancer, the early detection and diagnosing the first stage of the disease is very important. …”
    Get full text
    Article
  15. 3575

    Testing Strategies for Detection of Xenotropic Murine Leukemia Virus-Related Virus Infection by Shixing Tang, Indira K. Hewlett

    Published 2011-01-01
    “…Since its identification in 2006 and detection of polytropic murine lenkemia virus (MLV)-like sequences in CFS patients in 2010, several test methods including nucleic acid testing methods and serological assays have been developed for detection of XMRV and/or MLV-like sequences. …”
    Get full text
    Article
  16. 3576

    An Optimized Deep-Learning-Based Network with an Attention Module for Efficient Fire Detection by Muhammad Altaf, Muhammad Yasir, Naqqash Dilshad, Wooseong Kim

    Published 2025-01-01
    “…Globally, fire incidents cause significant social, economic, and environmental destruction, making early detection and rapid response essential for minimizing such devastation. …”
    Get full text
    Article
  17. 3577

    Statistical-based detection of pilot contamination attack for NOMA in 5G networks by Dalia Nashat, Sahar Khairy

    Published 2025-01-01
    “…The simulation results show that the proposed scheme succeeded in detecting the pilot contamination attack with a detection rate of up to 98% and a precision reached 97.88%.…”
    Get full text
    Article
  18. 3578

    Detecting privacy compliance of mobile applications from the perspective of the "minimum necessary" principle by YU Peihou, XU Tianchen, SUN Wenqian, CHEN Yunfang, YU Le, ZHANG Wei

    Published 2024-12-01
    “…For this purpose, a framework called MNPD (minimum necessary principle detection) was proposed for automated compliance checking of applications from the perspective of the ‘minimum necessary’ principle. …”
    Get full text
    Article
  19. 3579
  20. 3580