Showing 66,681 - 66,700 results of 72,530 for search 'IXFORM~', query time: 2.35s Refine Results
  1. 66681

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  2. 66682

    Descriptive Analysis Regarding Optic Canal Variations: A Study In South Punjab Region Of Pakistan by Ponum Mirani, Ammara Rasheed, Gul Afshan, Nida Rasheed

    Published 2024-09-01
    “…These results hold practical implications for clinicians, informing diagnostic imaging, surgical planning, and interventions involving the optic canal. …”
    Get full text
    Article
  3. 66683

    Analysis and calculation of higher harmonics of power supply system of plant on basis of packet wavelet conversion by S. A. Gorovoy, A. V. Simakov, V. I. Skorokhodov

    Published 2022-02-01
    “…Based on the data obtained, a simulation model is formed and an analysis of higher harmonics is performed using the packet wavelet transform method. …”
    Get full text
    Article
  4. 66684

    Uso de la inteligencia artificial como recurso para potenciar las competencias investigativas y el pensamiento crítico en la educación superior by Dulio Oseda Gago, Lesly Elizabeth Torres Chumbiauca, Noemi Mencia-Sánchez, Roger Rivera-Casavilca

    Published 2025-01-01
    “…Sin embargo, estudios recientes han demostrado que su uso ha sido de impacto para el sector universitario en general, en tanto estudiantes y docentes, de manera formal e informal, aplican estas herramientas tecnológicas para potenciar las experiencias educativas e investigativas, haciendo más flexible, abierto y dinámico el acceso al conocimiento. …”
    Get full text
    Article
  5. 66685
  6. 66686

    Exploring Seasonality Indices for Low-Flow Analysis on Tibagi Watershed (Brazil) by Alexandre Sokoloski de Azevedo Delduque de Macedo, Michael Männich

    Published 2025-01-01
    “…The indices were computed and compared using previously calculated low-flow discharge data (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>Q</mi><mn>95</mn></msub></semantics></math></inline-formula>) and physiographic information on sub-watersheds. A ‘Seasonality Calendar’ was developed, illustrating the period and intensity of low-flow discharge occurrences in the watershed. …”
    Get full text
    Article
  7. 66687
  8. 66688
  9. 66689

    Archéologie d’un jardin de sculptures du xxe siècle by Aline Gheysens

    Published 2011-01-01
    “….), data production (texts, photographs), careful study of these information according to an experimental protocol and finally, connecting all the produced data together in a book combining text and photography.…”
    Get full text
    Article
  10. 66690

    Clinicians’ experience with infographic summaries from the BMJ Rapid Recommendations: a qualitative user-testing study among residents and interns at a large teaching hospital in S... by Thomas Agoritsas, Per Vandvik, Tiffany Hirschel

    Published 2025-02-01
    “…Some users felt intimidated by numbers or the amount of information, although they perceived there could be a learning curve while using generic formats. …”
    Get full text
    Article
  11. 66691

    A comparative study of the effect of physical-social factors on the quality of life of residents of different types of housing in quarantine conditions (Case study: different type... by jamaleddin honarvar, sara jalalian

    Published 2022-03-01
    “…The documentary and field method and a questionnaire were used to collect information. To analyze the data, single sample t-test and mean test and to study the normalization of data were used by colomogorov-smarinov test. …”
    Get full text
    Article
  12. 66692
  13. 66693
  14. 66694

    The highly prolific phenotype of Lacaune sheep is associated with an ectopic expression of the B4GALNT2 gene within the ovary. by Laurence Drouilhet, Camille Mansanet, Julien Sarry, Kamila Tabet, Philippe Bardou, Florent Woloszyn, Jérome Lluch, Grégoire Harichaux, Catherine Viguié, Danielle Monniaux, Loys Bodin, Philippe Mulsant, Stéphane Fabre

    Published 2013-01-01
    “…With the aim to identify the FecL gene, we developed a high throughput sequencing strategy of long-range PCR fragments spanning the locus of FecL(L) carrier and non-carrier ewes. Resulting informative markers defined a new 194.6 kb minimal interval. …”
    Get full text
    Article
  15. 66695

    A non-linear approach to the establishment of local biological control agent  production units: a case study of fall armyworm in Bangladesh by Mariam A. T. J. Kadzamira, Malvika Chaudhary, Frances Williams, Nirmal K. Dutta

    Published 2022-07-01
    “…Methods Qualitative and quantitative data from maize growing areas in Bangladesh was collected via telephone interviews from key informants representing four key stakeholders—national research institute, regional research stations, farmer producer organisations and agro-dealers. …”
    Get full text
    Article
  16. 66696
  17. 66697
  18. 66698
  19. 66699

    Unexplained Illnesses Associated With a Subscription Meal Service, 2022 by Melanie J. Firestone, Craig W. Hedberg

    Published 2025-01-01
    “…We independently reviewed data on 338 people, including 264 people with supplemental food exposure information, and calculated minimal attack rates. Of 264 people who completed the supplemental survey, all (100%) consumed the Lentil and Leek Crumbles. …”
    Get full text
    Article
  20. 66700

    VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks by Juli Yin, Linfeng Wei, Zhiquan Liu, Xi Yang, Hongliang Sun, Yudan Cheng, Jianbin Mai

    Published 2023-12-01
    “…It selects sub mechanism 1 when there exist very few vehicles or the coalition cannot be formed, otherwise selects sub mechanism 2. Single aggregation is used to collect data in sub mechanism 1. …”
    Get full text
    Article