Showing 1 - 20 results of 566 for search 'attack three', query time: 0.10s Refine Results
  1. 1
  2. 2

    Evaluation of Recurrence of Ischemic Stroke and Transient Ischemic Attack Three Months After the First Transient Ischemic Attack Based On Diffusion-Weighted Imaging (DWI) by Abolfazl Atalu, Firouz Amani, Kiana Kheirkhah

    Published 2023-04-01
    “…Introduction: One type of stroke is the Transient Ischemic Attack (TIA) which lasts less than twenty-four hours; of all patients, about 10 percent develop a stroke within three months after the first symptoms, and 30 percent develop over five years. …”
    Get full text
    Article
  3. 3

    MaDIoT 3.0: Assessment of Attacks to Distributed Energy Resources and Demand in a Power System by Nestor Rodriguez-Perez, Javier Matanza, Lukas Sigrist, Jose Rueda Torres, Gregorio Lopez

    Published 2025-01-01
    “…MaDIoT 3.0 attacks are a novel type of attack that manage to compromise both high-wattage IoT demand devices and DER devices at the same time. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Features of flow of victims after terrorist attacks in the subway by A. P. Trukhan, I. M. Samokhvalov, T. Yu. Skakunova, A. A. Ryadnov

    Published 2021-01-01
    “…The objective of the study was to compare the order of admission and distribution in hospitals of the incoming flow of victims with explosive peacetime injuries (based on the analysis of terrorist acts in Minsk on April 11, 2011 and in St. Petersburg on April 3, 2017).Methods and Materials. We analyzed the organization of inpatient medical care for 2 groups of victims who applied for medical care to hospital health organizations on the day of the terrorist attack. …”
    Get full text
    Article
  9. 9
  10. 10

    Profile of patients in hypertensive attack assisted in an emergency unit in Fortaleza by Rhanna Emanuela Fontenele Lima, Ana Cristina Veras de Sousa, Mara Roberta Soares Pinto, Thelma Leite de Araújo

    Published 2005-06-01
    “…The main objective of this paper was to analyze, from emergency registers, the profile of patients undergoing hypertensive attack between January and February of 2002 in a municipal hospital in Fortaleza, investigating the characteristics of gender, age group, the working shifts (morning, afternoon, and night) with most frequent patients’ attendance in the hospital, and the medicines prescribed during the attack. …”
    Get full text
    Article
  11. 11

    My Pine Is Under Attack—What Should I Do? by Jiri Hulcr

    Published 2016-05-01
    “… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
    Get full text
    Article
  12. 12

    Attacks and countermeasures on federated learning via historical knowledge modeling by Songsong Zhang, Zhengliang Jiang, Hang Gao, Suying Gui, Tiegang Gao

    Published 2025-07-01
    “…DynHisFL improves accuracy by 71.3% even with a 20% attack ratio, while achieving an outstanding 98.7% poisoning detection accuracy. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Agent-based modeling of Ethereum consensus short-range reorganization attacks by Junhuan Zhang, Zhengyong Zhao, Ran Ji

    Published 2025-04-01
    “…However, some malicious nodes may compromise this trust through short-range reorganization attacks for their interest. This paper develops an agent-based model to systematically analyze Proof-of-Stake short-range reorganization attacks, where three types of agents interact through distributed consensus mechanisms with ex-ante, fine-grained, and ex-post reorganization attack strategies. …”
    Get full text
    Article
  17. 17

    RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework by Nora Rashid Najam, Razan Abdulhammed Abduljawad

    Published 2023-10-01
    “…Many efforts are being put into developing defenses against these types of attacks. The tools used by attackers to perform these types of attacks increase day-to-day. …”
    Get full text
    Article
  18. 18

    Multi-view adversarial attack defending method for host intrusion detection by WANG Fei, QIAN Kehan, LYU Mingqi, ZHU Tiantian, CHEN Honglong

    Published 2025-01-01
    “…Host-based intrusion detection (HID) aims to identify attack behaviors through the analysis of host logs. …”
    Get full text
    Article
  19. 19

    Quality of the nursing attendance with heart attack patient – evaluation through the handbook by Maria José Santos Teles

    Published 2000-02-01
    “…Based on a standard routine there were analyzed 50 official records by virtue of which could be concluded that: Level I – minimum requirements were 94.3% of that contemplated; Level II standards of quality in attendance attained 60%; Level III – standards of excellence were not attained.  …”
    Get full text
    Article
  20. 20