Showing 1 - 20 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Susceptibility of different genotypes of rice to Sitophilus zeamais Motschulsky 1885 attack (Coleoptera: Curculionidae) by Tatiane Colares, Rafael G. Dionello, Lauri L. Radunz

    Published 2016-03-01
    “…Thus, the aim of this study was to evaluate grains from nine different genotypes of rice, in order to identify the existence of materials less susceptible to the attack of Sitophilus zeamais, during 180 days of storage. …”
    Get full text
    Article
  6. 6

    Modeling and Analysis of Kamikaze UAV Design with 3 Different Wing Configurations by Mustafa Murat Yavuz, Ahmed Receb Demirel, Nehir Tokgöz

    Published 2024-08-01
    “…The effect of angle of attack (AoA), wing positioning on the fuselage, and wing configurations were investigated. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes by Eugene Levner, Dmitry Tsadikovich

    Published 2024-11-01
    “…To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. …”
    Get full text
    Article
  10. 10

    Investigations into speech intelligibility in the presence of different masking noises for hearing aids with variable attack and release times by E. Hojan, H. Fastl, J. Malenda, D. Hojan-Jezierska

    Published 2005-01-01
    “…The change of the speech intelligibility of hearing-impaired people was investigated in the presence of different masking noises, especially when using hearing aids with adjustable attack (AT) and release (RT) times within same frequency bands. …”
    Get full text
    Article
  11. 11
  12. 12

    Attack or reform by Peter Curos

    Published 2023-04-01
    “…Moreover, which elements in the government’s actions differentiate valid criticism from an attack on the independence of the judiciary? This paper proposes an original approach toward recognizing an attack on the judiciary. …”
    Get full text
    Article
  13. 13

    A Brief Overview of Optimal Robust Control Strategies for a Benchmark Power System with Different Cyberphysical Attacks by Bo Hu, Hao Wang, Yan Zhao, Hang Zhou, Mingkun Jiang, Mofan Wei

    Published 2021-01-01
    “…Security issue against different attacks is the core topic of cyberphysical systems (CPSs). …”
    Get full text
    Article
  14. 14
  15. 15

    Risk Indices Assessment of Different Cyber-Attack Actions for an SDN-Enabled IEC 61850 Substation Using Markov Decision Process by Zhihao Wu, Sugandh Seth, Haiyu Li, Zhirun Hu, James Yu

    Published 2025-01-01
    “…This paper aims to evaluate the security posture of SDN-enabled substations and to calculate the cyber risk indices of a substation under different attacks. The proposed approach uses 1) the Purdue Model to model attack scenarios using cyber-physical devices at different layers based on typical protection control device arrangement in a substation and 2) the Markov Decision Process (MDP) model to assess cybersecurity risk indices for the substation. …”
    Get full text
    Article
  16. 16
  17. 17

    The role of sleep in migraine attacks by Elaine Inamorato, Suzanmeire N. Minatti-Hannuch, Eliova Zukerman

    Published 1993-11-01
    “…Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Comparison of selected physical fitness components among male football players of different playing positions by Amandeep Sıngh, Sukhdev Sıngh, Vishaw Gaurav

    Published 2015-11-01
    “…The purpose of this study was to examine the level of physical fitness among male football players in relation to their different playing positions i.e. goalkeepers, defenders, midfielders and attackers. …”
    Get full text
    Article