-
1
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01Subjects: Get full text
Article -
2
-
3
Analysis of Urban Road Network Robustness under Different Attack Conditions
Published 2024-12-01Get full text
Article -
4
An LES Investigation of Flow Field Around the Cuboid Artificial Reef at Different Angles of Attack
Published 2025-02-01Get full text
Article -
5
Susceptibility of different genotypes of rice to Sitophilus zeamais Motschulsky 1885 attack (Coleoptera: Curculionidae)
Published 2016-03-01“…Thus, the aim of this study was to evaluate grains from nine different genotypes of rice, in order to identify the existence of materials less susceptible to the attack of Sitophilus zeamais, during 180 days of storage. …”
Get full text
Article -
6
Modeling and Analysis of Kamikaze UAV Design with 3 Different Wing Configurations
Published 2024-08-01“…The effect of angle of attack (AoA), wing positioning on the fuselage, and wing configurations were investigated. …”
Get full text
Article -
7
Analysing Differences in Attack Indicators in Men’s First Division Volleyball According to the Positional Status of Teams
Published 2024-12-01Subjects: “…attack efficiency…”
Get full text
Article -
8
-
9
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Published 2024-11-01“…To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. …”
Get full text
Article -
10
Investigations into speech intelligibility in the presence of different masking noises for hearing aids with variable attack and release times
Published 2005-01-01“…The change of the speech intelligibility of hearing-impaired people was investigated in the presence of different masking noises, especially when using hearing aids with adjustable attack (AT) and release (RT) times within same frequency bands. …”
Get full text
Article -
11
Brachiaria ruziziensis Responses to Different Fertilization Doses and to the Attack of Mahanarva spectabilis (Hemiptera: Cercopidae) Nymphs and Adults
Published 2014-01-01“…They were also exposed to different M. spectabilis nymph and adult densities. …”
Get full text
Article -
12
Attack or reform
Published 2023-04-01“…Moreover, which elements in the government’s actions differentiate valid criticism from an attack on the independence of the judiciary? This paper proposes an original approach toward recognizing an attack on the judiciary. …”
Get full text
Article -
13
A Brief Overview of Optimal Robust Control Strategies for a Benchmark Power System with Different Cyberphysical Attacks
Published 2021-01-01“…Security issue against different attacks is the core topic of cyberphysical systems (CPSs). …”
Get full text
Article -
14
Sex Differences in the Participation in Secondary Prevention Stroke Studies
Published 2025-03-01Get full text
Article -
15
Risk Indices Assessment of Different Cyber-Attack Actions for an SDN-Enabled IEC 61850 Substation Using Markov Decision Process
Published 2025-01-01“…This paper aims to evaluate the security posture of SDN-enabled substations and to calculate the cyber risk indices of a substation under different attacks. The proposed approach uses 1) the Purdue Model to model attack scenarios using cyber-physical devices at different layers based on typical protection control device arrangement in a substation and 2) the Markov Decision Process (MDP) model to assess cybersecurity risk indices for the substation. …”
Get full text
Article -
16
-
17
The role of sleep in migraine attacks
Published 1993-11-01“…Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. …”
Get full text
Article -
18
-
19
-
20
Comparison of selected physical fitness components among male football players of different playing positions
Published 2015-11-01“…The purpose of this study was to examine the level of physical fitness among male football players in relation to their different playing positions i.e. goalkeepers, defenders, midfielders and attackers. …”
Get full text
Article