Showing 2,061 - 2,080 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 2061

    Cancelable Biometric Template Generation Using Random Feature Vector Transformations by Ragendhu S P, Tony Thomas, Sabu Emmanuel

    Published 2024-01-01
    “…In addition to the performance concerns, most of such schemes are modality-specific and prone to reconstruction attacks as there are chances for unauthorized access to security-critical transformation keys. …”
    Get full text
    Article
  2. 2062

    Hypercapnia as a preventative therapeutic strategy: Unveiling the neuroprotective potential and mechanisms by K. Fazeli, S.B. Jameie, M. Farhadi

    Published 2025-06-01
    “…As a result, hypercapnia has been utilized as an intervention in several clinical trials regarding different neurological conditions, most notably Sub-Arachnoid Hemorrhage. …”
    Get full text
    Article
  3. 2063

    Caricature as one of the information mechanisms for constructing the image of Russia's war against Ukraine: according to the materials of "The Times" and "The Sunday Times" by Руслан Куцик

    Published 2022-10-01
    “…Putin, who was attached to a series of different images: "Russian-Soviet leader", "half-naked macho" and "dwarf". …”
    Get full text
    Article
  4. 2064

    An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm by Vipul Sharma, Roohie Naaz Mir

    Published 2022-03-01
    “…Initially, for providing robustness against watermarking attacks, a method for watermarking embedding is designed in the domain of Discrete Cosine Transform. …”
    Get full text
    Article
  5. 2065

    Soft money, hard power: Mapping the material contingencies of change in global health academic structures. by Daniel W Krugman, Alice Bayingana

    Published 2025-01-01
    “…Pushing for long term, ethical transfers of wealth and responsibility, ruinous solidarity explicitly reorients the political commitments of those who affiliate with Global Health in imperial cores, and thus offers important considerations in the wake of Trump Administration attacks on the field.…”
    Get full text
    Article
  6. 2066

    Management of gout in advanced renal disease by John S. Richards, Namitha Nair, Mohan Ramkumar

    Published 2025-05-01
    “…Gout management involves different phases: treatment of acute gout flares, implementing prophylaxis to prevent attacks and urate-lowering therapy (ULT). …”
    Get full text
    Article
  7. 2067

    Evaluation of lipid profiles in patients with chronic spontaneous urticaria: A case-control study by Abbas Khalili, Fatemeh Azadi Talab Davoudabadi, Bamdad Sadeghi

    Published 2025-03-01
    “…Urticaria severity showed no significant difference within each lipid profile parameter. Average values of lipid profiles in patients with chronic urticaria in different age and sex showed that HDL has remarkably higher mean quantitation in women than men (p < 0.002). …”
    Get full text
    Article
  8. 2068

    Oncogenic human papillomaviruses activate the tumor-associated lens epithelial-derived growth factor (LEDGF) gene. by Jenny Leitz, Miriam Reuschenbach, Claudia Lohrey, Anja Honegger, Rosita Accardi, Massimo Tommasino, Manuel Llano, Magnus von Knebel Doeberitz, Karin Hoppe-Seyler, Felix Hoppe-Seyler

    Published 2014-03-01
    “…The identification of cellular targets attacked by the HPV oncogenes is critical for our understanding of the molecular mechanisms of HPV-associated carcinogenesis and may open novel therapeutic opportunities. …”
    Get full text
    Article
  9. 2069

    Evaluating the Impact of Feature Engineering in Phishing URL Detection: A Comparative Study of URL, HTML, and Derived Features by Yanche Ari Kustiawan, Khairil Imran Ghauth

    Published 2025-01-01
    “…Phishing attacks have evolved into sophisticated threats, making effective cybersecurity detection strategies essential. …”
    Get full text
    Article
  10. 2070

    Photoperiod effects on the growth stages of fall armyworm Spodoptera frugiperda (Lepidoptera: Noctuidae) under laboratory conditions by Redwika Clarissa Putri, Dita Megasari, Noni Rahmadhini

    Published 2024-12-01
    “… Spodoptera frugiperda, commonly known as the fall armyworm, is a pest that attacks maize plants in Indonesia. Light is one of the crucial factors in the development of S. frugiperda. …”
    Get full text
    Article
  11. 2071

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  12. 2072

    Personal Data Recognition Using a Deep Learning Model by Nikita Babak

    Published 2024-03-01
    “…Protecting personal identifiable information is a crucial issue today due to individuals leaving traces of their activities on social media and various digital platforms, which can be exploited by attackers for identity theft and fraud. Consequently, there is a need to develop effective methods for personal data protection. …”
    Get full text
    Article
  13. 2073

    A Security and Privacy-Preserving Consortium Blockchain-Based Accessing Control in Mobile Crowdsensing by Abdulrahman Alamer

    Published 2025-01-01
    “…They can achieve this by launching attacks, such as creating counterfeit applications as a trusted MCS applications and then posing as legitimate stakeholders to request access to the targeted devices. …”
    Get full text
    Article
  14. 2074

    Vestibular Syncope and Acute Peripheral Vestibular Deficit: A Case Report by Noemi Motta, Marco Gitto, Valeria Castelli, Eleonora Tobaldini, Nicola Montano, Federica Di Berardino

    Published 2024-12-01
    “…ABSTRACT Vestibular syncope is a rare condition in which vertigo may cause syncopal attacks; however, the term has been associated with confusion because it has been ascribed to completely different vestibular and neurological conditions, from dizziness to Menière disease (MD), to the neurovegetative symptoms in benign paroxysmal positional vertigo (BPPV) and central vertebrobasilar hyperfusion. …”
    Get full text
    Article
  15. 2075

    A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network by Adelaïde Nicole Kengnou Telem, Colince Meli Segning, Godpromesse Kenne, Hilaire Bertrand Fotsin

    Published 2014-01-01
    “…The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. …”
    Get full text
    Article
  16. 2076

    Transformers: A Security Perspective by Banafsheh Saber Latibari, Najmeh Nazari, Muhtasim Alam Chowdhury, Kevin Immanuel Gubbi, Chongzhou Fang, Sujan Ghimire, Elahe Hosseini, Hossein Sayadi, Houman Homayoun, Soheil Salehi, Avesta Sasan

    Published 2024-01-01
    “…The survey categorizes different attacks and defenses related to Transformers, helping researchers identify gaps and opportunities in this area. …”
    Get full text
    Article
  17. 2077

    Combined and General Methodologies of Key Space Partition for the Cryptanalysis of Block Ciphers by Mijail Borges-Quintana, Miguel A. Borges-Trenard, Osmani Tito-Corrioso, Omar Rojas, Guillermo Sosa-Gómez

    Published 2024-10-01
    “…Furthermore, a method of attacking block ciphers is presented for the case where some key bits are known; the basic idea is to deduce some of the remaining bits of the block. …”
    Get full text
    Article
  18. 2078

    FPGA implementation of a chaos-based image encryption algorithm by Mohamed Maazouz, Abdelmoughni Toubal, Billel Bengherbia, Oussama Houhou, Noureddine Batel

    Published 2022-11-01
    “…The results of the various tests prove that the proposed algorithm guarantees high resistance to statistical and differential attacks and can therefore be used safely in image encryption. …”
    Get full text
    Article
  19. 2079

    Ecological network construction and community resilience analysis of nocturnal birds: a case study of Hangzhou City, Zhejiang Province, China by Yang Jin, Mingkan Zhang, Danying Yan, Kun Li, Chao Zhou, Xi Chen

    Published 2025-06-01
    “…Using community detection methods to analyze the differences in attributes, habitats, and topological structures between network communities. …”
    Get full text
    Article
  20. 2080

    A Real-Time Video Watermarking Algorithm for Authentication of Small-Business Wireless Surveillance Networks by Shaohui Liu, Daniel Bo-Wei Chen, Long Gong, Wen Ji, Sanghyun Seo

    Published 2015-09-01
    “…Experiment results show little loss of video quality and also exhibit excellent robustness against many attacks. As watermark is directly detected in bitstreams domain, real-time detection becomes a reality. …”
    Get full text
    Article