-
2081
Modified Lipid Particle Recognition: A Link Between Atherosclerosis and Cancer?
Published 2025-06-01“…Dysfunctional lipid metabolism causes atherosclerosis, a driving force in arterial disease leading to heart attacks and strokes. In this review, we focus on emerging evidence for links between atherosclerosis and cancer. …”
Get full text
Article -
2082
Image Compression-Encryption Scheme via Fiber Specklegram-Based Compressive Sensing and Double Random Phase Encoding
Published 2020-01-01“…Since fiber specklegrams have strong dependence on configuration, such measurement matrix can be constructed either by one specklegram or by specklegrams from different launched wavelengths. The double-encrypted image demonstrated good safety and reliability in several common attacks and presented high key sensitivity, which indicates good performance of the proposed scheme.…”
Get full text
Article -
2083
IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning
Published 2022-09-01“…As a result, monitoring and detecting various attacks on these devices becomes feasible. As the statistics prove, in the Mirai and Brickerbot botnets, Distributed Denial-of-Service (DDoS) attacks have become increasingly ubiquitous. …”
Get full text
Article -
2084
COMISET: Dataset for the analysis of malicious events in Windows systemsZenodo
Published 2025-08-01“…In the laboratory environment, real attacks were executed involving a variety of techniques and tactics commonly used by the adversaries. …”
Get full text
Article -
2085
Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains
Published 2025-05-01“…The proposed remote sensing image encryption system exhibits high security performance and robustness against various attacks.…”
Get full text
Article -
2086
The role of sleep quality on mental toughness among football players
Published 2023-07-01“…Moreover, defenders and attackers exhibited the highest levels of MT compared to other playing positions. …”
Get full text
Article -
2087
Investigating the Barriers of Using Blockchain Technology in Iran's Automobile Industry
Published 2022-07-01“…Based on the findings, among the seven factors of the leading technical and technological component, three sub-components, including the lack of necessary safety against cyber attacks, the storing information problem, and the lack of standardization in different blockchain systems were ranked first to third, respectively, which shows the significance of the technical and technological factors.…”
Get full text
Article -
2088
Survey on Effective Disposal of E-Waste to Prevent Data Leakage
Published 2024-04-01“…Even after deleting data, it can still be prone to social engineering attacks by malicious individuals. Data leakage is the unauthorized transmission of data from within an organization to an external destination or recipient, and it can be transferred electronically or physically. …”
Get full text
Article -
2089
Copyright Verification and Traceability for Remote Sensing Object Detection Models via Dual Model Watermarking
Published 2025-01-01“…The watermark shows good robustness against fine-tuning and pruning attacks.…”
Get full text
Article -
2090
THE EFFECTS OF MARKETING MIX ON PESTICIDE PURCHASING DECISIONS THROUGH BRAND IMAGE AMONG RICE FARMERS IN KANOR SUB-DISTRICT, BOJONEGORO DISTRICT
Published 2024-07-01“…Because it is located on the banks of the Bengawan Solo river, the land in the sub-district is often threatened by pest attacks and affected by flooding. In an effort to prevent and treat pests, rice farmers in Kanor Sub-district choose to use pesticides because it is easier. …”
Get full text
Article -
2091
Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences
Published 2025-06-01“…Cryptographic outputs should look more random than deterministic in order to provide an attacker with as little information as possible. Therefore, the investigation of randomness, especially in cybersecurity, has attracted a lot of attention and research activities. …”
Get full text
Article -
2092
Comparison of two bolus doses of dexmedetomidine for prophylaxis against postoperative nausea and vomiting in highly susceptible patients: A randomized controlled trial
Published 2024-04-01“…Our objective was to compare the antiemetic effect of two different concentrations of two bolus doses of Dexmedetomidine (Dex) in PONV high-risk patients. …”
Get full text
Article -
2093
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Published 2024-01-01“…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for ID. …”
Get full text
Article -
2094
A compact public key encryption with equality test for lattice in cloud computing
Published 2025-07-01“…With those efforts, our scheme can withstand the chosen ciphertext attacks as long as the learning with errors (LWE) assumption holds. …”
Get full text
Article -
2095
A Comparative Study of Coverage Hole Detection Techniques in Wireless Sensor Networks
Published 2023-12-01“…A network with holes in coverage is more susceptible to node failures or malicious attacks. According to the total number of hops used to transport data, nodes may calculate their distance from the sink node. …”
Get full text
Article -
2096
Factors Responsible for Wheel - Rail Interaction in Curves
Published 2015-02-01“…And this is the reason for the gauge outward pressure rate to be different in the steep and smooth curves at the within-one-order frame forces’ values. …”
Get full text
Article -
2097
Chaotic Image Encryption System as a Proactive Scheme for Image Transmission in FSO High-Altitude Platform
Published 2025-06-01“…Finally, the effect of malicious interception attacks, caused by noise interference from different levels of atmospheric turbulence, is examined. …”
Get full text
Article -
2098
Host use patterns by the European woodwasp, Sirex noctilio, in its native and invaded range.
Published 2014-01-01“…However, S. noctilio populations could behave differently when they reach forests of the southeastern U.S., where tree species, soils, climate, ecology, management, and landscape configurations of pine stands are different.…”
Get full text
Article -
2099
Highly-Efficient Hardware Architecture for ML-KEM PQC Standard
Published 2025-01-01“…Furthermore, the implementation incorporates several methods to effectively mitigate side-channel attacks, a common concern in hardware-based cryptosystem deployments. …”
Get full text
Article -
2100
Phishing suspiciousness in older and younger adults: The role of executive functioning.
Published 2017-01-01“…Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. …”
Get full text
Article