Showing 2,121 - 2,140 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 2121

    Contaminação fúngica do acervo da biblioteca de Manguinhos da Fundação Oswaldo Cruz: ações desenvolvidas para sua solução<p>The contamination by fungus of the Manguinhos library bi... by Rejane Ramos Machado, Maria Élide Bortoletto, Eliana Coutinho

    Published 2002-10-01
    “…At the end of December 1996 the bibliographic collection of FIOCRUZ Manguinhos Library, then compound by approximately 620,000 volumes, was strongly attacked by fungus and had to be closed during five months. …”
    Get full text
    Article
  2. 2122

    Water availability, water content and chemical treatment of seeds on the emergence of soybean seedlings by Renato Téo de Barros, Cibele Chalita Martins, Givanildo Zildo da Silva, Tatiane Sanches Jeromini

    Published 2024-12-01
    “…ABSTRACT During the germination process, seeds are susceptible to abiotic and biotic stresses, such as attacks by pests and pathogens. In this context, chemical treatment of seeds can promote physiological and morphological changes in seeds and seedlings, in addition to protecting seeds. …”
    Get full text
    Article
  3. 2123

    An Enhanced and Adaptive Algorithm for Secure Encryption of Data using Advanced Encryption by Mohanad S. Taha

    Published 2025-08-01
    “…Data is protected using encryption during online and other transfers, yet the information may be obtained from an unauthorized attacker who is persistent enough. Two or more approaches to security should be combined, according to what is highlighted in the article. …”
    Get full text
    Article
  4. 2124

    Perspectives of Palestinian physicians on the impact of the Gaza War in the West Bank by Husam Dweik, Ahmad Abu Hadwan, Beesan Maraqa, Ameed Taher, Therese Zink

    Published 2024-12-01
    “…When the Israeli army attacked Gaza after October 7th, 2023, the situation in the occupied West Bank became much worse. …”
    Get full text
    Article
  5. 2125

    Cybersecurity awareness among accounting students at a South African public university by Pranisha Rama, Ben Marx, Rozanne Smith

    Published 2025-06-01
    “…Results: The findings indicate that accounting students exhibit different levels of cybersecurity awareness, with some demonstrating strong knowledge of cyber risks and protective measures, while others show significant gaps in understanding and practice. …”
    Get full text
    Article
  6. 2126

    The Effect of Metformin in Experimentally Induced Animal Models of Epileptic Seizure by Ebrahim M. Yimer, Awol Surur, Dawit Zewdu Wondafrash, Abadi Kahsu Gebre

    Published 2019-01-01
    “…In these studies, metformin showed to control seizure attacks by attenuating seizure generation, delaying the onset of epilepsy, reducing hippocampal neuronal loss, and averting cognitive impairments in both acute and chronic models of an epileptic seizure. …”
    Get full text
    Article
  7. 2127

    Personal health data protection and intelligent healthcare applications under generative adversarial network by Xiaoyuan Gao, Wei Mi, Xirui Feng

    Published 2025-05-01
    “…DP-GAN-HD demonstrates enhanced resistance to privacy attacks through its multi-generator framework and Gaussian noise perturbation mechanisms. …”
    Get full text
    Article
  8. 2128

    Impact of Rapid Urbanization on Vulnerability of Land System from Complex Networks View: A Methodological Approach by Ying Wang, Xiangmei Li, Jiangfeng Li, Zhengdong Huang, Renbin Xiao

    Published 2018-01-01
    “…Land systems are typical complex systems comprised of different land use types which interact with each other and respond to external environment processes (such as urbanization), resulting in dynamics in land systems. …”
    Get full text
    Article
  9. 2129

    Sialendoscopy approach in treating juvenile recurrent parotitis: a systematic review by D. Soriano-Martín, L. García-Consuegra, L. Junquera, T. Rodríguez-Santamarta, S. Olay, S. Junquera-Olay

    Published 2023-08-01
    “…There was a statistically significant relationship between the number of attacks/year and recurrences (p < 0.05). The percentage of recurrences according to the type of irrigation/flushing used ranged from 22.2% to 25.2%, with no significant differences between the use of corticosteroids alone (25.2% of recurrences), corticosteroids plus antibiotics (25% of recurrences) or saline alone (22.2% of recurrences). …”
    Get full text
    Article
  10. 2130

    Modernization of the mechanism of the financial services market cybersecurity legal support by O. V. Brusakova, O. P. Getmanets

    Published 2021-09-01
    “…The methodological basis of the study is systemic, and the study used a comprehensive approach, which is manifested in the use of different methods of scientific knowledge depending on specific aspects of the study. …”
    Get full text
    Article
  11. 2131

    Multiple image encryption algorithm using channel randomization and multiple chaotic maps by Khalid M. Hosny, Yasmin M. Elnabawy, Rania A. Salama, Ahmed M. Elshewey

    Published 2024-12-01
    “…Moreover, experimental results and a thorough security analysis affirm that the proposed encryption technique has effectively attained confidentiality and robust resistance against various attacks.…”
    Get full text
    Article
  12. 2132

    Optimizing Energy/Current Fluctuation of RF-Powered Secure Adiabatic Logic for IoT Devices by Bendito Freitas Ribeiro, Yasuhiro Takahashi

    Published 2025-07-01
    “…By ensuring uniform and complementary current flow in each transition within the logic circuit’s functional blocks, the design reduces energy variation and enhances resistance against power analysis attacks. Evaluation under different clock frequencies and load capacitances demonstrates that the proposed adiabatic logic circuit exhibits lower fluctuation and improved security, particularly at load capacitances of 50 fF and 100 fF. …”
    Get full text
    Article
  13. 2133

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article
  14. 2134

    One-way Video Transmission Technology for Urban Rail Transit Based on EndpointDevices by ZHANG Lidong, XU Ziheng, WANG Kun

    Published 2025-07-01
    “…The proprietary protocol design in the proposed scheme effectively avoids the vulnerabilities associated with general-purpose protocols and enhances resistance to network attacks, thereby ensuring synchronous video transmission across classified networks.…”
    Get full text
    Article
  15. 2135

    Genome Editing and Defense against Its Misuse by J. Lakota

    Published 2025-05-01
    “…Human genome editing methods (“genetic scissors“) may be possibly used for biological attacks of various biological targets, including humans.We should set up an international surveillance scheme to control the use of this method and to detect cases of hidden use of these destructive agents created on its basis.Relevance. …”
    Get full text
    Article
  16. 2136

    A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol by Laerte Peotta de Melo, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

    Published 2024-11-01
    “…The customer initiates the transaction on a computer and independently validates it on their mobile device using an out-of-band channel to prevent attacks such as phishing and man-in-the-middle. The methodology involves implementing a prototype in Java ME for Android devices and a Java application server, creating a practical, low-computational-cost system, accessible for use across different operating systems and devices. …”
    Get full text
    Article
  17. 2137

    Optimizing Internet of Things Honeypots with Machine Learning: A Review by Stefanie Lanz, Sarah Lily-Rose Pignol, Patrick Schmitt, Haochen Wang, Maria Papaioannou, Gaurav Choudhary, Nicola Dragoni

    Published 2025-05-01
    “…Honeypots enhance IoT security by attracting and analyzing attackers. However, traditional honeypots struggle with adaptability and efficiency. …”
    Get full text
    Article
  18. 2138

    Ecology, Floristic–Vegetational Features, and Future Perspectives of Spruce Forests Affected by <i>Ips typographus</i>: Insight from the Southern Alps by Luca Giupponi, Riccardo Panza, Davide Pedrali, Stefano Sala, Annamaria Giorgi

    Published 2025-05-01
    “…According to the model, more than 58% of the current spruce forests in the study area will exhibit high susceptibility (probability > 0.7) to severe bark beetle attacks by 2080. The floristic–vegetational and ecological analysis of plant communities of 11 bark beetle-affected areas indicated that more thermophilic and significantly different forest communities (in both floristic and physiognomic terms) are expected to develop compared to those of pre-disturbance. …”
    Get full text
    Article
  19. 2139

    Trusted Energy-Aware Hierarchical Routing (TEAHR) for Wireless Sensor Networks by Vikas, Charu Wahi, Bharat Bhushan Sagar, Manisha Manjul

    Published 2025-04-01
    “…Our experimental setup presents the simulation approach to prove our proposed protocol of TEAHR in comparison with typical trust models under different scenarios of node mobility, variable node density, and sophisticated security attacks such as Sybil, wormhole, and replay attacks. …”
    Get full text
    Article
  20. 2140

    Nutritional support in early phases of acute pancreatitis: fashionable trend and essential reality by Ye. Ye. Achkasov, A. V. Pugayev, G. V. Dyatchina, V. I. Posudnevsky, Zh. G. Nabiyeva, P. V. Melnikov

    Published 2013-07-01
    “…To establish a true role of early enteric feeding in AP treatment, it is necessary to continue monitoring of primary attacks, preventing its relapses, and to study effect of different types of enteric feeds on the level of APUD system hormones, that regulate pancreatic secretion.Conclusion. …”
    Get full text
    Article