Showing 2,181 - 2,200 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 2181

    Unified Monitor and Controller Synthesis for Securing Complex Unmanned Aircraft Systems by Dong Yang, Wei Dong, Wei Lu, Sirui Liu, Yanqi Dong

    Published 2025-05-01
    “…Unmanned Aircraft Systems (UASs) have undergone rapid development over recent years, but have also became vulnerable to security attacks and the volatile external environment. Ensuring that the performance of UASs is safe and secure no matter how the environment changes is challenging. …”
    Get full text
    Article
  2. 2182

    POSITIVISM AND ITS ADVERSARIES: BRADLEY, COLLINGWOOD, NIETZSCHE AND HEIDEGGER by Evaldas Nekrašas

    Published 1998-01-01
    “…Relating positivism to thinkers attacking traditional metaphysics and belonging to the second group is quite a different task. …”
    Get full text
    Article
  3. 2183

    Symbiotic Learning Grey Wolf Optimizer for Engineering and Power Flow Optimization Problems by Aala Kalananda Vamsi Krishna Reddy, Komanapalli Venkata Lakshmi Narayana

    Published 2022-01-01
    “…SL-GWO’s symbiotic hunting strategies provide a major overhaul to the exiting hierarchical hunting through population sub-grouping into attacking hunters and experienced hunters with individually crafted dynamic adaptive tuning. …”
    Get full text
    Article
  4. 2184

    Victimization of minors in online sexual abuse: a review of international studies by A.S. Medvedeva

    Published 2025-06-01
    “…</strong> The problem of sexual exploitation of children and adolescents has become even more acute after the advent of the Internet and the increase in online activity of people. The attacks began to be carried out in virtual space, acquired a completely different form, which poses a challenge to specialists of various profiles. …”
    Get full text
    Article
  5. 2185

    POSITIVISM AND ITS ADVERSARIES: BRADLEY, COLLINGWOOD, NIETZSCHE AND HEIDEGGER by Evaldas Nekrašas

    Published 1998-01-01
    “…Relating positivism to thinkers attacking traditional metaphysics and belonging to the second group is quite a different task. …”
    Get full text
    Article
  6. 2186

    CLINICAL AND HEMODYNAMIC INTERRELATIONS OF ARRHYTHMIA COURSE IN CHILDREN OF 0 TO 7 YEARS OLD by L. I. Svintsova, I. A. Kovalev, S. N. Krivolapov, N. G. Brazovskaya, S. Yu. Usenkov

    Published 2014-12-01
    “…Into the factors that influence these hemodynamic relations we include high mean heartrate, tendency of tachicardias to recurrent and permanent course, high frequency of attacks in paroxysmal tachicardias in infants before 1 year old.…”
    Get full text
    Article
  7. 2187

    Medical data security and effective organization using integrated Blockchain principles in AI-based healthcare 6.0 infrastructures by Mohammad Gouse Galety, Kuan Tak Tan, Pravin R. Kshirsagar, Subba Rao Polamuri

    Published 2025-08-01
    “…Medical data interoperability among different computing platforms needs intelligent security options. …”
    Get full text
    Article
  8. 2188

    Synergizing TabNet and SHAP for PM10 Forecasting: Insights From Makkah, Saudi Arabia by Abdulrazak H. Almaliki, Afaq Khattak

    Published 2024-01-01
    “…Particulate matter (PM10) poses a serious threat to public health by increasing the risk of respiratory issues like asthma and bronchitis, as well as cardiovascular problems such as heart attacks and strokes. In Makkah, Saudi Arabia, the combined impact of dense vehicular traffic, large-scale construction projects, and an arid climate contributes to elevated PM10 concentrations, posing substantial challenges to air quality management and urban sustainability. …”
    Get full text
    Article
  9. 2189

    Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism by Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede

    Published 2025-03-01
    “…Our scheme provides security against chosen ciphertext attacks (CCA) with more than 100 bits of Core-SVP post-quantum security and belongs to the NIST-level-I security category (provide security at least as much as AES-128). …”
    Get full text
    Article
  10. 2190

    EFFECT OF MORINGA (MORINGA OLEIFERA) LEAF POWDER, NEEM (AZADIRACHTA INDICA) LEAF POWDER, AND CAMPHOR ON WEEVIL (CALLOSOBRUCHUS MACULATUS F.) IN STORED COWPEA (VIGNA UNGUICULATA (L.... by Adams Latif MOHAMMED, Mariam IDDRISS

    Published 2023-02-01
    “…However, its seed is attacked by several insect pests both in the field and in storage, especially the cowpea weevil. …”
    Get full text
    Article
  11. 2191

    A low cost compact network TAP device with Raspberry Pi 4 by Murat Varol, Murat İskefiyeli

    Published 2025-10-01
    “…The communication of multiple networks in different locations is an open problem since the networks include various devices and applications. …”
    Get full text
    Article
  12. 2192

    Cervicogenic headache: Josey's cases revisited Cefaléia cervicogênica: revisão dos casos de Josey by Maurice Vincent, Renato A. Luna

    Published 1997-01-01
    “…Important topics such as the relatively high frequency, fixed unilaterality of the pain, relation to previous trauma, irradiation from the back to the forehead, normal or slightly abnormal roentgenograms, and the mechanical precipitation of attacks are some of the topics considered by Josey. …”
    Get full text
    Article
  13. 2193

    EG-DPoS: Optimized DPoS Consensus Algorithm Based on Evolutionary Game by LIU Yong, DENG Xiaohong, LIU Lihui, SHI Yiran, ZHANG Li

    Published 2025-05-01
    “…The proportional coefficient of credit value and voting weight in the process of agent node election is balanced to reduce the oligopoly phenomenon caused by nodes with high credit value, while the roulette selection algorithm is used to randomize the block generation order of agent nodes, to avoid nodes being attacked during block generation and improve the security of the system. …”
    Get full text
    Article
  14. 2194

    Integrated Potential of Microbial, Botanical, and Chemical Pesticides for the Control of Viral Disease Vector Whiteflies (Hemiptera: Aleyrodidae) on Tomato under Greenhouse and Fie... by Amha Gebremariam, Eyerus Mekuriaw, Fekadu Shemekit, Fassil Assefa

    Published 2022-01-01
    “…Whiteflies are one of the most devastating horticultural pests attacking tomatoes. Although there are several control methods for the control of whitefly pests, the integrated application of entomopathogenic fungi (IPM) with chemical and botanical insecticides has proven more effective than individual control agents. …”
    Get full text
    Article
  15. 2195

    Experience of Acceptance and Commitment Therapy for those with mild traumatic brain injury (ACTion mTBI): A qualitative descriptive study. by Josh W Faulkner, Jason Chua, Amabelle Voice-Powell, Deborah L Snell, Maree Roche, John Moffat, Suzanne Barker-Collo, Alice Theadom

    Published 2025-01-01
    “…There were two overarching themes 1) attacking the concussion from a different direction and 2) positive impact on recovery which depicted participants' overall experiences of the intervention. …”
    Get full text
    Article
  16. 2196

    An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images by S. Nagadevi, G. Abirami, R. Brindha, T. Prabhakara Rao, Gyanendra Prasad Joshi, Woong Cho

    Published 2025-07-01
    “…Nevertheless, networked UAVs are vulnerable to malicious attacks, and therefore intrusion detection systems (IDSs) are logically derived to address the vulnerabilities and/or attacks. …”
    Get full text
    Article
  17. 2197

    Intelligent Decision Making Technique for Handling Game Tactics in Soccer Sports by Karun Madan, Kavita Taneja, Harmunish Taneja

    Published 2025-10-01
    “…By analyzing the passing sequences of the other team, significant insights can be obtained, in the form of their attacking or defensive approach, preferred areas of the pitch, and style of play. …”
    Get full text
    Article
  18. 2198

    Resilience in the Internet of Medical Things: A Review and Case Study by Vikas Tomer, Sachin Sharma, Mark Davis

    Published 2024-11-01
    “…Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. …”
    Get full text
    Article
  19. 2199
  20. 2200

    PHILDER: Lightweight Framework for Intelligent Phishing Detection on Resource-Limited Devices by Guilherme Dantas Bispo, Cesar Augusto Borges de Andrade, Gabriela Mayumi Saiki, Raquel Valadares Borges, Andre Luiz Marques Serrano, Geraldo Pereira Rocha Filho, Vinicius Pereira Goncalves

    Published 2025-01-01
    “…The increasing sophistication of phishing attacks represents a significant challenge to cybersecurity, particularly in the context of fraudulent emails crafted to deceive users and steal confidential information. …”
    Get full text
    Article