Showing 2,201 - 2,220 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 2201

    Sphingosine-1-Phosphate Modulation in Neurological Disorders: Insights from MS and Stroke by Briana Maktabi, Faheem Shehjar, Zachary Senger, Logan Kountz, Syed Hasan, Kenan Maaieh, Kylee Hoersten, Jovana Duric, Zahoor A. Shah

    Published 2025-04-01
    “…Multiple sclerosis is a chronic autoimmune disease in which the immune system attacks the protective sheath or myelin that covers nerve fibers, impacting the brain’s ability to communicate with other areas of the body. …”
    Get full text
    Article
  2. 2202

    Strategy for Construction and Improvement of 4R Resilience Evaluation Model for Coastal Cities by Qixiang QIN, Weiping ZHANG, Yasen YIN

    Published 2025-03-01
    “…These city samples have the conditions to establish a generous coastal buffer zone, which can prevent coastal storm surge from attacking the urban core area in the first time. In addition, the clear separation of internal clusters through green belt can greatly enhance their retention and filtration of rain and flood. …”
    Get full text
    Article
  3. 2203

    Genome-Wide Identification of the Sulfate Transporter Gene Family Reveals That <i>BolSULTR2;1</i> Regulates Plant Resistance to <i>Alternaria brassicicola</i> Through the Modulatio... by Guize Wu, Yunhua Ding, Ning Li, Hongji Zhang, Ning Liu

    Published 2025-04-01
    “…Sulfate transporters (SULTRs) are key players that regulate sulfur acquisition and distribution within plants, thereby influencing cellular redox hemostasis under pathogen attacks, such as <i>Alternaria brassicicola</i> (<i>Ab</i>). …”
    Get full text
    Article
  4. 2204

    Health IoT Threats: Survey of Risks and Vulnerabilities by Samaneh Madanian, Tserendorj Chinbat, Maduka Subasinghage, David Airehrour, Farkhondeh Hassandoust, Sira Yongchareon

    Published 2024-10-01
    “…This can enhance healthcare IoT trust and reliability, reduce the risks of security and privacy issues and attacks, and ultimately improve healthcare delivery quality and safety.…”
    Get full text
    Article
  5. 2205

    Catastrophic famine in Gaza: Unprecedented levels of hunger post-October 7th. A real population-based study from the Gaza Strip. by MoezAlIslam Faris, Ayman S Abutair, Reham M Elfarra, Nida A Barqawi, Amal M Firwana, Rawan M Firwana, Madleen M AbuHajjaj, Shaimaa A Shamaly, Samar S AbuSamra, Hanan S Bashir, Noor A Abedalrahim, Noor A Nofal, Mhran K Alshawaf, Rania M Al Shatali, Kafa I Ghaben, Moayad I Alron, Sara S Alqeeq, Aya O Al-Nabahin, Reem A Badawi

    Published 2025-01-01
    “…The military escalation on October 7th exacerbated existing vulnerabilities, notably food security and hunger, with an estimated 85750 deaths due to Israeli attacks, representing about 8% of the 2.34 million population. …”
    Get full text
    Article
  6. 2206

    Undeath in Paradise: The Humanity of the Zombie in (Religious) Utopias by Madelon Hoedt

    Published 2015-06-01
    “…These creatures may have looked human, but were unmistakably evil, attacking and feeding on anything they could find. …”
    Get full text
    Article
  7. 2207

    The influence of Simvastatin and Korargin on the clinical course of coronary heart disease, body weight and distribution of adipose tissue in patients with type 2 diabetes mellitus... by E. A. Pogrebniak

    Published 2013-06-01
    “…The most prominent clinical effect on major clinical indicators of CHD (the average number of angina attacks per day, the average duration of angina attacks and nitroglycerin daily dose) in CHD patients with type 2 DM was provided with the combination of Simvastatin and Korargin on the background of the conventional treatments, due to the combined action of two drugs with different mechanisms of actions synergistically improving endothelial function. …”
    Get full text
    Article
  8. 2208

    Effect of Education Using Animation on the Ability to Develop Personal Skills for Early Stroke Detection and Initial Treatment at Home by Yoany Maria Vianney Bita Aty, Florentianus Tat, Gadur Blasius, Irfan Irfan, Pius Selasa, Trifonia Sri Nurwela

    Published 2025-06-01
    “…Results: The results of the logistic regression test obtained a knowledge value of 0.222> 0.05 (alpha) so that there was no effect of education using animation on knowledge for early detection of stroke attacks and initial handling at home, but on the skill variable obtained a significance value of 0.001 <0.05 (alpha) so that there was an effect of education using animation on the ability to develop personal skills on skills for early detection of stroke attacks and initial handling at home.  …”
    Get full text
    Article
  9. 2209

    Resilience Enhancement Strategies for Energy Systems in the Face of Natural Calamities and Cyber Threats: A Comprehensive Review by Mostafa Shabanian-Poodeh, Rahmat-Allah Hooshmand, Miadreza Shafie-Khah, Pierluigi Siano

    Published 2025-01-01
    “…This paper provides an exhaustive review of existing research on the resilience of energy systems, introducing a visual framework for comparing different studies and facilitating easy understanding through multiple figures. …”
    Get full text
    Article
  10. 2210

    Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM by Kais Belwafi, Abdulhadi Shoufan, Mariam Alsafi, Ashfaq Ahmed, Kyusuk Han

    Published 2024-01-01
    “…Zero-Trust security has received significant attention because of its focus on the need to constantly verify rather than trust, especially as attackers use increasingly sophisticated methods. It is now critical to ensure the security and authenticity of Integrated Circuits (ICs), particularly in important systems like drones or Internet of Things devices. …”
    Get full text
    Article
  11. 2211

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…These face forgery techniques can cause problems such as fraud and social engineering attacks in facial recognition and identity verification areas. …”
    Get full text
    Article
  12. 2212

    Impact of Dietary Patterns on Migraine Management: Mechanisms of Action and Recent Literature Insights by Vahideh Behrouz, Elnaz Hakimi, Elias Mir

    Published 2025-07-01
    “…However, fasting or skipping meals aggravates migraine attacks. Overall, these dietary approaches might play a main role in different cellular pathways, including improving mitochondrial function, neuroprotection, regulating vascular tone, inhibiting oxidative stress and neuroinflammation, and reducing levels of calcitonin gene‐related peptides that are involved in the pathogenesis of migraine. …”
    Get full text
    Article
  13. 2213

    LIoTning: A Peer-Supervised Payment Channel Approach for Secure Micropayments in IoT Ecosystem by Erfan Bahrami, Amir M. Aghapour, Morteza Amini

    Published 2025-01-01
    “…We formally prove the security of the LIoTning protocol in the Universal Composability (UC) framework, analyze its resilience against broadcasting revoked states, collusion, and ransom attacks, and implement the proposed model to evaluate its performance under different scenarios. …”
    Get full text
    Article
  14. 2214

    Main threats to the state’s interests in the sphere of information security of Ukraine by O. Yu. Starostin

    Published 2024-03-01
    “…For the purpose of more comprehensive understanding of the main threats to the interests of the state in the field of information security of Ukraine, the following threats are identified: the use of information influence to distort political opinion and attitudes of the population to certain phenomena, processes, public authorities, political forces and individuals; imperfect regulatory and legal support for the information security of the state; deliberate distortion of information at the level of state leaders and diplomatic representatives and their negative impact on the opinion of the international community; insufficient participation of the Ukrainian population in countering information attacks; insufficient institutional and organisational support for information security education and the formation of an information security culture in society. …”
    Get full text
    Article
  15. 2215

    Identifying Influential Nodes Based on Evidence Theory in Complex Network by Fu Tan, Xiaolong Chen, Rui Chen, Ruijie Wang, Chi Huang, Shimin Cai

    Published 2025-04-01
    “…Firstly, Dempster–Shafer evidence theory quantifies uncertainty through its basic belief assignment function and combines evidence from different information sources, enabling it to effectively handle uncertainty. …”
    Get full text
    Article
  16. 2216

    Optimizing antithrombotic therapy following mitral valve repair: a comprehensive network meta-analysis by Mohamed Ibrahim Gbreel, Mohamed Hamouda Elkasaby, Marwa Hassan, Marc Ulrich Becher, Mahmoud Balata

    Published 2025-08-01
    “…Thromboembolic events did not significantly differ among interventions. Transient ischemic attacks and stroke outcomes were similar between SAPT and vitamin K antagonists (VKA). …”
    Get full text
    Article
  17. 2217

    Illustrating the influence of anodic/cathodic second-phases on dissolution mode via Mg–Ca–Sn alloy anodes for primary Mg-air cells by Bowen Yu, Haitao Jiang

    Published 2024-11-01
    “…Two second-phases with an opposite potential difference to the α-Mg matrix may affect the discharge mechanism of magnesium (Mg) anodes for primary Mg-air cells through different micro-galvanic behaviors. …”
    Get full text
    Article
  18. 2218

    PINTURAS RUPESTRES DO SÍTIO ARQUEOLÓGICO LETREIRO DA PEDRA RISCADA: Micromorfologia, Composição Química e Espécies Ferruginosas dos Filmes Pictóricos by José de Jesus Nunes Júnior, Luis Carlos Duarte Cavalcante

    Published 2020-06-01
    “…The chemical composition showed a high proportion of iron in the pictorial films, compared to that found in the rocky substrate, and pointed out that the mineral salts are attacking the archaeological paints and removing the iron. …”
    Get full text
    Article
  19. 2219

    A study of government regulation’s strategy for solving the algorithmic black-box puzzle of digital platforms: a complex network-based perspective by Gehui Zhu, Mingliang Tang, Xiao Jian, Tong Mu

    Published 2025-03-01
    “…In addition, small-world models can be used to assess the robustness of regulatory measures in different scenarios, and to study the stability and information flow capability of the network in the face of node failure or attacks, reflecting the interaction between users and platforms. …”
    Get full text
    Article
  20. 2220

    Efficacy evaluation of allergen-specific immunotherapy in children with asthma: a systematic review and meta-analysis by Kangping Wu, Suling Wu, Lina Wang

    Published 2025-07-01
    “…However, no significant difference was found in VAS score and FEV1% (SMD=-1.77, 95% CI [-3.76;0.22]; SMD = 0.51, 95% CI [-0.38;1.40]). …”
    Get full text
    Article