Showing 2,361 - 2,380 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 2361

    Zombies in Revolt: The Violent Revolution of American Cinematic Monsters by Dunja Opatić

    Published 2014-06-01
    “…The characteristics of the zombies and the meaning ascribed to them transform over time but they also maintain a continuity with a difference with the previous expressions of the monstrous. …”
    Get full text
    Article
  2. 2362

    Effect of Plyometric Exercises on Balance Ability for Ashihara Karate Practitioners by Daniel Mocioaca

    Published 2024-07-01
    “…Ashihara Karate is a contemporary, full-contact fighting style that emphasises Sabaki, utilising the opponent's footwork and attacking techniques to gain an advantage by positioning oneself in the opponent's "blind" spot. …”
    Get full text
    Article
  3. 2363

    Research on A Lattice-Based Fuzzy Signature and Bimodal Gaussian by Jinxin Huang, Jie Cai, Fenghe Wang, Junquan Wang

    Published 2025-01-01
    “…Fuzzy signatures differ from standard signature schemes in that they use noisy strings as keys, thereby eliminating the need for user-specific auxiliary data. …”
    Get full text
    Article
  4. 2364

    Perch Selection by Three Cooccurring Species of Celithemis (Odonata: Libellulidae): Testing for a Competitive Hierarchy among Similar Species by Wade B. Worthen, Parker H. Morrow

    Published 2016-01-01
    “…We conclude that even small differences in body size may contribute to niche partitioning in perch selection.…”
    Get full text
    Article
  5. 2365

    Mating System of Free-Ranging Dogs (Canis familiaris) by S. K. Pal

    Published 2011-01-01
    “…Both males and females differed in their degree of attractiveness to the opposite sex. …”
    Get full text
    Article
  6. 2366

    Social Welfare & Inequality: The U.S. by Michael Reisch

    Published 2019-01-01
    “…In some cities, the difference in life expectancy varies as much as 30 years between residents of rich and poor neighborhoods.  …”
    Get full text
    Article
  7. 2367

    Research on trust measure and management for open distributed systems based on dynamic grouping by Li-ming JIANG, Zhi-ming LIU, Kun ZHANG, Jian XU, Hong ZHANG

    Published 2015-01-01
    “…A stability enhanced group-based trust model(denoted by SEGTM) for open distributed systems was presented to solve the problems of not sufficiently maintaining trust relation between peers due to the dynamic changes in trust network topology.First,the formation and dynamic management of peers' group were depicted in detail,including nodes gathered into the same group with similar interests,competition for group head and nodes within the group leave in active or passive ways.Then,the trust relation in proposed model was categorized into three kinds and subsequently each solution for these kinds was also put forward.So,the problems of decline in accuracy of computational trust degree between peers due to the difference of peers' interests and low probability of repeated transactions between them were addressed.Simulation results show that the model not only enhances the fairness and stability in response to dynamic changes in network topology,but also can effectively resist the attacks of malicious nodes.…”
    Get full text
    Article
  8. 2368

    Co-similar malware infection patterns as a predictor of future risk. by Amir Yavneh, Roy Lothan, Dan Yamin

    Published 2021-01-01
    “…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
    Get full text
    Article
  9. 2369

    Constructing an Ecological Spatial Network Optimization Framework from the Pattern–Process–Function Perspective: A Case Study in Wuhan by An Tong, Yan Zhou, Tao Chen, Zihan Qu

    Published 2025-07-01
    “…The “pattern–function” scenario strengthens core area connectivity (24% and 4% slower degradation under targeted/random attacks, respectively), enhancing resistance to general disturbances, whereas the “pattern–process” scenario increases redundancy in edge transition zones (21% slower degradation under targeted attacks), improving resilience to targeted disruptions. …”
    Get full text
    Article
  10. 2370

    A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security by Junjun Li, Yanyan Ma, Jiahui Bai, Congming Chen, Tingting Xu, Chi Ding

    Published 2025-07-01
    “…Compared with the traditional theoretical framework of the federated learning, DFF-FL first dynamically fuses the deep feature representation of each node through the transformer attention module to realize the fine-grained cross-node feature interaction in a heterogeneous data environment, thereby eliminating the performance degradation caused by the difference in feature distribution. Secondly, based on the final loss <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mrow><mi>L</mi></mrow><mrow><mi>A</mi><mi>E</mi></mrow></msub><mfenced open="(" close=")" separators="|"><mrow><mi>X</mi><mo>,</mo><mover accent="true"><mrow><mi>X</mi></mrow><mo>^</mo></mover></mrow></mfenced></mrow></semantics></math></inline-formula> index of each node, an adaptive weight adjustment mechanism is used to make the nodes with excellent performance dominate the global model update, which significantly improves robustness against complex attacks. …”
    Get full text
    Article
  11. 2371

    Prothrombotic Biomarkers Are Not Altered by Wood Smoke: A Pilot Controlled Exposure Study by Dre' Von A. Dobson, Lori A. Holle, Kohei Tatsumi, Meghan E. Rebuli, Nigel Mackman, Alisa S. Wolberg, Ilona Jaspers

    Published 2025-07-01
    “…ABSTRACT Inhalation of wood smoke (WS) has been associated with increased risk of cardiovascular events, including heart attacks and strokes, both of which are caused in part by the thrombotic occlusion of blood vessels. …”
    Get full text
    Article
  12. 2372

    Clinical efficacy of simethicone combined with bifidobacterium in the treatment of pediatric aerophagia by Ping He, Fangqi Hu, Le Wang

    Published 2025-08-01
    “…Moreover, it is prone to recurrent attacks. Simethicone oil, as a safe and new type of drug, can be used for treatment.To evaluate the clinical efficacy of simethicone combined with bifidobacterium for the treatment of pediatric aerophagia.MethodsThis study evaluated two treatment approaches for aerophagia. …”
    Get full text
    Article
  13. 2373

    The Role of Stigma in LGBTQIA+ Youth in Rural and Urban Areas by Erin Stevenson, Gregory R. Sandman, James McGinn

    Published 2024-09-01
    “…Rural youth reported experiencing more discrimination or attacks at school and fewer LGBTQIA+ school resources but slightly higher family support. …”
    Get full text
    Article
  14. 2374

    Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce by Binh Tran, Karen C. Benson, Lorraine Jonassen

    Published 2023-10-01
    “…An un-tapped resource to combat these attacks lies in the students of the secondary educational system. …”
    Get full text
    Article
  15. 2375

    Atypical hemolytic uremic syndrome due to factor H autoantibody by Arife Uslu-Gökceoğlu, Cagla Serpil Doğan, Elif Comak, Mustafa Koyun, Sema Akman

    Published 2013-02-01
    “…A 7.5-year-old girl with recurrent attacks of HUS had low C3 level. We initiated plasmapheresis treatment. …”
    Get full text
    Article
  16. 2376

    Enhanced related-key differential neural distinguishers for SIMON and SIMECK block ciphers by Gao Wang, Gaoli Wang

    Published 2024-11-01
    “…In order to select input differences efficiently, we introduce a method that leverages weighted bias scores to approximate the suitability of various input differences. …”
    Get full text
    Article
  17. 2377

    Peach Rust (Transchelia spp.) by Daniel Mancero-Castillo, Ali Sarkhosh, Courtney Ligon, Mercy A. Olmstead, Philip F. Harmon

    Published 2018-07-01
    “… Peach rust is a fungal disease commonly caused by Tranzchelia discolor (Fuckel) Tranzschel & Litvinov that attacks plants in the genus Prunus, including peach, nectarine, almond, plum, apricot, and cherry. …”
    Get full text
    Article
  18. 2378

    Changes in Arterial Wall Stiffness in Patients with Obesity and Paroxysmal Form of Atrial Fibrillation by V. I. Podzolkov, A. I. Tarzimanova, A. E. Bragina, K. K. Osadchiy, R. G. Gataulin, K. A. Oganesyan, N. V. Lobova, Z. B. Jafarova

    Published 2020-09-01
    “…A positive direct relationship was found between CAVI index and the frequency of AF attacks during the year: r=0.782 (p=0.001).Conclusion. …”
    Get full text
    Article
  19. 2379

    STEMI under fire: evaluating management and challenges in a warzone amidst the 2023 Israeli conflict by Vladimir Zeldetz, Sagi Shashar, Carlos Cafri, David Shamia, Tzachi Slutsky, Noa Fried Regev, Naif Abu Abed, Dan Schwarzfuchs

    Published 2025-05-01
    “…Correlation analysis between rocket attacks and STEMI cases was not statistically significant. …”
    Get full text
    Article
  20. 2380

    Apis mellifera adansonii Is the Most Defensive Honeybee in Uganda by Kasangaki Patrice, Nyamasyo N. Gideon, Ndegwa N. Paul, Angiro Christopher, Kajobe Robert

    Published 2018-01-01
    “…The number of honeybees attacking the researchers’ protective gear within one minute of disturbance was recorded per colony and analyzed. …”
    Get full text
    Article