Showing 221 - 240 results of 2,541 for search 'different attack', query time: 0.12s Refine Results
  1. 221

    SAR-PATT: A Physical Adversarial Attack for SAR Image Automatic Target Recognition by Binyan Luo, Hang Cao, Jiahao Cui, Xun Lv, Jinqiang He, Haifeng Li, Chengli Peng

    Published 2024-12-01
    “…In the physical world, we achieved an average fooling rate of up to 97.87% for these objects, with a certain degree of transferability across the six different network architectures. To the best of our knowledge, this is the first work to implement physical attacks in a full physical simulation condition. …”
    Get full text
    Article
  2. 222
  3. 223

    Distribution and Attack Rate of Spodoptera frugiperda on Maize in Sijunjung District, West Sumatera Province by Syafria Syafria, Reflinaldon Reflinaldon, Novri Nelly

    Published 2023-07-01
    “…The highest attack was found in Nagari Guguak (88.7%). The high or low rate of attacks is influenced by differences in varieties, planting ages, and maize cultivation techniques. …”
    Get full text
    Article
  4. 224

    IEWNet: Multi-Scale Robust Watermarking Network Against Infrared Image Enhancement Attacks by Yu Bai, Li Li, Shanqing Zhang, Jianfeng Lu, Ting Luo

    Published 2025-05-01
    “…Infrared (IR) images record the temperature radiation distribution of the object being captured. The hue and color difference in the image reflect the caloric and temperature difference, respectively. …”
    Get full text
    Article
  5. 225

    The effect of sertraline with or without propranolol on panic attacks in women: a controlled clinical trial by Sahar Rouhzendeh, Zahra Mousavi, Sepideh Mashayekh-Amiri, Elnaz Shaseb, Seyedeh Tahereh Mirmolaei, Mojgan Mirghafourvand

    Published 2025-07-01
    “…After the intervention, the mean score for the severity of panic attack symptoms in the sertraline with propranolol group was 6.6 (SD: 4.4), compared to 13.1 (SD: 5.4) in the sertraline with propranolol placebo group, indicating a statistically significant difference (P < 0.001). …”
    Get full text
    Article
  6. 226

    THE FACE OF EVIL : The Muslim Beard Representation in Hollywood Movies in Post 9/11 Attacks by Fatima Zohra MECHERI

    Published 2020-07-01
    “…Focusing on the scale of the Muslim body, the present article probes the American motion picture industry (mainly Hollywood) representation of Muslim beard as a symbol of difference and danger in movies released in the post 9/11 attacks. …”
    Get full text
    Article
  7. 227

    Effectiveness of Educational Program on Nurses Knowledge Toward Rehabilitation for Patients with Cardiac Heart Attack by Hakema S. Hassan, Ahmed A. Alawee Naseer

    Published 2015-08-01
    “…Results: The results of the study showed that the effectiveness of educational program regarding nurses knowledge toward cardiac rehabilitation phase one for patients with heart attack. Conclusions: The study concluded that the nurses working in Coronary Care Unit having the minimum level of information toward cardiac rehabilitation phase one for patients with cardiac attack. …”
    Get full text
    Article
  8. 228
  9. 229

    Factors affecting fear of attacks in patients with episodic migraine – a cross-sectional study by Emily Kaske, Juliana Pradela, Melanie Otto, Luise John, Nicole Derner, Kerstin Luedtke

    Published 2025-05-01
    “…Therefore, the aim of this study was to identify factors contributing to the fear of attacks in patients with episodic migraine and to investigate the differences between individuals with low and high attack anxiety. …”
    Get full text
    Article
  10. 230

    Panic Attacks in Patients with Supraventricular Tachycardia: Problems of Differential Diagnosis and Impact on Quality of Life by D. A. Tsaregorodtsev, P. A. Shelukha, L. V. Romasenko, M. M. Beraya, A. V. Sokolov

    Published 2022-01-01
    “…The study included patients with SVT and heart attacks due to sinus tachycardia in the context of somatoform autonomic disorder (SAD). …”
    Get full text
    Article
  11. 231

    ANTIHYPERTENSIVE EFFICACY OF CHRONOPHARMACOTHERAPEUTICAL APPROACH TO ARTERIAL HYPERTENSION IN POST TRANSIENT ISCHEMIC ATTACK PATIENTS by V. V. Skibitsky, S. V. Opolskaya, A. V. Fendrikova

    Published 2018-02-01
    “…To assess antihypertensive efficacy of various 24-hour regimens of antihypertensive drugs prescription and the influence on 24-hour profile of blood pressure (BP) and aortic pressure, in systemic hypertension patients post transient ischemic attack.Material and methods. Totally, 174 patients were included, with grade 1-2 hypertension and previous non-effective treatment; who during the previous 4 weeks had transient ischemic attack. …”
    Get full text
    Article
  12. 232

    Energy Evolution Characteristics and Performance Parameter Degradation of Rubber-Mixed Concrete in Sulfate Attack Environment by Xiu-ling Chen

    Published 2022-01-01
    “…The degradation degree was measured from the effective porosity, relative dynamic elastic modulus, SO42− concentration, and SEM microstructure observation after different attack times. The energy analysis method is used to study the evolution law of total strain energy, elastic strain energy, and dissipated strain energy of NC and RC in the process of deformation and failure after different attack times, and the influence of sulfate attack on concrete is explored from the perspective of energy. …”
    Get full text
    Article
  13. 233

    The pivotal role of software defined networks to safeguard against cyber attacks: a comprehensive review by Ahmed Aljughaiman, Seetah Almarri

    Published 2025-04-01
    “…Different types of threats that focus on SDN layers are categorized and how they impact network security while suggesting different ways to address them. …”
    Get full text
    Article
  14. 234

    Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams by Ivan Nedyalkov

    Published 2025-03-01
    “…It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks. The studied VoIP platform is the Asterisk FreePBX. …”
    Get full text
    Article
  15. 235

    Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism by Yuancheng LI, Hao LUO, Xinyu WANG, Jiexuan YUAN

    Published 2024-03-01
    “…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
    Get full text
    Article
  16. 236
  17. 237

    Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process by Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov

    Published 2024-01-01
    “…By evaluating three neural networks with different architectures, we subject them to six types of adversarial attacks and explore five different defense methods. …”
    Get full text
    Article
  18. 238

    Invulnerability Simulation of Urban Agglomeration Passenger Transport Network under Incomplete Information Attack Strategy by Chengbing Li, Zhicheng Yang, Yuan Zhu

    Published 2021-01-01
    “…As a scale-free network, urban agglomeration transportation network shows strong robustness to random attacks and exhibits vulnerability to deliberate attacks. …”
    Get full text
    Article
  19. 239

    Website defense strategy selection method based on attack-defense game and Monte Carlo simulation by Hao WU, Jiulun FAN, Chengzhe LAI, Jianhua LIU

    Published 2018-08-01
    “…Aiming at the selection of security defense strategy in network attack-defense,the dynamic change process of mutual influence between attack-defense strategy was studied.Based on the game process of both offense and defense,the attack-defense game model was constructed,the attack process of the attacker based on Monte Carlo simulation was simulated and the attacker’s best attack utility was obtained,so as to calculate the best defensive utility of the defender.In order to maximize the effectiveness of network security defense,the optimal defense strategy under limited resources was implemented.Simulation experiments verify the effectiveness of the proposed method and analyze the influence of different parameter settings on the selection of defense strategy.…”
    Get full text
    Article
  20. 240

    Experiment Analysis of Concrete’s Mechanical Property Deterioration Suffered Sulfate Attack and Drying-Wetting Cycles by Wei Tian, Nv Han

    Published 2017-01-01
    “…Changes in ions in the solution at different sulfate attack periods were tested by inductively coupled plasma (ICP). …”
    Get full text
    Article