-
261
AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities
Published 2025-01-01“…However, the rising prevalence of jamming attacks, characterized by the intentional disruption of communications through interference signals, presents a significant challenge to the security of VANETs and, consequently, public safety. …”
Get full text
Article -
262
Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks
Published 2024-01-01“…During the years 2018-2024, considerable advancements have been achieved in the use of deep learning for side channel attacks. The security of cryptographic algorithm implementations is put at risk by this. …”
Get full text
Article -
263
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01“…It is also possible for further variants of such an adverse attack to emerge and incur a different and significant impact on RPL networks. …”
Get full text
Article -
264
Efficacy and safety of Russian tableted rizatriptan 10 mg in the treatment of migraine attacks in clinical practice
Published 2024-08-01“…Triptans are a targeted therapy for acute migraine attacks. They are recommended for the treatment of severe attacks when non-specific analgesics are not effective. …”
Get full text
Article -
265
Distinguishing stroke from transient ischemic attack using plaque characteristics and arterial transit artifacts
Published 2025-03-01“…PurposeWe aimed to investigate the differences in plaque characteristics and hemodynamics in patients with ischemic stroke and transient ischemic attack (TIA), comparing the diagnostic abilities of high-resolution magnetic resonance imaging (HRMRI) and arterial spin labeling (ASL) for ischemic stroke.MethodsThis retrospective analysis included patients who underwent HRMRI and ASL between October 2020 and December 2023. …”
Get full text
Article -
266
Modeling of strike drone missions for conducting wave attacks in conditions of enemy anti-drone actions
Published 2025-02-01“…The actual problem of studying military logistics actions to form missions of a swarm of attack drones for conducting massive attacks on enemy targets is formed and solved. …”
Get full text
Article -
267
Impacts of dry swing intervention on bat speed and attack angle: an analysis of core intervention factors
Published 2025-06-01“…IntroductionThis study investigated the effects of dry swing intervention using differently weighted baseball bats on bat speed and attack angles during actual swing, simulating warm-up routines. …”
Get full text
Article -
268
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
269
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
270
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
271
Study on correction technology of aircraft angle-of-attack signal based on estimation of side-slip angle
Published 2025-06-01“…The inconsistency of the local airflow on both sides of the nose will cause the difference of the angle-of-attack signal.The signal-monitoring voting logic of the flight control system will judge the angle-of-attack signal and make the angle-of-attack availability decrease. …”
Get full text
Article -
272
The Effect of Angle of Attack and Flow Conditions on Turbulent Boundary Layer Noise of Small Wind Turbines
Published 2016-11-01“…For the VAWT with the local angle of attack ranging from 4◦ to 20◦ the acoustic spectrum varies within low and broadband frequency bands 2 Hz – 20 kHz.…”
Get full text
Article -
273
Intravenous methylprednisolone versus oral prednisone for initial attacks of optic neuritis, A review of evidence
Published 2005-06-01“…Most patients retained good to excellent vision following an attack of optic neuritis regardless of treatment received. …”
Get full text
Article -
274
Active disturbance rejection control for load frequency control systems under uncertainty and resonance attacks
Published 2025-08-01“…The necessity of addressing the issue of counteracting cyber-attacks is of paramount importance to the power grid system. …”
Get full text
Article -
275
Rapid analysis of shipworm attack - a novel digital tool for assessing shipworm damage (RANDA)
Published 2025-09-01Get full text
Article -
276
Long‐Term Incidence of Dementia Following Transient Ischemic Attack: A Longitudinal Cohort Study
Published 2025-07-01“…Background The association between transient ischemic attack (TIA) and dementia is incompletely characterized. …”
Get full text
Article -
277
Detection of Varicella Zoster Virus Reactivation in Cerebrospinal Fluid in Ischemic Stroke or Transient Ischemic Attack
Published 2025-07-01“…The cause of AIS and transient ischemic attack was classified using the SSS‐TOAST (Stop Stroke Study‐Trial of ORG 10172 in Acute Stroke Treatment) criteria. …”
Get full text
Article -
278
Multitier ensemble classifiers for malicious network traffic detection
Published 2018-10-01“…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
Get full text
Article -
279
Multitier ensemble classifiers for malicious network traffic detection
Published 2018-10-01“…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
Get full text
Article -
280
Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis
Published 2025-01-01“…This detection is facilitated through time series analysis at 25 and 50 s intervals to build a profile of data errors and distribution to predict the probability of such attacks. To evaluate the algorithm's effectiveness, five different test datasets depicting four types of spoofing scenarios—turn-by-turn, overshoot, stop, and multiple small biased attacks—were created using data from the publicly accessible Honda Research Institute Driving Dataset (HDD). …”
Get full text
Article