-
361
Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms
Published 2025-08-01“…Abstract The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. …”
Get full text
Article -
362
Subjective Cognitive Impairment, Depressive Symptoms, and Fatigue after a TIA or Transient Neurological Attack: A Prospective Study
Published 2017-01-01“…We prospectively investigated their prevalence and course after a transient ischemic attack (TIA) or nonfocal transient neurological attack (TNA) and the association with diffusion-weighted imaging (DWI) lesions. …”
Get full text
Article -
363
Detection of cyber attacks in electric vehicle charging systems using a remaining useful life generative adversarial network
Published 2025-03-01“…To test the technique’s effectiveness, we assess this approach on attack scenarios, including network and host attacks on the EV charger (Electric Vehicle Supply Equipment—EVSE) in idle and charging states. …”
Get full text
Article -
364
Massed practice, distributed practice, and motor ability: Which one affects fencing attack skills using moving targets?
Published 2024-10-01“…The results of the research found (1) there was a significant difference in influence between massed practice and distributed practice learning methods on fencing martial arts attack skills (F = 72.654; p < .01), (2) there was no significant difference in learning outcomes for fencing martial arts attack skills between groups that have high motor ability versus low motor ability (F = 3.144; p > .05), and (3) there was no significant interaction between massed practice, distributed practice, and motor ability learning methods with fencing attack skills (F = .0001; p > .05). …”
Get full text
Article -
365
Abstract 262: National Trends of 90‐day Readmission Rates and Etiologies among Diabetics following Transient Ischemic Attack
Published 2023-11-01“…Introduction Transient Ischemic Attack (TIA) is a common neurologic condition characterized by temporary, focal cerebral ischemia that results in reversible neurological deficits without tissue infarction. …”
Get full text
Article -
366
THE EXPRESSIVE SPEECH ACT USED BY ANIES RASYID BASWEDAN AND RECEP TAYYIP ERDOGAN AS THE REACTION OF THE ATTACKS IN CHRISTCHURCH NEW ZEALAND
Published 2020-06-01“…This study attempts to compare between Anies Rasyid Baswedan and Recep Tayyip Erdogan in terms of speech act as their reaction of the attacks in Christchurch New Zealand particularly: a) the kinds of expressive speech act used; b) the intended meaning of expressive speech act; and c) the personality differences between them seen the use of speech act. …”
Get full text
Article -
367
-
368
Colchicine for acute arthritis attacks prevention in patients with gout during urate-lowering therapy (results of a pilot study)
Published 2021-08-01“…The presence of arthritis attacks was recorded by doctor or patient using a validated questionnaire. …”
Get full text
Article -
369
-
370
Prediction of hereditary angioedema during attacks in patients with recurrent angioedema: Awareness at a glance with the hereditary angioedema prediction score
Published 2025-04-01“…Abstract Background/Aim Misdiagnosis of hereditary angioedema (HAE) leads to inappropriate management of the attacks. A scoring system that anticipates diagnosis can be beneficial for clinicians who are unfamiliar with angioedema. …”
Get full text
Article -
371
Related Risk Factors That Predict Moderate to Severe Asthma Attack in Children: Analysis Based on Logistic Regression and Decision Tree
Published 2025-07-01“…Related risk factors of moderate to severe asthma attack in children were analyzed by univariate logistic regression, and then multivariate logistic regression and decision tree model were obtained.Results: The results of univariate logistic regression showed that there were significant differences between the two groups in age, medical history, allergy history, family history, C-reactive protein (CRP), neutrophil percentage (NEU%), Mycoplasma pneumoniae (MP) infection, Rhinovirus (RV) infection (all p < 0.05). …”
Get full text
Article -
372
Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT)
Published 2025-05-01“…The technique is fine-tuned for eight-class and two-class classifications, supporting different attacks using the IoTCIC2023 dataset and SelectKBest feature selection. …”
Get full text
Article -
373
Deterioration Regularity of Sodium Sulfate Solution Attack on Cemented Coal Gangue-Fly Ash Backfill under Drying-Wetting Cycles
Published 2020-01-01“…To research the properties of cemented coal gangue-fly ash backfill (CGFB) exposed to different concentrations of sodium sulfate solutions under drying-wetting cycles, the mass changes, uniaxial compressive strengths, sulfate ion contents at different depths, and microstructures of CGFB samples were measured in this study. …”
Get full text
Article -
374
MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack
Published 2023-05-01“…In order to detect this attack, the present study explores new detection features and establishes a sample set of attack features with different granularities, and accordingly, the Pearson coefficient is used to validate the correlation between the proposed features and the network states. …”
Get full text
Article -
375
A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks
Published 2025-07-01“…MRFCO-ZTS improves the accuracy of attacker detection while maintaining secure data exchange between authenticated satellites. …”
Get full text
Article -
376
Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics
Published 2023-01-01“…Second, under the effect of high-concealment attack, analyze the impact of the risk caused by its failure after it is transmitted to the physical space with different propagation probabilities. …”
Get full text
Article -
377
Attacks of <i>Kalotermes flavicollis</i> Fabricius (1793) and Associated <i>Aspergillus</i> Micheli ex Haller (1768) Species
Published 2024-11-01“…The yellow-necked dry-wood termite <i>Kalotermes flavicollis</i> (Fabricius, 1793) (Blattodea: Kalotermitidae) is an important pest that infests wood in Europe. An increase in attacks by <i>K. flavicollis</i> has been seen in buildings and in churches in Palermo (Italy), with attacks on both structural elements and artefacts. …”
Get full text
Article -
378
Multimedia privacy protection: an N-round cascaded cryptosystem based on merged multi-chaotic maps under various image attacks
Published 2025-05-01“…Based on the results from the standard database (Hlevkin, USA CANVAS), the proposed algorithm is robust and suitable for applications in noise/attack environments. As clarified by the results, the similarity of extracted images is 100% to the original plaintext in the absence of attacks, while in the presence of noise and attacks, the similarity remains above 99%. …”
Get full text
Article -
379
Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme
Published 2022-03-01“…A scheme based on packet lease and cryptographic techniques is used to prevent the wormhole attack in VANET…”
Get full text
Article -
380
The difference a Gender Makes
Published 2017-12-01“… Abstract This article demonstrates the different ways men and women are treated online and the consequences of coming under social media attack. …”
Get full text
Article