Showing 361 - 380 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 361

    Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms by S. Jayanthi, Swathi Sowmya Bavirthi, P. Murali, K. Vijaya Kumar, Hend Khalid Alkahtani, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-08-01
    “…Abstract The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. …”
    Get full text
    Article
  2. 362

    Subjective Cognitive Impairment, Depressive Symptoms, and Fatigue after a TIA or Transient Neurological Attack: A Prospective Study by Frank G. van Rooij, Nicole O. Plaizier, Sarah E. Vermeer, Bozena M. Góraj, Peter J. Koudstaal, Edo Richard, Frank-Erik de Leeuw, Roy P. C. Kessels, Ewoud J. van Dijk

    Published 2017-01-01
    “…We prospectively investigated their prevalence and course after a transient ischemic attack (TIA) or nonfocal transient neurological attack (TNA) and the association with diffusion-weighted imaging (DWI) lesions. …”
    Get full text
    Article
  3. 363

    Detection of cyber attacks in electric vehicle charging systems using a remaining useful life generative adversarial network by Hayriye Tanyıldız, Canan Batur Şahin, Özlem Batur Dinler, Hazem Migdady, Kashif Saleem, Aseel Smerat, Amir H. Gandomi, Laith Abualigah

    Published 2025-03-01
    “…To test the technique’s effectiveness, we assess this approach on attack scenarios, including network and host attacks on the EV charger (Electric Vehicle Supply Equipment—EVSE) in idle and charging states. …”
    Get full text
    Article
  4. 364

    Massed practice, distributed practice, and motor ability: Which one affects fencing attack skills using moving targets? by Ilham Kamaruddin, Hasmyati Hasmyati, Muh Adnan Hudain, Juhanis Juhanis, Tri Setyo Guntoro, Evi Sinaga, Ibrahim Ibrahim, Miftah Fariz Prima Putra

    Published 2024-10-01
    “…The results of the research found (1) there was a significant difference in influence between massed practice and distributed practice learning methods on fencing martial arts attack skills (F = 72.654; p < .01), (2) there was no significant difference in learning outcomes for fencing martial arts attack skills between groups that have high motor ability versus low motor ability (F = 3.144; p > .05), and (3) there was no significant interaction between massed practice, distributed practice, and motor ability learning methods with fencing attack skills (F = .0001; p > .05). …”
    Get full text
    Article
  5. 365

    Abstract 262: National Trends of 90‐day Readmission Rates and Etiologies among Diabetics following Transient Ischemic Attack by Ibrahim Laswi, Yousef Al‐Najjar, Maryam Arabi, Soha Dargham, Salman Al Jerdi, Charbel Abi Khalil

    Published 2023-11-01
    “…Introduction Transient Ischemic Attack (TIA) is a common neurologic condition characterized by temporary, focal cerebral ischemia that results in reversible neurological deficits without tissue infarction. …”
    Get full text
    Article
  6. 366

    THE EXPRESSIVE SPEECH ACT USED BY ANIES RASYID BASWEDAN AND RECEP TAYYIP ERDOGAN AS THE REACTION OF THE ATTACKS IN CHRISTCHURCH NEW ZEALAND by Badrut Tamam, Slamet Setiawan, Syafiul Anam

    Published 2020-06-01
    “…This study attempts to compare between Anies Rasyid Baswedan and Recep Tayyip Erdogan in terms of speech act as their reaction of the attacks in Christchurch New Zealand particularly: a) the kinds of expressive speech act used; b) the intended meaning of expressive speech act; and c) the personality differences between them seen the use of speech act. …”
    Get full text
    Article
  7. 367
  8. 368

    Colchicine for acute arthritis attacks prevention in patients with gout during urate-lowering therapy (results of a pilot study) by M. S. Eliseev, M. N. Chikina, O. V. Zhelyabina

    Published 2021-08-01
    “…The presence of arthritis attacks was recorded by doctor or patient using a validated questionnaire. …”
    Get full text
    Article
  9. 369
  10. 370

    Prediction of hereditary angioedema during attacks in patients with recurrent angioedema: Awareness at a glance with the hereditary angioedema prediction score by Semra Demir, Müge Olgaç, Osman Ozan Yeğit, İlkim Deniz Toprak, Mehmet Erdem Çakmak, Merve İğde Hormet, Nida Öztop, Pelin Korkmaz, Şule Kamacı Çelik, Deniz Eyice Karabacak, Nevzat Kahveci, Işıl Göğem İmren, Bircan Erden, Raif Coşkun, Pelin Karadağ, Derya Ünal, Aslı Gelincik

    Published 2025-04-01
    “…Abstract Background/Aim Misdiagnosis of hereditary angioedema (HAE) leads to inappropriate management of the attacks. A scoring system that anticipates diagnosis can be beneficial for clinicians who are unfamiliar with angioedema. …”
    Get full text
    Article
  11. 371

    Related Risk Factors That Predict Moderate to Severe Asthma Attack in Children: Analysis Based on Logistic Regression and Decision Tree by Li Q, Fan Y, Luo R, Hu J, Wang L, Ai T

    Published 2025-07-01
    “…Related risk factors of moderate to severe asthma attack in children were analyzed by univariate logistic regression, and then multivariate logistic regression and decision tree model were obtained.Results: The results of univariate logistic regression showed that there were significant differences between the two groups in age, medical history, allergy history, family history, C-reactive protein (CRP), neutrophil percentage (NEU%), Mycoplasma pneumoniae (MP) infection, Rhinovirus (RV) infection (all p &lt; 0.05). …”
    Get full text
    Article
  12. 372

    Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT) by Naveed Ahmed, Md Asri Ngadi, Abdulaleem Ali Almazroi, Nouf Atiahallah Alghanmi

    Published 2025-05-01
    “…The technique is fine-tuned for eight-class and two-class classifications, supporting different attacks using the IoTCIC2023 dataset and SelectKBest feature selection. …”
    Get full text
    Article
  13. 373

    Deterioration Regularity of Sodium Sulfate Solution Attack on Cemented Coal Gangue-Fly Ash Backfill under Drying-Wetting Cycles by Shaojie Chen, Zhen Zhang, Dawei Yin, Junbiao Ma

    Published 2020-01-01
    “…To research the properties of cemented coal gangue-fly ash backfill (CGFB) exposed to different concentrations of sodium sulfate solutions under drying-wetting cycles, the mass changes, uniaxial compressive strengths, sulfate ion contents at different depths, and microstructures of CGFB samples were measured in this study. …”
    Get full text
    Article
  14. 374

    MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack by Meng Yue, Silin Peng, Wenzhi Feng

    Published 2023-05-01
    “…In order to detect this attack, the present study explores new detection features and establishes a sample set of attack features with different granularities, and accordingly, the Pearson coefficient is used to validate the correlation between the proposed features and the network states. …”
    Get full text
    Article
  15. 375

    A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks by Sridhar Varadala, Hao Xu

    Published 2025-07-01
    “…MRFCO-ZTS improves the accuracy of attacker detection while maintaining secure data exchange between authenticated satellites. …”
    Get full text
    Article
  16. 376

    Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics by Shenjian Qiu, Jiaxuan Fei, Jian Wang

    Published 2023-01-01
    “…Second, under the effect of high-concealment attack, analyze the impact of the risk caused by its failure after it is transmitted to the physical space with different propagation probabilities. …”
    Get full text
    Article
  17. 377

    Attacks of <i>Kalotermes flavicollis</i> Fabricius (1793) and Associated <i>Aspergillus</i> Micheli ex Haller (1768) Species by Giulia Mirabile, Livio Torta, Marika Lamendola, Maria Concetta Rizzo, Barbara Manachini

    Published 2024-11-01
    “…The yellow-necked dry-wood termite <i>Kalotermes flavicollis</i> (Fabricius, 1793) (Blattodea: Kalotermitidae) is an important pest that infests wood in Europe. An increase in attacks by <i>K. flavicollis</i> has been seen in buildings and in churches in Palermo (Italy), with attacks on both structural elements and artefacts. …”
    Get full text
    Article
  18. 378

    Multimedia privacy protection: an N-round cascaded cryptosystem based on merged multi-chaotic maps under various image attacks by Tarek Srour, Ali M. El-Rifaie, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm, Bilel Neji

    Published 2025-05-01
    “…Based on the results from the standard database (Hlevkin, USA CANVAS), the proposed algorithm is robust and suitable for applications in noise/attack environments. As clarified by the results, the similarity of extracted images is 100% to the original plaintext in the absence of attacks, while in the presence of noise and attacks, the similarity remains above 99%. …”
    Get full text
    Article
  19. 379

    Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme by Shahjahan Ali, Parma Nand, Shailesh Tiwari

    Published 2022-03-01
    “…A scheme based on packet lease and cryptographic techniques is used to prevent the wormhole attack in VANET…”
    Get full text
    Article
  20. 380

    The difference a Gender Makes by Marceline Cook

    Published 2017-12-01
    “… Abstract This article demonstrates the different ways men and women are treated online and the consequences of coming under social media attack. …”
    Get full text
    Article