-
381
About the informatization object functioning stability assessment in conditions of computer attacks at exponential distribution law of time before the enemy’s impact
Published 2022-11-01“…The aim of the study is to develop a mathematical model for assessing the stability of the functioning of an informatization object (IO) in the conditions of computer attacks (CA), assuming that the laws of distribution of random variables before the enemy's impact and the recovery time are distributed exponentially.Method. …”
Get full text
Article -
382
Effectiveness and Safety of Nebulized Magnesium as Last Line Treatment in Adults with Acute Asthma Attack: A Systematic Review and Meta-Analysis
Published 2024-04-01“…This review evaluates the effectiveness and safety of nebulized magnesium compared to standard therapy (Beta Agonist, Anticholinergic, Corticosteroid) in adults with acute asthma attacks. Methods: The protocol has been registered in PROSPERO. …”
Get full text
Article -
383
Self-monitoring of blood pressure following a stroke or transient ischaemic attack (TASMIN5S): a randomised controlled trial
Published 2024-12-01“…The planned primary outcome was difference in clinic measured systolic BP 12 months from randomisation but was not available following early study termination due to withdrawal of funding during the COVID-19 pandemic. …”
Get full text
Article -
384
A new performance test to evaluate the sulfate resistance of concrete by tensile strength measurements
Published 2022-03-01“…Based on the results a performance-oriented test method could be defined which considers not only the chemical, but also the physical resistance of a concrete against sulfate attack. The method was verified by 23 concretes with different cements or cement fly ash combinations and additional field tests. …”
Get full text
Article -
385
A Network Traffic Classification Method for Class-Imbalanced Data
Published 2015-06-01“…It is very common that flow distribution of class is not uniform in attack traffic. It wi11 lead to a 1ow classification accuracy in network intrusion detection. …”
Get full text
Article -
386
Cybersecurity activities for education and curriculum design: A survey
Published 2024-12-01Get full text
Article -
387
-
388
Relationship Between Neutrophil Count and 90‐Day Outcomes and Effect of Dual Antiplatelet Therapy in Patients With Acute Ischemic Stroke or Transient Ischemic Attack: A Post Hoc An...
Published 2025-07-01“…Background Inflammation is an important mechanism in ischemic stroke and high‐risk transient ischemic attack, but clinical inflammatory markers on antiplatelet therapy remain to be studied. …”
Get full text
Article -
389
A reputation-based dynamic reorganization scheme for blockchain network sharding
Published 2024-12-01“…Simulation results show that this sharding scheme effectively reduces the consensus failure probability, solves the collusion attack problem caused by the aggregation of malicious nodes within shards, and reduces the latency of the blockchain system. …”
Get full text
Article -
390
Screening of Indigenous Trichoderma Isolates for Their Nematocidal Potential Against Root-Knot Nematodes (Meloidogyne Spp.) Attacking Tomatoes (Solanum lycopersicum L.)
Published 2025-06-01“…Root-knot nematode juveniles (J2) and different Trichoderma isolates were extracted from infected roots and soil samples, following standard laboratory protocols. …”
Get full text
Article -
391
Effect of Flow Attack Angle of V-Ribs Vortex Generators in a Square Duct on Flow Structure, Heat Transfer, and Performance Improvement
Published 2014-01-01“…Effects of different blockage ratio (b/H, BR) with a single pitch ratio (P/H, PR) of 1 on heat transfer, pressure loss, and performance in the ribbed tube are studied. …”
Get full text
Article -
392
Multimodal framework for phishing attack detection and mitigation through behavior analysis using EM-BERT and SPCA-BASED EAI-SC-LSTM
Published 2025-07-01“…But, detecting the phishing attacks of different web sources was not concentrated in any of the existing works. …”
Get full text
Article -
393
Linear-quadratic and norm-bounded combined differential game guidance scheme with obstacle avoidance for attacking defended aircraft in three-player engagement
Published 2024-12-01“…Furthermore, the radii of the static obstacle and the interceptor are taken as the design parameters to derive the combined guidance strategy through the dead-zone function, which guarantees that the pursuer avoids the static obstacle, and the interceptor, and attacks the evader. Finally, the nonlinear numerical simulations verify the performance of the game guidance strategy.…”
Get full text
Article -
394
Development of an Eco-Friendly Smartphone-Assisted Nystagmus Recording System for Recording Vertigo Attacks Anytime, Anywhere: Pilot App Development Study
Published 2025-06-01“…ObjectiveThis study aimed to develop a smartphone app for capturing eye movements and head positions during vertigo attacks, enabling recordings anywhere, even at home or work. …”
Get full text
Article -
395
Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley
Published 2025-02-01“…Additionally, we introduce a verification case using a different battery model and estimation algorithm to enhance generalization. …”
Get full text
Article -
396
Introducing UWF-ZeekData24: An Enterprise MITRE ATT&CK Labeled Network Attack Traffic Dataset for Machine Learning/AI
Published 2025-04-01“…Controlling the construction of attacks and meticulously labeling the data provides a more accurate and dynamic environment for testing of IDS/IPS systems and their machine learning algorithms. …”
Get full text
Article -
397
-
398
Multi-model assurance analysis showing large language models are highly vulnerable to adversarial hallucination attacks during clinical decision support
Published 2025-08-01“…One subset of these errors arises from adversarial attacks, in which fabricated details embedded in prompts lead the model to produce or elaborate on the false information. …”
Get full text
Article -
399
DOG BITE-RELATED INJURIES
Published 2020-12-01“…Discussion and Conclusion: Dog attacks have been identified worldwide as a substantial public health problem. …”
Get full text
Article -
400
Ticagrelor vs Clopidogrel in addition to Aspirin in minor ischemic stroke/ transient ischemic attack-Protocol for a systematic review and network meta-analysis.
Published 2021-01-01“…<h4>Introduction</h4>Patients with minor ischemic stroke or transient ischemic attack represent a high-risk population for recurrent stroke. …”
Get full text
Article