Showing 441 - 460 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 441

    Association between diabetes, metabolic syndrome and heart attack in US adults: a cross-sectional analysis using the Behavioral Risk Factor Surveillance System 2015 by Dongmei Li, Guang-Ran Yang, Timothy D Dye

    Published 2019-09-01
    “…A weighted hierarchical logistic regression was used to examine the difference between the four groups in their association with the risk of a heart attack.Results Differences in weighted frequency distributions of gender, age category (over 45 years or not), smoking status, education, race, physical activity and daily vegetable and fruit consumption were significantly different across the four groups (p<0.05). …”
    Get full text
    Article
  2. 442

    Le défi Charlie : les médias à l’épreuve des attentats by Vicky Girard

    Published 2018-12-01
    “…These various mediatizations were studied by the authors at different moments of the attack, at the time of the attack, during the march and during the debate. …”
    Get full text
    Article
  3. 443
  4. 444

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  5. 445

    Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT) by zahra eskandari

    Published 2023-01-01
    “…This approach ensures that these clients are correctly identified and their attack is ineffective. The proposed detection mechanism can efficiently resist the data poisoning attack, which significantly improves the accuracy of the global model. …”
    Get full text
    Article
  6. 446

    Functional response of Cydnodromus picanus (Acari: Phytoseiidae) on two-spotted spider mite, Tetranychus urticae (Acari: Tetranychidae) by Víctor Ernesto Tello Mercado, Miguel Esteban Zarzar Maza, Angélica María Suarez Pantoja

    Published 2017-04-01
    “…The values of response parameters for C. picanus females were as follows: Attack rate (a): 0.055±0.006, 0.076±0.009 and 0.073±0.016; Handling time (Th): 0.684±0.036, 0.894±0.034 and 0.898±0.062; for eggs of 16, 42 and 65 h age, respectively. …”
    Get full text
    Article
  7. 447

    THE PRACTICAL CYBERATTACK ON THE DATA TRANSMISSION CHANNEL OF THE DIGITAL SUBSTATION by T. Strebkova, D. Tuchina, P. Zvada

    Published 2022-02-01
    “…In order to assess the impact of different types of cyber-attacks on the stability of the digital substation, in this work two experimental attacks were made on the simulated data transmission channel. …”
    Get full text
    Article
  8. 448

    Protocol to enhance the security of Early data in TLS 1.3 by Xing-long ZHANG, Qing-feng CHENG, Jian-feng MA

    Published 2017-12-01
    “…The new 0-RTT Internet key exchange was drawn on the TLS 1.3 session resumption phase,the rFSOPKE protocol was constructed,and the Early data encryption and transmission process were improved.The rFSOPKE protocol can protect the forward security of Early data and protect it from replay attacks during the validity period of the Ticket.Compared with the previous Early data transmission process,rFSOPKE greatly enhanced the security of Early data.Due to the increase in the calculation and transmission overhead of this protocol when sending Early data,the efficiency of the protocol is reduced.However,rFSOPKE can embed the appropriate algorithm according to the different application environment,so more efficient algorithms should be chosen to improve the protocol implementation speed.…”
    Get full text
    Article
  9. 449

    Design of self-adaptive spatio-temporal diversity joint scheduling strategy by Qing TONG, Yunfei GUO, Shumin HUO, Yawen WANG, Yujia MAN, Kai ZHANG

    Published 2021-07-01
    “…To solve the problem that a diversity system is difficult to take defense capability, defense cost and quality of service into account at the same time under a single diversity strategy, firstly, the scheduling object selecting sequences under different security levels were constructed based on the measurement of scheduling heterogeneity, executor security and spatial diversity.Then, according to the coarse-grained evaluation of threat environment, the scheduling time and scheduling object were determined comprehensively.Through the realization of the spatio-temporal diversity Web server system in a cloud environment, the proposed scheduling strategy was tested with attack and defense experiments and compared with the existing scheduling strategies.The results show that the proposed scheduling strategy improves the defense capability significantly and maintains a high quality of service within the acceptable defense cost increasing range.…”
    Get full text
    Article
  10. 450
  11. 451
  12. 452
  13. 453
  14. 454

    Study on the advancement process of alkali loss and deterioration of concrete under MgSO4 erosion by Zhongzhe Zhang, Hua Yin, Shuai Hao, Meiqi Cao, Yumeng Du, Yongsheng Ji

    Published 2025-05-01
    “…It employs ultrasonic velocity, SO42− content, and microhardness testing methods to comprehensively evaluate the lamination and deterioration processes of concrete at different erosion ages. Additionally, nano-indentation and XRD are utilized to examine the alkali dissipation and deterioration mechanisms of concrete under sulfate attack. …”
    Get full text
    Article
  15. 455
  16. 456

    Adhesion to eroded dentin submitted to different surface treatments by Thayanne Monteiro Ramos Oliveira, Thaysa Monteiro Ramos, Bruna Uglik Garbui, Fernando Seishim Hanashiro, Patricia Moreira de Freitas

    Published 2014-11-01
    “…The lowest µSBS value was found for G4 (7.1±1.5), which did not differ statistically from G2 (7.5±1.8), G3 (8.4±1.8) and G5 (8.6±3.2). …”
    Get full text
    Article
  17. 457

    Gender differences in the clinical course of depression in bipolar disorder by N. A. Tyuvina, A. E. Stolyarova, D. V. Morozova, M. S. Verbitskaya

    Published 2021-04-01
    “…Results and discussion. Gender differences in the clinical  course of BP were revealed. …”
    Get full text
    Article
  18. 458
  19. 459

    Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering by Qian Bin, Cai Ziwen, Xiao Yong, Hong Liang, Su Sheng

    Published 2020-01-01
    “…Therefore, they are prone to suffer from malicious cyber-attack. Usually, based on General Packet Radio Service (GPRS) communicated method is the most popular for meter collectors and consequently they are vulnerable to rogue Base Stations (BS) and get compromised by malicious adversaries further. …”
    Get full text
    Article
  20. 460

    Adversarial patch defense algorithm based on PatchTracker by Zhenjie XIAO, Shiyu HUANG, Feng YE, Liqing HUANG, Tianqiang HUANG

    Published 2024-02-01
    “…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
    Get full text
    Article