-
441
Association between diabetes, metabolic syndrome and heart attack in US adults: a cross-sectional analysis using the Behavioral Risk Factor Surveillance System 2015
Published 2019-09-01“…A weighted hierarchical logistic regression was used to examine the difference between the four groups in their association with the risk of a heart attack.Results Differences in weighted frequency distributions of gender, age category (over 45 years or not), smoking status, education, race, physical activity and daily vegetable and fruit consumption were significantly different across the four groups (p<0.05). …”
Get full text
Article -
442
Le défi Charlie : les médias à l’épreuve des attentats
Published 2018-12-01“…These various mediatizations were studied by the authors at different moments of the attack, at the time of the attack, during the march and during the debate. …”
Get full text
Article -
443
The Copresence of Tourists and Residents as Central to the Resilience of Urban Tourism. An Analysis of the Champs Elysées Christmas Market Based on Survey and Mobile Phone Data
Published 2018-11-01“…The sensitivity of tourists to terrorist attacks varies according to their place of origin. …”
Get full text
Article -
444
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
445
Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT)
Published 2023-01-01“…This approach ensures that these clients are correctly identified and their attack is ineffective. The proposed detection mechanism can efficiently resist the data poisoning attack, which significantly improves the accuracy of the global model. …”
Get full text
Article -
446
Functional response of Cydnodromus picanus (Acari: Phytoseiidae) on two-spotted spider mite, Tetranychus urticae (Acari: Tetranychidae)
Published 2017-04-01“…The values of response parameters for C. picanus females were as follows: Attack rate (a): 0.055±0.006, 0.076±0.009 and 0.073±0.016; Handling time (Th): 0.684±0.036, 0.894±0.034 and 0.898±0.062; for eggs of 16, 42 and 65 h age, respectively. …”
Get full text
Article -
447
THE PRACTICAL CYBERATTACK ON THE DATA TRANSMISSION CHANNEL OF THE DIGITAL SUBSTATION
Published 2022-02-01“…In order to assess the impact of different types of cyber-attacks on the stability of the digital substation, in this work two experimental attacks were made on the simulated data transmission channel. …”
Get full text
Article -
448
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01“…The new 0-RTT Internet key exchange was drawn on the TLS 1.3 session resumption phase,the rFSOPKE protocol was constructed,and the Early data encryption and transmission process were improved.The rFSOPKE protocol can protect the forward security of Early data and protect it from replay attacks during the validity period of the Ticket.Compared with the previous Early data transmission process,rFSOPKE greatly enhanced the security of Early data.Due to the increase in the calculation and transmission overhead of this protocol when sending Early data,the efficiency of the protocol is reduced.However,rFSOPKE can embed the appropriate algorithm according to the different application environment,so more efficient algorithms should be chosen to improve the protocol implementation speed.…”
Get full text
Article -
449
Design of self-adaptive spatio-temporal diversity joint scheduling strategy
Published 2021-07-01“…To solve the problem that a diversity system is difficult to take defense capability, defense cost and quality of service into account at the same time under a single diversity strategy, firstly, the scheduling object selecting sequences under different security levels were constructed based on the measurement of scheduling heterogeneity, executor security and spatial diversity.Then, according to the coarse-grained evaluation of threat environment, the scheduling time and scheduling object were determined comprehensively.Through the realization of the spatio-temporal diversity Web server system in a cloud environment, the proposed scheduling strategy was tested with attack and defense experiments and compared with the existing scheduling strategies.The results show that the proposed scheduling strategy improves the defense capability significantly and maintains a high quality of service within the acceptable defense cost increasing range.…”
Get full text
Article -
450
Cluster forming based on spatial information using HMAC in WSN
Published 2023-01-01Get full text
Article -
451
A Concise Grid-Based Model Revealing the Temporal Dynamics in Indoor Infection Risk
Published 2025-08-01Get full text
Article -
452
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Get full text
Article -
453
-
454
Study on the advancement process of alkali loss and deterioration of concrete under MgSO4 erosion
Published 2025-05-01“…It employs ultrasonic velocity, SO42− content, and microhardness testing methods to comprehensively evaluate the lamination and deterioration processes of concrete at different erosion ages. Additionally, nano-indentation and XRD are utilized to examine the alkali dissipation and deterioration mechanisms of concrete under sulfate attack. …”
Get full text
Article -
455
In vitro Evaluation of Some Different Brands of Alprazolam Tablets
Published 2007-01-01Get full text
Article -
456
Adhesion to eroded dentin submitted to different surface treatments
Published 2014-11-01“…The lowest µSBS value was found for G4 (7.1±1.5), which did not differ statistically from G2 (7.5±1.8), G3 (8.4±1.8) and G5 (8.6±3.2). …”
Get full text
Article -
457
Gender differences in the clinical course of depression in bipolar disorder
Published 2021-04-01“…Results and discussion. Gender differences in the clinical course of BP were revealed. …”
Get full text
Article -
458
Numerical study on ion migration in concrete under the influence of salt solution
Published 2025-04-01Get full text
Article -
459
Rogue Base Stations Detection for Advanced Metering Infrastructure Based on Signal Strength Clustering
Published 2020-01-01“…Therefore, they are prone to suffer from malicious cyber-attack. Usually, based on General Packet Radio Service (GPRS) communicated method is the most popular for meter collectors and consequently they are vulnerable to rogue Base Stations (BS) and get compromised by malicious adversaries further. …”
Get full text
Article -
460
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01“…The application of deep neural networks in target detection has been widely adopted in various fields.However, the introduction of adversarial patch attacks, which add local perturbations to images to mislead deep neural networks, poses a significant threat to target detection systems based on vision techniques.To tackle this issue, an adversarial patch defense algorithm based on PatchTracker was proposed, leveraging the semantic differences between adversarial patches and image backgrounds.This algorithm comprised an upstream patch detector and a downstream data enhancement module.The upstream patch detector employed a YOLOV5 (you only look once-v5) model with attention mechanism to determine the locations of adversarial patches, thereby improving the detection accuracy of small-scale adversarial patches.Subsequently, the detected regions were covered with appropriate pixel values to remove the adversarial patches.This module effectively reduced the impact of adversarial examples without relying on extensive training data.The downstream data enhancement module enhanced the robustness of the target detector by modifying the model training paradigm.Finally, the image with removed patches was input into the downstream YOLOV5 target detection model, which had been enhanced through data augmentation.Cross-validation was performed on the public TT100K traffic sign dataset.Experimental results demonstrated that the proposed algorithm effectively defended against various types of generic adversarial patch attacks when compared to situations without defense measures.The algorithm improves the mean average precision (mAP) by approximately 65% when detecting adversarial patch images, effectively reducing the false negative rate of small-scale adversarial patches.Moreover, compared to existing algorithms, this approach significantly enhances the accuracy of neural networks in detecting adversarial samples.Additionally, the method exhibited excellent compatibility as it does not require modification of the downstream model structure.…”
Get full text
Article