-
461
Impact of prey species, host plant, and predator sex on the functional response of Orius strigicollis
Published 2025-05-01“…Functional response analysis, Pearson’s correlation, and principal component analysis (PCA) were employed to determine the extent to which these factors affected handling time and attack rate under varying conditions. O. strigicollis consistently exhibited a Type II functional response when fed on both of thrip larvae and spider mites on eggplant and runner bean. …”
Get full text
Article -
462
Current and Projected Burden of Ischemic Cerebrovascular Events: Nationwide Estimates From the Dijon Stroke Registry, France
Published 2025-01-01“…The attack rate during the 2019 to 2020 period was slightly lower than that observed during 2013 to 2014 (age‐standardized attack rate ratio, 0.90[95% CI, 0.81–0.99]; P=0.035) but did not differ from that of other periods. …”
Get full text
Article -
463
Response of adult dragonflies to artificial prey of different size and colour.
Published 2017-01-01“…We found that the two dragonfly species, as well as the two sexes, had different foraging responses. L. pulchella was more likely to attack larger prey, and females of both species more likely to attack prey than males. …”
Get full text
Article -
464
Ability to create goal opportunities: influence of playing either at home or away, dimensions of the field and number of passes per attack cycle in an under-19 elite football team...
Published 2023-09-01“…The total number of cycles in which a goal-scoring opportunity occurred, differentiated by the starting zone of the cycle, the number of contacts necessary to develop the attack cycle, and the effective match time, were analyzed in each different contexts. …”
Get full text
Article -
465
-
466
Key Distribution System Based on Hadamard Designs
Published 2019-06-01“…Such key distribution systems can be based on different structures, such as error-correcting codes and combinatorial designs. …”
Get full text
Article -
467
Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain
Published 2025-05-01“…Moreover, the rapid changes in IoT and the capabilities of attacks have highlighted the need for an adaptive and reliable framework. …”
Get full text
Article -
468
Research on wheat image encryption based on different chaotic systems
Published 2024-12-01“…The best chaotic system scheme was obtained by considering the anti-attack capability of these encryption schemes, which analyzed eight commonly used image encryption performance evaluation indexes. …”
Get full text
Article -
469
Experimental investigation on loads of nets with different types under current
Published 2025-05-01“…The drag of six nets with different types under varying current velocities and current directions are calculated, and the curves between the drag coefficient and the current velocity or Reynolds number are further obtained. …”
Get full text
Article -
470
Panic disorder in a breath-holding challenge test: a simple tool for a better diagnosis
Published 2003-01-01“…There was no heart rate or anxiety levels difference among the groups before and after the test. …”
Get full text
Article -
471
DISORDERS OF CARDIAC RHYTHM IN PATIENTS WITH PRE-EXCITATION SYNDROME OF VENTRICLES AND THEIR PHARMACOLOGICAL CORRECTION
Published 2020-04-01“…Most typical disorders of cardiac rhythm in patients with pre-excitation syndrome are orthodromic reciprocating supraventricular tachycardia, antidromic supraventricular tachycardia, atrial fibrillation and atrial fibrillation. During attack of tachycardia in patients with syndrome of pre-excitation, different clinical symptoms can be observed. …”
Get full text
Article -
472
Prediction of vaccination coverage levels in populations with increasing levels of heterogeneity
Published 2025-12-01Get full text
Article -
473
GeNIS: A modular dataset for network intrusion detection and classificationZenodo
Published 2025-06-01“…To allow organizations to improve their intrusion detection systems according to their types of users, their active services, and the network protocols they use, it is necessary to provide reliable captures of different types of benign and malicious traffic. The GECAD Network Intrusion Scenarios (GeNIS) dataset contains multiple sequential attack scenarios and different types of realistic normal network activity, recorded during advanced network simulations on the Airbus CyberRange platform. …”
Get full text
Article -
474
-
475
Dirty bomb radiological simulations: two explosion scenarios using the Rio 2016 Olympic games Athletes’ Village as a model
Published 2018-05-01“…A historic moment in terrorist bombing in the world was the explosion of the twin towers in the USA, starting a new series of attacks. The bombing brought up many concerns for security authorities all over the world. …”
Get full text
Article -
476
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
477
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
478
Various types of cyber threats
Published 2024-01-01“…Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime. …”
Get full text
Article -
479
Design and implementation of hardware-based dynamic instruction set randomization framework
Published 2017-11-01“…All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.…”
Get full text
Article -
480
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01“…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
Get full text
Article