Showing 461 - 480 results of 2,541 for search 'different attack', query time: 0.09s Refine Results
  1. 461

    Impact of prey species, host plant, and predator sex on the functional response of Orius strigicollis by Yi-Ting Hung, Cheng-Kang Tang, Yi-Ting Chung, Wei-Han Lai, Han-Yan Ding, Ali Güncan, Pavel Saska, Shu-Jen Tuan

    Published 2025-05-01
    “…Functional response analysis, Pearson’s correlation, and principal component analysis (PCA) were employed to determine the extent to which these factors affected handling time and attack rate under varying conditions. O. strigicollis consistently exhibited a Type II functional response when fed on both of thrip larvae and spider mites on eggplant and runner bean. …”
    Get full text
    Article
  2. 462

    Current and Projected Burden of Ischemic Cerebrovascular Events: Nationwide Estimates From the Dijon Stroke Registry, France by Yannick Béjot, Gauthier Duloquin

    Published 2025-01-01
    “…The attack rate during the 2019 to 2020 period was slightly lower than that observed during 2013 to 2014 (age‐standardized attack rate ratio, 0.90[95% CI, 0.81–0.99]; P=0.035) but did not differ from that of other periods. …”
    Get full text
    Article
  3. 463

    Response of adult dragonflies to artificial prey of different size and colour. by Tammy M Duong, Ann B Gomez, Thomas N Sherratt

    Published 2017-01-01
    “…We found that the two dragonfly species, as well as the two sexes, had different foraging responses. L. pulchella was more likely to attack larger prey, and females of both species more likely to attack prey than males. …”
    Get full text
    Article
  4. 464

    Ability to create goal opportunities: influence of playing either at home or away, dimensions of the field and number of passes per attack cycle in an under-19 elite football team... by José Alberto Martínez Sánchez, Antonio Manuel Solana Sánchez, Francisco Javier Núñez Sánchez

    Published 2023-09-01
    “…The total number of cycles in which a goal-scoring opportunity occurred, differentiated by the starting zone of the cycle, the number of contacts necessary to develop the attack cycle, and the effective match time, were analyzed in each different contexts. …”
    Get full text
    Article
  5. 465
  6. 466

    Key Distribution System Based on Hadamard Designs by Vladimir M. Deundyak, Alexey A. Taran

    Published 2019-06-01
    “…Such key distribution systems can be based on different structures, such as error-correcting codes and combinatorial designs. …”
    Get full text
    Article
  7. 467

    Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain by Ahmad M. Almasabi, Ahmad B. Alkhodre, Maher Khemakhem, Fathy Eassa, Adnan Ahmed Abi Sen, Ahmed Harbaoui

    Published 2025-05-01
    “…Moreover, the rapid changes in IoT and the capabilities of attacks have highlighted the need for an adaptive and reliable framework. …”
    Get full text
    Article
  8. 468

    Research on wheat image encryption based on different chaotic systems by Yi Shao, Huiru Zhu, Xuefeng Deng, Hua Yang

    Published 2024-12-01
    “…The best chaotic system scheme was obtained by considering the anti-attack capability of these encryption schemes, which analyzed eight commonly used image encryption performance evaluation indexes. …”
    Get full text
    Article
  9. 469

    Experimental investigation on loads of nets with different types under current by Lingyun Xu, Yuji Miao, Xiaofei Wu, Peng Li, Hongde Qin

    Published 2025-05-01
    “…The drag of six nets with different types under varying current velocities and current directions are calculated, and the curves between the drag coefficient and the current velocity or Reynolds number are further obtained. …”
    Get full text
    Article
  10. 470

    Panic disorder in a breath-holding challenge test: a simple tool for a better diagnosis by Nardi Antonio E., Nascimento Isabella, Valença Alexandre M., Lopes Fabiana L., Mezzasalma Marco A., Zin Walter A.

    Published 2003-01-01
    “…There was no heart rate or anxiety levels difference among the groups before and after the test. …”
    Get full text
    Article
  11. 471

    DISORDERS OF CARDIAC RHYTHM IN PATIENTS WITH PRE-EXCITATION SYNDROME OF VENTRICLES AND THEIR PHARMACOLOGICAL CORRECTION by R.V. Lutsenko, Yu. A. Kapustnick, A. H. Sydorenko

    Published 2020-04-01
    “…Most typical disorders of cardiac rhythm in patients with pre-excitation syndrome are orthodromic reciprocating supraventricular tachycardia, antidromic supraventricular tachycardia, atrial fibrillation and atrial fibrillation. During attack of tachycardia in patients with syndrome of pre-excitation, different clinical symptoms can be observed. …”
    Get full text
    Article
  12. 472
  13. 473

    GeNIS: A modular dataset for network intrusion detection and classificationZenodo by Miguel Silva, Daniela Pinto, João Vitorino, José Gonçalves, Eva Maia, Isabel Praça

    Published 2025-06-01
    “…To allow organizations to improve their intrusion detection systems according to their types of users, their active services, and the network protocols they use, it is necessary to provide reliable captures of different types of benign and malicious traffic. The GECAD Network Intrusion Scenarios (GeNIS) dataset contains multiple sequential attack scenarios and different types of realistic normal network activity, recorded during advanced network simulations on the Airbus CyberRange platform. …”
    Get full text
    Article
  14. 474
  15. 475

    Dirty bomb radiological simulations: two explosion scenarios using the Rio 2016 Olympic games Athletes’ Village as a model by José Francisco Pereira, José Ubiratan Delgado

    Published 2018-05-01
    “…A historic moment in terrorist bombing in the world was the explosion of the twin towers in the USA, starting a new series of attacks. The bombing brought up many concerns for security authorities all over the world. …”
    Get full text
    Article
  16. 476

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  17. 477

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  18. 478

    Various types of cyber threats by Luknar Ivana, Jovanović Filip

    Published 2024-01-01
    “…Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime. …”
    Get full text
    Article
  19. 479

    Design and implementation of hardware-based dynamic instruction set randomization framework by San DU, Hui SHU, Fei KANG

    Published 2017-11-01
    “…All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.…”
    Get full text
    Article
  20. 480

    Formal modeling and security analysis method of security protocol based on CPN by Xiang GONG, Tao FENG, Jinze DU

    Published 2021-09-01
    “…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
    Get full text
    Article