-
501
Natural durability of five amazonian species in two different decay environments
Published 2025-06-01“…ABSTRACT: Understanding the natural durability of Amazonian wood species in different deterioration environments is essential to promote their sustainable use and extend their useful life in various applications. …”
Get full text
Article -
502
Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT
Published 2025-01-01“…The Pearson correlation can effectively extract key data features for different routing attacks. And the hybrid GS-PSO algorithm can optimize the hyperparameters of IDS model and enhance the accuracy of the detection mechanism while significantly reducing computational overhead. …”
Get full text
Article -
503
Investigating Potential Gender Differences in ChatGPT-Diagnosed Clinical Vignettes
Published 2025-01-01“…AIMS: This study seeks to investigate gender differences in diagnostic accuracy within ChatGPT 3.5 by evaluating the accuracy and completeness of its responses to various clinical vignettes. …”
Get full text
Article -
504
-
505
MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN
Published 2023-01-01“…The objectives of the paper are to identify those cybercrime groups that use the ransomware attack or advanced persistent threat methods to carry out major cyber-attacks and how they changed their attack method after the outbreak of the conflict. …”
Get full text
Article -
506
Reputation computation based on new metric in P2P network
Published 2008-01-01“…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
Get full text
Article -
507
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01“…This paper examines a presentation attack when a color photo of a gray copy of a document is presented instead of the original color document during remote user identification. …”
Get full text
Article -
508
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems
Published 2025-01-01“…This dataset contains synthesized benign network traffic from different campus departments, network flow of attack activities, system call traces, and microgrid-specific data from an integrated Festo LabVolt microgrid system. …”
Get full text
Article -
509
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
Published 2025-03-01“…Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. …”
Get full text
Article -
510
Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
Published 2024-01-01“…Due to the vast amounts of data transmission in an Internet of Drones (IoD) network, it is vulnerable to different cyber attacks. Our previous works deal with cryptographic algorithms i.e. an Authenticated Key Agreement (AKA) algorithm named Elliptic Curve Cryptography based AKA integrating Timestamps and Trigonometric concepts (ECCTST) and an encryption algorithm named Customized Lightweight Encryption Algorithm (CLEA)-256 for a legitimate IoD network. …”
Get full text
Article -
511
-
512
-
513
Tactical and statistical analysis of spiking efficiency by type, zone and set phase in women's volleyball
Published 2025-08-01“…Tip shots had the lowest efficiency (EI = 0.22) but the highest continuation rate (61%). Side zone attacks exhibited higher kill rates (25.2%) and efficiency (EI = 0.227) than central zone attacks (14.1% kill rate, EI = 0.106). …”
Get full text
Article -
514
-
515
Comprehensive Review of Intrusion Detection Techniques: ML and DL in Different Networks
Published 2025-01-01Get full text
Article -
516
Performance comparison of different algorithms to secure the information for Wireless sensor Network
Published 2024-01-01Get full text
Article -
517
An Experimental and Quantum Chemical Calculation Study on the Performance of Different Types of Ester Collectors
Published 2025-01-01“…Quantum chemical calculations show the energy difference between the HOMOs of the collector and the LUMOs of minerals. …”
Get full text
Article -
518
Kinematic Differences in the Roundhouse Kick among University Taekwondo Players: Brief Report
Published 2024-01-01“…The analysis revealed no significant differences in reaction times (0.15 ±0.03 and 0.15 ±0.04 s, n=20), movement times (0.62 ±0.06 and 0.64 ±0.04 s, n=20), or attack times (0.77 ±0.09 and 0.79 ±0.06 s, n=20) for the dominant and non-dominant legs (p>0.05). …”
Get full text
Article -
519
Strain-specific differences in cerulein-induced acute and recurrent acute murine pancreatitis
Published 2025-05-01“…In FVB/N mice, we now found that the second episode was associated with lower pancreas edema and plasma amylase but higher inflammatory cell infiltration than the first attack. The observations reinforce the notion that inbred mouse strains exhibit differences in their pathological responses during acute and recurrent acute pancreatitis.…”
Get full text
Article -
520
Robust Adversarial Example Detection Algorithm Based on High-Level Feature Differences
Published 2025-03-01“…To address these challenges, this paper introduces a novel adversarial example detection algorithm based on high-level feature differences (HFDs), which is specifically designed to improve robustness against both attacks and preprocessing operations. …”
Get full text
Article