Showing 521 - 540 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 521

    Difference analysis of hypertension risk factors of residents aged 40 and above in Zhongshan by CHEN Jie, LIN Hai, LI Chuan

    Published 2025-07-01
    “…Objective To analyze the risk factors for hypertension and the differences across gender and age groups among residents aged 40 years and older in Zhongshan City, to provide evidence for regional hypertension prevention and control policies.Methods Data were obtained from the National Stroke High-Risk Population Screening and Intervention Project. …”
    Get full text
    Article
  2. 522

    Effects of facades positioned at different angles on building thermal performance and flow behaviors by Majid Amani-Beni, Mahdi Tabatabaei Malazi, Besir Sahin, Ahmet Selim Dalkılıç

    Published 2025-02-01
    “…Using 2D numerical analysis, twenty-four different facade and building model combinations were simulated. …”
    Get full text
    Article
  3. 523
  4. 524
  5. 525
  6. 526

    Network security threat warning method based on qualitative differential game by Shirui HUANG, Hengwei ZHANG, Jindong WANG, Ruiyu DOU

    Published 2018-08-01
    “…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
    Get full text
    Article
  7. 527
  8. 528

    Improving the Routing Security in Wireless Sensor Networks using Neutrosophic Set and Machine Learning Models by Hanadi Ahmad Simmak, Ahmed A El-Douh, Tareef S Alkellezli, Rabih Sbera, Darin shafek, Ahmed Abdelhafeez

    Published 2025-07-01
    “…Numerous methods have been put forth to identify and safeguard routing data because Wireless Sensor Networks (WSNs) are susceptible to attacks during data transfer. To create an artificial intelligence-based attack detection system for WSNs, we provide a unique stochastic predictive machine learning technique in this research that is intended to identify unreliable events and untrustworthy routing properties. …”
    Get full text
    Article
  9. 529

    Cybersecurity Governance in Large-scale Infrastructures by Răzvan STOLERIU, Ionuț PETRE, Florin POP

    Published 2025-03-01
    “…However, this opens new opportunities for malicious actors to launch different attacks that may have a destructive impact on the important infrastructures in a city. …”
    Get full text
    Article
  10. 530
  11. 531

    Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism by Xiao-mao WANG, Chuan-he HUANG, Yi-long LV, Bin WANG, Xi-ying FAN, Hao ZHOU

    Published 2014-03-01
    “…A distributed consensus-based scheme by simulating the crowd trust and decision-making mechanism was proposed.This scheme firstly predicts the dynamic trust value among sensing users by the previous cooperative process,and then generates the user's relative trust value,and makes the data interaction among the users by using the combination of relative trust value and decision-making mechanism.All users' state can reach a consensus as the credible and iterative data interaction.All users get the final results by the determinant algorithm.This new spectrum sensing scheme utilizes the imbalance of each users' sensing ability in the real environment.Each secondary user can maintain cooperation with others only through the local information exchange with the neighbors.It is quite different from traditional spectrum sensing scheme,such as OR-rule,1-out-of-N rule and ordinary iterative method.Three SSDF attacks were analysed,on the basis of the corresponding anti-attack policy was proposed.Theoretical analysis and simulation results show that the new scheme is better than the existing cooperative spectrum sensing algorithm in accuracy and security.New scheme not only can improve the accuracy of spectrum sensing but also has the strong anti-attack capability.…”
    Get full text
    Article
  12. 532
  13. 533
  14. 534

    Distribution and virulence of Orobanche cumana Wallr. in sunflower weed communities of northeastern Croatia by Slavica Antunović, Sanda Rašić, Pavo Lucić, Domagoj Zimmer, Marin Lukačević, Matej Kunčević, Edita Štefanić

    Published 2025-06-01
    “…Although, it was observed the difference between the morphometric characteristics of broomrape in the investigated area (Baranja, Syrmia, and Slavonia), the most concerning fact is a trend of increasing attack rate from 2017 to 2021, recorded in the whole region. …”
    Get full text
    Article
  15. 535

    Applications of BESS in Electrical Distribution Network With Cascading Failures Study: A Review by Abhay Chhetri, Devender Kumar Saini, Monika Yadav

    Published 2024-01-01
    “…After a thorough literature survey of the existing methods utilized for placement, sitting, costing, and modelling techniques, the paper concludes by providing a framework to enhance the grid resiliency against such power quality issues by improving the quality and reducing the minimum disruption area in case of any FDI attack. The proposed framework differs from the existing methodologies as it provides adaptive ancillary services and dynamic BESS response to address the operational and security challenges, based on this framework EV load penetration is estimated. …”
    Get full text
    Article
  16. 536

    Enhancing the Strength and Durability Behaviour of Concrete Produced with Brown-Loamy Kaolin Clay Polymer by Patrick Zievie, Peter Paa-Kofi Yalley, Humphrey Danso, Kwaku Antwi

    Published 2024-06-01
    “…It has been established that clays geographical location presents differences in their optimum calcination temperatures and cement replacement levels. …”
    Get full text
    Article
  17. 537
  18. 538

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  19. 539

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  20. 540

    Collective escape waves provide a generic defence against different avian predators by David Bierbach, Juliane Lukas, Luis Gómez-Nava, Fritz A. Francisco, Lenin Arias-Rodriguez, Stefan Krause, Korbinian Pacher, Yunus Sevinchan, Pawel Romanczuk, Jens Krause

    Published 2025-03-01
    “…Post-attack, all bird species triggered similarly high numbers of waves while species differed in the number and the interval between the waves they triggered pre-attack. …”
    Get full text
    Article