Showing 541 - 560 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 541

    Cluster headache attacks in a woman previously struck by lightning: pathophysiology of the latent period Cefaléia em salvas em uma mulher que foi previamente atingida por raio: fis... by Marcelo Moraes Valença, Wilson Farias da Silva, Luciana Patrízia A. Andrade-Valença, Carlos A. Bordini, José Geraldo Speciali

    Published 2007-06-01
    “…BACKGROUND: Cases of patients who developed cluster headache-like symptoms after different putative causes have been reported, indicating a direct relationship between brain lesion and this particular type of headache. …”
    Get full text
    Article
  2. 542
  3. 543

    Predictive value of patent foramen ovale diameter for cryptogenic stroke and age-related differences by Rui Wang, Miao Qiao, Guanghui Song, Wei Wang, Liuyin Yang, Zhenzhen Lin, Lingcui Meng

    Published 2025-08-01
    “…Elevated white blood cell count (WBC), age ≥ 60 years, large right-to-left shunt (RLS), previous stroke/transient ischemic attack (TIA) and cortical infarction were associated with CS. …”
    Get full text
    Article
  4. 544

    Design of key technologies for intranet dynamic gateway based on DPDK by Fucai CHEN, Weizhen HE, Guozhen CHENG, Shumin HUO, Dacheng ZHOU

    Published 2020-06-01
    “…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
    Get full text
    Article
  5. 545
  6. 546

    The impact of the application of antivirus programs on the security of computer systems by Ivan Jovanović, Milena Cvjetković, Milovan Cvjetković

    Published 2024-08-01
    “…The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks. …”
    Get full text
    Article
  7. 547

    Reputation mechanism based on multi-path routing protocol in ad hoc networks by CUI Guo-hua, LU She-jie, LIU Zhi-yuan, GENG Yong-jun

    Published 2008-01-01
    “…The simulation results show that it can react to the attacks more quickly and accurately.…”
    Get full text
    Article
  8. 548

    AIDFL: An Information-Driven Anomaly Detector for Data Poisoning in Decentralized Federated Learning by Xiao Chen, Chao Feng, Shaohua Wang

    Published 2025-01-01
    “…To address these challenges, AIDFL is proposed to utilize conditional entropy and mutual information, which are independent of data distribution to detect and mitigate data poisoning attacks in DFL environments. Experimental results demonstrate that AIDFL achieves superior defense under non-IID settings under different poisoning configurations. …”
    Get full text
    Article
  9. 549

    Evaluation method for flange-climb derailment focusing on contact position and transverse creepage between wheel and rail in railway vehicle by Shoya KUNIYUKI, Kimihiko NAKANO

    Published 2025-01-01
    “…Results show that the transit domains for loci of these variables differ significantly between derailment and non-derailment cases. …”
    Get full text
    Article
  10. 550

    A New Hybrid Wavelet Transform-Deep Learning for Smart Resilient Inverters in Microgrids Against Cyberattacks by Chou-Mo Yang, Pei-Min Huang, Chun-Lien Su, Mahmoud Elsisi

    Published 2025-01-01
    “…While the model shows high performance, further research is needed to validate its generalizability across different inverter hardware and against novel, zero-day attack variants.…”
    Get full text
    Article
  11. 551

    Headaches and its dependence from different factors in patients with temporal epilepsy at interictal period by O. S. Kurus, M. V. Nadezhdina, Ye. V. Osintseva, N. I. Skulskaya

    Published 2010-08-01
    “…Headaches (HA) among 80.4% patients with TE is revealed and its dependence from different factors is studied. The absence of gender differences, the dependence from the type TE, frequency of attacks and the duration of the disease among patients TE with HA are noticed, however the burdened neurological and obstetrical anamnesis, the presence HA among relatives, changes on data MRI of the brain, pathology of vertebral-basilar basin, the reduction and asymmetry of the index of the vessel resistance are observed. …”
    Get full text
    Article
  12. 552

    Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps by Je Sen Teh, Abubakar Abba

    Published 2024-10-01
    “…Unlike conventional cryptography, evaluating the security margins of chaos-based encryption against attacks such as differential cryptanalysis is complex. …”
    Get full text
    Article
  13. 553

    ASSOCIATION BETWEEN ANTHROPOMETRIC AND PHYSICAL DATA OF UNIVERSITY SOCCER PLAYERS FROM DIFFERENT POSITIONS by Sacha Clael, Samuel da Silva Aguiar, Filipe Manuel Clemente, Ricardo Franco Lima, Gustavo De Conti Teixeira Costa, Henrique de Oliveira Castro

    Published 2021-05-01
    “…The agility test was moderately correlated with YoYo intermittent recovery test across the different playing positions. In conclusion, there the acceleration and the agility had a positive association with the different positions of the soccer players.…”
    Get full text
    Article
  14. 554
  15. 555

    Laboratory Evaluation of Different Insecticides against Hibiscus Mealybug, Maconellicoccus hirsutus (Hemiptera: Pseudococcidae) by Samman Fatima, Mubashar Hussain, Shama Shafqat, Muhammad Faheem Malik, Zaheer Abbas, Nadia Noureen, Noor ul Ane

    Published 2016-01-01
    “…The study emphasizes the use of such insecticide mixtures to develop better management strategy for mealybug populations attacking ornamental plants. However effects of such insecticide mixtures on other organisms and biological control agents should be checked under field conditions.…”
    Get full text
    Article
  16. 556

    Clinincal variants of trancient neurological deficit in patients with the neck osteochondrosis by Zozulia I.S., Nesukai V.G.

    Published 2018-06-01
    “…With the purpose of studing frequency and variability of clinical symptoms there were observed 130 patients after transient ischemic attack (TIA) in a vertebrobasillar pool (VBP) on a background of neck osteochondrosis, verified from MRI, CT data or sciagraphies of the neck portion of the spine with functional tests. …”
    Get full text
    Article
  17. 557

    Clinincal variants of trancient neurological deficit in patients with the neck osteochondrosis. by I. S. Zozulia, V. G. Nesukai

    Published 2018-06-01
    “…With the purpose of studing frequency and variability of clinical symptoms there were observed 130 patients after transient ischemic attack (TIA) in a vertebrobasillar pool  (VBP) on a background of neck osteochondrosis, verified from MRI, CT data or sciagraphies of the neck portion of the spine with functional tests. …”
    Get full text
    Article
  18. 558
  19. 559

    Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption by Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI

    Published 2023-05-01
    “…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
    Get full text
    Article
  20. 560

    Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption by Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI

    Published 2023-05-01
    “…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
    Get full text
    Article