Showing 601 - 620 results of 2,541 for search 'different attack', query time: 0.12s Refine Results
  1. 601

    Intrusion Detection in IoT and IIoT: Comparing Lightweight Machine Learning Techniques Using TON_IoT, WUSTL-IIOT-2021, and EdgeIIoTset Datasets by Shereen Ismail, Salah Dandan, Ala'a Qushou

    Published 2025-01-01
    “…The TON_IoT, WUSTL-IIOT-2021, and Edge-IIoTset imbalanced datasets, representing three distinct IIoT environments and encompassing numerous samples of different attack types, were used. The impact of imbalanced class distributions on model performance was analyzed. …”
    Get full text
    Article
  2. 602
  3. 603

    Comparison and association of performance indicators according to set outcome and set score difference in AVP women's beach volleyball by Yago Pessoa da Costa, Filipe Santana Martins, Lucas Roberto Ribeiro, Antonio García-de-Alcaraz, Gilmário Ricarte Batista

    Published 2025-08-01
    “…The set score difference was characterized as an indicator of set balance because the differences in performance indicators between the winners and losers generally increased with greater point differentials.ConclusionIn the context of elite women's beach volleyball, although attacking was important for winning a set, the key performance indicators were mainly derived from the construction of counterattacks. …”
    Get full text
    Article
  4. 604

    Fixed-Time Distributed Event-Triggered Cooperative Guidance Methods for Multiple Vehicles with Limited Communications to Achieve Simultaneous Arrival by Zhenzhen Gu, Xugang Wang, Zhongyuan Wang

    Published 2024-08-01
    “…Aiming at the salvo-attack problem of multiple missiles, a distributed cooperative guidance law based on the event-triggered mechanism is proposed, which enables missiles with large differences in spatial location and velocity to achieve simultaneous attacks with only a few dozen information exchanges. …”
    Get full text
    Article
  5. 605

    Perceived Information Revisited II by Akira Ito, Rei Ueno, Naofumi Homma

    Published 2024-12-01
    “…Furthermore, we show that, by using the logistic regression as a classifier, we can significantly improve the attack performance of the trained model when the difference between the SR upper bound by the LPI and its actual SR is large. …”
    Get full text
    Article
  6. 606
  7. 607

    Aerodynamic Performance of Different Trailing-edge Serrations for High Reynolds Number Flows around Wing-flap System by S. Ahmadkhah, A. Jahangirian, A. Zarinvafa

    Published 2025-02-01
    “…In the present work different trailing-edge serration models are designed and their aerodynamic performances at realistic landing conditions around a wing-flap system are investigated. …”
    Get full text
    Article
  8. 608
  9. 609

    Adherence to Attendance at Outpatient Clinic and Longterm Survival of Patients after Stroke in Outpatient Setting: the Data of REGION-M Registry by S. Yu. Martsevich, S. N. Tolpygina, M. I. Chernysheva, A. V. Zagrebelny, V. P. Voronina, M. M. Lukyanov, N. P. Kutishenko, N. A. Dmitrieva, O. V. Lerman, Yu. V. Lukina, S. V. Blagodatskikh, E. Yu. Okshina, N. E. Parsadanyan

    Published 2021-07-01
    “…At the same time, there is a reserve in improving the long-term prognosis of the lives of patients who have suffered a cerebral stroke or transient ischemic attack, due to greater coverage of patients with medical supervision in the clinic.…”
    Get full text
    Article
  10. 610

    Performance analysis in won and lost matches and the predictors of goal difference and match outcome in Women’s Handball European Championship 2022 by Paweł Krawczyk, Anna Kupczak, Joanna Pergoł, Aleksandra Julia Hejnosz

    Published 2025-05-01
    “…Winning teams score significant higher number of goals in attack (d = 1.43), positional attack (d = 1.11), and have a higher efficiency of attack (d = 1.71) and positional attack (η2 = 0.39) throwing. …”
    Get full text
    Article
  11. 611

    Rationale set of indicators and prioritize relevant to assess competitive activity of hockey players of high qualification of different roles by A.P. Mikhnov

    Published 2015-02-01
    “…Three groups of technical and tactical actions: 1) active attacks; 2) - active safety; 3) - organizational and maneuvering. …”
    Get full text
    Article
  12. 612

    DIFFERENCE IN EFFECTIVENESS OF ACUPRESSURE WITH A MIXTURE OF GINGER AND LEMON EXTRACTS ON REDUCING OAT SIDE EFFECTS IN TUBERCULOSIS PATIENTS by Liza Novitasari Wijaya, Tri Hardi Miftahul Ulum, Kiki Rizki Handayani

    Published 2025-01-01
    “…Introduction: Tuberculosis is a disease that attacks the lungs and several other organs caused by Mycobacterium tuberculosis. …”
    Get full text
    Article
  13. 613

    Bio-efficacy impact of botanical powders against Callosobruchus chinensis infesting different stored pulses: A review by Tumma Mounika, Peddi Naga Harsha Vardhan, Tapan Kumar Hath, Akhila Badavath

    Published 2025-01-01
    “…However, storage circumstances are where insect attacks are more common. Fifty to sixty percent of the grains may be harmed, even after six months of conventional storage. …”
    Get full text
    Article
  14. 614
  15. 615

    Study of Different Microbial Corrosion Mechanisms in Sewer Pipes Network Made by Sulfur Concrete with focus on Strength and Durability Analysis by Ghorban Ali Dezvareh, Erfan Nabavi, Ahmad Khodadadi Darban

    Published 2022-11-01
    “…Concrete corrosion has a great economic impact on many worldwide projects especially in corrosive environments such as municipal sewer systems. Many different factors can cause corrosive attacks on concrete structures that can be categorized into two main groups, chemical sulfuric acid attack, and microbial corrosive process via producing biogenic sulfuric acid (BSA). …”
    Get full text
    Article
  16. 616
  17. 617
  18. 618
  19. 619

    Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems by Ijaz Ahmed, Ali M. El-Rifaie, Fazia Akhtar, Hasnain Ahmad, Zuhair Alaas, M.M.R. Ahmed

    Published 2025-03-01
    “…This study offers an in-depth examination of cyber security within the energy sector, exploring the historical backdrop of cyber-attacks and classifying different forms of MG breaches, encompassing both cyber and physical security strategies. …”
    Get full text
    Article
  20. 620

    Research on the robustness of the open-world test-time training model by Shu Pi, Xin Wang, Jiatian Pi

    Published 2025-08-01
    “…While emerging Open-World TTT (OWTTT) approaches address this challenge, they introduce a new vulnerability: test-time poisoning attacks. These attacks differ fundamentally from traditional poisoning attacks that occur during model training, as adversaries cannot intervene in the training process itself.MethodsIn response to this threat, we design a novel test-time poisoning attack method specifically targeting OWTTT models. …”
    Get full text
    Article