Showing 661 - 680 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 661

    Gender and sex differences in the outcomes of modern coronary surgery: the main results of the Coronary Revascularization Outcomes Within Necessary Sex And Gender Aspects (CROWN-SA... by S. Kh. Lilothia, R. N. Komarov, V. B. Arutyunyan, V. A. Belov

    Published 2025-05-01
    “…The primary endpoint was a composite of allcause mortality, myocardial infarction (MI), stroke or transient ischemic attack (TIA) and repeat revascularization (major adverse cardiovascular and cerebrovascular events, MACCE) during the long-term follow-up. …”
    Get full text
    Article
  2. 662

    Angus: efficient active learning strategies for provenance based intrusion detection by Lin Wu, Yulai Xie, Jin Li, Dan Feng, Jinyuan Liang, Yafeng Wu

    Published 2025-01-01
    “…Abstract As modern attack methods become more concealed and complex, obtaining many labeled samples in big data streams is difficult. …”
    Get full text
    Article
  3. 663
  4. 664

    COGNITIVE IMPAIRMENTS IN VITAMIN B12 AND FOLIC ACID DEFICIENCIES AND HYPERHOMOCYSTEINEMIA by P. R. Kamchatnov, I. V. Damulin

    Published 2015-05-01
    “…This therapy may be effective in patients with different types of dementia and cognitive diminution, primarily in those with these conditions and its serum concentration of less 150 pmol/l. …”
    Get full text
    Article
  5. 665
  6. 666

    Game-Related Statistics in the Spanish Water Polo League: Differences between Seasons (Estadísticas de partido en la Liga Española de Waterpolo: Diferencias entre temporadas) by María del Carmen Iglesias Pérez, Enrique García Ordóñez, Carlos Touriño González

    Published 2018-01-01
    “…The game-related statistics were clustered into five groups: attacks in relation to the different playing situations, shots in relation to the different playing situations, attacks outcome, origin of shots and technical execution of shots. …”
    Get full text
    Article
  7. 667

    Theoretical and Experimental Study of Corrosion Behavior of Carbon Steel Surface in 3.5% NaCl and 0.5 M HCl with Different Concentrations of Quinolin-2-One Derivative by Rehab Majid Kubba, Mustafa Alaa Mohammed

    Published 2022-02-01
    “…A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namely 7-Ethyl-4-methyl-1-[(4-nitro-benzylidene)-amino]-1H-quinolin-2-one (EMNQ2O). …”
    Get full text
    Article
  8. 668

    A COMPARATIVE STUDY OF EFFICACY AND TOLERABILITY OF ANTIANGINAL DRUGS OF DIFFERENT GROUPS — NITROVASODILATATOR (ISOSORBIDE-5-MONONITRATE SUSTAINED RELEASE) AND BE... by S. Yu. Martsevich, N. P. Kutishenko, V. A. Egorov, A. V. Zagrebel'nyy, A. A. Serazhim, Yu. V. Lukina, N. A. Dmitrieva

    Published 2016-01-01
    “…The drug efficacy was assessed by changes in symptoms, angina attack number , sublingual nitroglycerin need, and treadmill test duration. …”
    Get full text
    Article
  9. 669

    Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts by Xin Liu, Huize Gao, Dan Luo, Lanying Liang, Lu Peng, Yuchen Zhang, Shijie Jia, Gang Xu, Xiubo Chen, Baohua Zhang, Yu Gu

    Published 2025-07-01
    “…This paper applies secure multi-party computation (MPC) to smart contracts, based on the secure computation of intersection, union, and difference of multi-party multisets (IUDMM), to protect data privacy while supporting joint analysis. …”
    Get full text
    Article
  10. 670

    Chemical Terrorism as a Coercive Instrument of Foreign Policy of the US and the West by V. A. Kovtun, A. N. Golipad, A. V. Melnikov, N. I. Mosin, Yu. A. Klimentyev, M. L. Makarov, A. P. Povalikhin

    Published 2023-06-01
    “…The article shows that the destabilization of the situation in the Syrian Arab Republic is caused by the financial support of the so­called «moderate opposition», by the imposition of economic sanctions against the state institutions and also by the false accusations of chemical attacks. The article presents certain facts and evidence from different reliable sources, that allow to suggest the possibility of cooperation of foreign intelligence agencies with the armed groups that were committing chemical terrorist acts. …”
    Get full text
    Article
  11. 671

    Characteristics and Outcomes of Older Patients Undergoing Protected Percutaneous Coronary Intervention With Impella by Philipp Jakob, Alexandra J. Lansky, Mir B. Basir, Michael J. Schonning, Batla Falah, Zhipeng Zhou, Wayne B. Batchelor, Arsalan Abu‐Much, Cindy L. Grines, William W. O'Neill, Barbara E. Stähli

    Published 2025-05-01
    “…Major adverse cardiovascular and cerebral events (composite of all‐cause death, nonfatal myocardial infarction, stroke/transient ischemic attack, and repeat revascularization) were assessed at 30 and 90 days and all‐cause death at 1 year. …”
    Get full text
    Article
  12. 672

    Islamist Terrorist Activity in 2000-2020: A Scoring Methodology by Olga S. Chikrizova

    Published 2024-12-01
    “…This study examines the number of terrorist attacks committed by Islamist groups and their victims between 2000 and 2020, and tests the methodology for scoring their terrorist activities. …”
    Get full text
    Article
  13. 673

    At the Intersection of Faith, Allegiances Toward the State, and Economic Deprivation: The Case of the Christian Democratic Unions in 19th Century Western Europe by Başak Taraktaş

    Published 2022-10-01
    “…Using social identity theory and Lipset’s Rokkan’s cleavage theory, this paper conducts process tracing on the German, French, Italian, Dutch, and Belgian cases to test the following argument: CDUs were more likely to develop in states where anticlerical attacks unleashed a center-periphery conflict. CDUs are less likely to expand in states where anticlerical attacks precipitated a church-state conflict. …”
    Get full text
    Article
  14. 674

    El set cerrado en voleibol. Diferencias y poder discriminatorio de las acciones finales en etapas de formación (Close set in volleyball. Differences and discriminatory power of fin... by Carlos Dávila Romero, Antonio García-Hermoso

    Published 2012-01-01
    “…Statistics analysis shows differences between the condition of both the winner and the loser teams in sets in the positive attack in infantile category and in positive block and error in cadet category. …”
    Get full text
    Article
  15. 675

    The efficacy of colchicine in patients with gout with different missense genetic variants of the <i>ABCG2</i> gene (<i>V12M; rs2231137</i> and <i>Q141K; rs2231142)</i> by M. S. Eliseev, M. N. Chikina, I. A. Guseva, O. V. Zhelyabina, Ya. I. Kuzmina

    Published 2025-04-01
    “…Patients were observed for 6 months; we compared the frequency of arthritis attacks and the intensity of pain according to the visual analogue scale (VAS) for different genotypes of the polymorphism 421C&gt;A of the ABCG2 gene (rs2231142) and for the polymorphism V12M of the ABCG2 gene (rs2231137).Results and discussion. 64% of patients had an CC genotype, 31% had the CA genotype and 5% had the AA genotype of polymorphism 421C&gt;A of the ABCG2 gene (rs2231142). …”
    Get full text
    Article
  16. 676
  17. 677

    Creating Goal Scoring Opportunitites in Men and Women UEFA Champions League Soccer Matches. Tactical Similarities and Differences (Creación de Ocasiones de Gol en la UEFA Champion... by Michalis Mitrotasios, Joaquin González-Rodenas, Vasilis Armatas, Rafael Aranda Malavés

    Published 2022-01-01
    “…In conclusion, there are different tactical behaviours between men and women during the start and development of team possessions in UEFA Champions League soccer matches, while no differences were found at the end of the team possessions.  …”
    Get full text
    Article
  18. 678

    A dual-phase deep learning framework for advanced phishing detection using the novel OptSHQCNN approach by Srikanth Meda, Vangipuram Sesha Srinivas, Killi Chandra Bhushana Rao, Repudi Ramesh, Narasimha Rao Yamarthi

    Published 2025-07-01
    “…Background Phishing attacks are now regarded as one of the most prevalent cyberattacks that often compromise the security of different communication and internet networks. …”
    Get full text
    Article
  19. 679
  20. 680

    Survey of Moving Target Defense in Power Grids: Design Principles, Tradeoffs, and Future Directions by Yexiang Chen, Charalambos Konstantinou, Daisuke Mashima, Anurag K. Srivastava, Subhash Lakshminarayana

    Published 2025-01-01
    “…It aims to solve the long-standing problem of securing the power grid against stealthy attacks. The key idea behind MTD is to introduce periodic/event-triggered controlled changes to the power grid&#x2019;s SCADA network/physical plant, thereby invalidating the knowledge attackers use for crafting stealthy attacks. …”
    Get full text
    Article