-
1
-
2
PROMISING WATERMELON VARIETY ‘METEOR’
Published 2018-02-01“…According to research results, comparative characteristics between new promising variety ‘Meteor’ and control variety ‘Zenith’ were given. …”
Get full text
Article -
3
The role of diet in the prevention of migraine attacks
Published 2021-11-01“…An update on the role of diet in the pathogenesis and prevention of migraine attacks is an extremely important and promising scientific field, which requires further research with the development of personalized approaches taking into account the individual characteristics of each patient.…”
Get full text
Article -
4
-
5
Face Spoof Attack Recognition Using Discriminative Image Patches
Published 2016-01-01“…Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.…”
Get full text
Article -
6
Hybridization of Swarm for Features Selection to Modeling Heart Attack Data
Published 2022-12-01“…Predicting heart attacks using machine learning is an important topic. …”
Get full text
Article -
7
Attacks and countermeasures on federated learning via historical knowledge modeling
Published 2025-07-01“…Abstract Federated learning has emerged as a promising paradigm for privacy-preserving multi-source data fusion. …”
Get full text
Article -
8
Physics-Informed Graph Neural Networks for Attack Path Prediction
Published 2025-04-01“…The automated identification and evaluation of potential attack paths within infrastructures is a critical aspect of cybersecurity risk assessment. …”
Get full text
Article -
9
The study of promising secure information systems based on signal modeling
Published 2019-05-01“…Instead, you have to think about such things as data manipulation attacks, which, for example, can be used to command the mechanisms to perform certain actions (for example, open the door or take control of an unmanned vehicle). …”
Get full text
Article -
10
Towards distinguishing trust based attacks in an IoV network
Published 2025-05-01“…Nevertheless, trust-based attacks also present a formidable challenge. Therefore, in this paper, an IoV-based trust management heuristic has been envisaged that takes into account both direct trust and indirect trust to ascertain the behaviors of the vehicles vis-à-vis time in a bid to detect various trust-based attacks, i.e., zig-zag attacks, self-promoting attacks, on-off attacks, and opportunistic attacks, along with the attackers’ multiple attacking strategies. …”
Get full text
Article -
11
Informer-based DDoS attack detection method for the power Internet of Things.
Published 2025-01-01“…Traditional network intrusion detection systems often rely on manually engineered features, which are not only resource-intensive but also struggle to handle the diverse range of attack types. This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. …”
Get full text
Article -
12
Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study
Published 2020-01-01“…Multivariate cryptography is one of the most promising candidates for post-quantum cryptography. …”
Get full text
Article -
13
On the generalisation capabilities of Fisher vector‐based face presentation attack detection
Published 2021-09-01“…A feature space based on Fisher Vectors computed from compact binarised statistical image features histograms, which allows discovering semantic feature subsets from known samples to enhance the detection of unknown attacks is presented. This representation, which is evaluated for challenging unknown attacks taken from freely available facial databases, reports promising results. …”
Get full text
Article -
14
Transgenic poplar for resistance against pest and pathogen attack in forests: an overview
Published 2024-12-01“…However, several biotic stresses, such as attacks by pests and pathogens, severely affect poplar production and productivity. …”
Get full text
Article -
15
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01“…The study’s findings demonstrate that peer pressure, failure to provide the promised basic needs to the citizens, and denialism by the government all contribute to the xenophobic attacks in South Africa. …”
Get full text
Article -
16
You Only Attack Once: Single-Step DeepFool Algorithm
Published 2024-12-01“…Under a single iteration, it achieves a 70.6% higher success rate of the attacks compared to the DeepFool algorithm. Our proposed method shows promise for widespread application in both offensive and defensive strategies for diverse deep learning models. …”
Get full text
Article -
17
Teplizumab: a promising intervention for delaying type 1 diabetes progression
Published 2025-04-01“…Type 1 diabetes (T1D) arises from an autoimmune attack on pancreatic beta cells, leading to a reliance on external insulin to maintain glucose levels. …”
Get full text
Article -
18
Intratumoral immunotherapy prior to cancer surgery, a promising therapeutic approach
Published 2025-06-01Get full text
Article -
19
DDoS Attacks Detection With Deep Learning Approach Using Convolutional Neural Network
Published 2024-08-01“…The detection system of DDoS (Distributed Denial-of-Service) attacks aims to enhance network security across all facets of internet technology utilization. …”
Get full text
Article -
20
Hybrid genetic algorithm and deep learning techniques for advanced side-channel attacks
Published 2025-07-01“…These findings validate genetic algorithms as a robust alternative for optimizing side-channel attack models, offering both scalability and consistent performance across diverse attack scenarios while advancing the state of cryptographic security assessment.…”
Get full text
Article