Showing 41 - 60 results of 1,803 for search 'year attacks', query time: 0.12s Refine Results
  1. 41

    Analysis of DoS attacks on Docker inter-component stdio copy by Tianyu ZHOU, Wenbo SHEN, Nanzi YANG, Jinku LI, Chenggang QIN, Wang YU

    Published 2020-12-01
    “…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
    Get full text
    Article
  2. 42

    Survey of attack and detection based on the full life cycle of APT by WANG Zhiwei, HE Xijie, YI Xin, LI Ziyang, CAO Xudong, YIN Tao, LI Shuhao, FU Anmin, ZHANG Yuqing

    Published 2024-09-01
    “…For each stage, recent research papers from the past five years were thoroughly reviewed, and the attack and detection techniques for each stage were analyzed. …”
    Get full text
    Article
  3. 43

    Disorders of cardiac hemodynamic in attack period of bronchial asthma in children. by V. А. Kondratiev, А. V. Reznyk

    Published 2016-05-01
    “…Bydopplerechocardiographymethodtherewasstudiedfunctionalstateofcardiacventriclesandcharacterofhemodynamicdisordersin 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. …”
    Get full text
    Article
  4. 44

    EMV Electronic Payment System and its Attacks: A Review by Ahmed ِAlqassab, Yassin Hikmat Ismael

    Published 2022-06-01
    “…The study will document the vulnerabilities that threaten EMV card holders and provide countermeasures against various potential attacks. It also describes the proposed methods that have been introduced in recent years to overcome these attacks and enhance the security level of the EMV protocol. …”
    Get full text
    Article
  5. 45

    Mitigating opinion polarization in social networks using adversarial attacks by Michinori Ninomiya, Genki Ichinose, Katsumi Chiyomaru, Kazuhiro Takemoto

    Published 2025-03-01
    “…Abstract In recent years, the spread of social networking services (SNS) has made it easier to connect with people who have similar opinions. …”
    Get full text
    Article
  6. 46

    Rilmenidine treatment in hypertensive patients with cerebrovascular transient ischemic attacks by A. P. Kondrakhin, G. N. Gorokhovskaya, A. I. Martynov

    Published 2005-10-01
    “…To assess effectiveness of rilmenidine treatment in arterial hypertensive (AH) patients with cerebrovascular transient ischemic attacks (TIA). Material and methods. The study included 39 patients with Stage I-III AH, combined with TIA: 6 males and 33 females; mean age 47±2.7 years. …”
    Get full text
    Article
  7. 47

    Application of Machine Learning for Real-Time Phishing Attack Detection by Akshay Shankar Agrawal, Sanketi Raut, Andrina Dsouza, Jimit Mehta, Prajwal Naik

    Published 2025-06-01
    “… Over the years, the Internet has been exploited to carry out a range of cyber attacks, with phishing being the most prominent one. …”
    Get full text
    Article
  8. 48

    A Panel of Blood Biomarkers for the Diagnosis of Transient Ischemic Attacks by Daisy Guamán-Pilco, Elena Palà, Marcel Lamana-Vallverdú, Anna Penalba, Paula García-Rodríguez, Marta Rubiera, Alejandro Bustamante, Soledad Pérez-Sánchez, Joan Montaner

    Published 2025-01-01
    “…Accurate diagnosis of transient ischemic attacks (TIAs) is challenging. This study was aimed at analyzing blood biomarkers to distinguish TIAs from mimics. …”
    Get full text
    Article
  9. 49

    Disorders of cardiac hemodynamic in attack period of bronchial asthma in children by Kondratiev V.А., Reznyk А.V.

    Published 2016-05-01
    “…By dopplerechocardiography method there was studied functional state of cardiac ventricles and character of hemodynamic disorders in 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. …”
    Get full text
    Article
  10. 50

    One year Outcomes of Patients with ST-Segment Elevation Myocardial Infarction by Reza Heidari Moghaddam, Mehdi Geravandi, Parinaz Taheri, Nahid Salehi, Mohammed Rouzbahani

    Published 2024-06-01
    “…The objective of this study is to examine the one-year outcomes of acute myocardial infarction with ST-segment elevation among patients under 40 years old. …”
    Get full text
    Article
  11. 51

    Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations by Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Chadi Assi

    Published 2024-02-01
    “…The edge-based detection relies on the behavioral characteristics of the power grid in the presence of interconnected EVCS while combining cyber and physical layer features to implement deep learning algorithms for the effective detection of oscillatory load attacks at the EVCS. The proposed detection approach was evaluated by building a real-time test bed to synthesize benign and malicious data, which was generated by analyzing real-life EV charging data collected during recent years. …”
    Get full text
    Article
  12. 52

    An Indian Gaur (Bos gaurus) Gores in the Western Ghats-A case report by Freston Marc Sirur, Priya Dugani, Neeraja A. Nair, Sudiksha, Vrinda Lath

    Published 2025-08-01
    “…The forests of the Western Ghats are home to the tallest bovine in the world, the Indian Bison. While attacks are few, they may result in life-threatening injury. …”
    Get full text
    Article
  13. 53
  14. 54

    A Puzzle of Vestibular Physiology in a Meniere’s Disease Acute Attack by Marta Martinez-Lopez, Raquel Manrique-Huarte, Nicolas Perez-Fernandez

    Published 2015-01-01
    “…The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere’s disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere’s disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. …”
    Get full text
    Article
  15. 55

    Unusual Evolution of Carotid Atherosclerosis in a Patient with Transient Ischemic Attack by Corina Cinezan, Camelia Bianca Rus, Ioana Tiberia Ilias, Alexandra Comanescu, Alexandra Cinezan

    Published 2025-05-01
    “…Here, we report an unusual case of a nonsmoker and hypertensive 72-year-old male who was admitted with a transient ischemic attack to the Neurology Department of Clinical County Emergency Hospital Bihor. …”
    Get full text
    Article
  16. 56

    Clinical and psychophysiological analysis of panic attacks in patients with various mental diseases by N. V. Tuter, N. A. Tyuvina

    Published 2011-03-01
    “…One hundred and ninety-three patients with PA, among whom 80 (30 men and 50 women; mean age 31.5±9.66 years) fully met the inclusion-exclusion criteria, were examined. …”
    Get full text
    Article
  17. 57

    Transtelephonic ECG versus electrophysiologic study in children with recurrent palpitation attacks by A Celiker, K Tokel, M Medikoğlu, S Ozme

    Published 1997-01-01
    “…Twenty-three children (mean age 11.7 +/- 2 years, range 7-16 years) with recurrent palpitation attacks (> 2 times), who had normal physical examinations, ECG, echocardiography, 24 hour ambulatory ECG monitoring and treadmill exercise tests, were included in the study. …”
    Get full text
    Article
  18. 58

    The attacking style of teams is determinant of high-intensity actions of soccer referees by Paulo Sandi, Anderson S Teixeira, Gabriel S G Maia, Pedro V S Passos, Paulo V Souza, Carlo Castagna, Paulo H Borges, Juliano F Silva

    Published 2024-09-01
    “…A total of 3898 (FRs: 2118; ARs: 1780) actions were analyzed by video-motion to determine attacking style: counterattack (CA), fast attack (FA) and positional attack (PA). …”
    Get full text
    Article
  19. 59

    Analyzing TorrentLocker Ransomware Attacks: A Real Case Study by İlker Kara

    Published 2024-08-01
    “…These types of software typically encrypt files on the target device, blocking access, and then demand a ransom. TorrentLocker attacks have become particularly popular in recent years, emerging as prominent threats in the realm of cybersecurity. …”
    Get full text
    Article
  20. 60

    Deep learning-based profiling side-channel attacks in SPECK cipher by Faisal Hameed, Hoda Alkhzaimi

    Published 2025-07-01
    “…Abstract Over recent years, deep learning-based profiling side-channel analysis has garnered significant attention in both academia and industry. …”
    Get full text
    Article