Suggested Topics within your search.
Suggested Topics within your search.
-
41
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01“…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
Get full text
Article -
42
Survey of attack and detection based on the full life cycle of APT
Published 2024-09-01“…For each stage, recent research papers from the past five years were thoroughly reviewed, and the attack and detection techniques for each stage were analyzed. …”
Get full text
Article -
43
Disorders of cardiac hemodynamic in attack period of bronchial asthma in children.
Published 2016-05-01“…Bydopplerechocardiographymethodtherewasstudiedfunctionalstateofcardiacventriclesandcharacterofhemodynamicdisordersin 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. …”
Get full text
Article -
44
EMV Electronic Payment System and its Attacks: A Review
Published 2022-06-01“…The study will document the vulnerabilities that threaten EMV card holders and provide countermeasures against various potential attacks. It also describes the proposed methods that have been introduced in recent years to overcome these attacks and enhance the security level of the EMV protocol. …”
Get full text
Article -
45
Mitigating opinion polarization in social networks using adversarial attacks
Published 2025-03-01“…Abstract In recent years, the spread of social networking services (SNS) has made it easier to connect with people who have similar opinions. …”
Get full text
Article -
46
Rilmenidine treatment in hypertensive patients with cerebrovascular transient ischemic attacks
Published 2005-10-01“…To assess effectiveness of rilmenidine treatment in arterial hypertensive (AH) patients with cerebrovascular transient ischemic attacks (TIA). Material and methods. The study included 39 patients with Stage I-III AH, combined with TIA: 6 males and 33 females; mean age 47±2.7 years. …”
Get full text
Article -
47
Application of Machine Learning for Real-Time Phishing Attack Detection
Published 2025-06-01“… Over the years, the Internet has been exploited to carry out a range of cyber attacks, with phishing being the most prominent one. …”
Get full text
Article -
48
A Panel of Blood Biomarkers for the Diagnosis of Transient Ischemic Attacks
Published 2025-01-01“…Accurate diagnosis of transient ischemic attacks (TIAs) is challenging. This study was aimed at analyzing blood biomarkers to distinguish TIAs from mimics. …”
Get full text
Article -
49
Disorders of cardiac hemodynamic in attack period of bronchial asthma in children
Published 2016-05-01“…By dopplerechocardiography method there was studied functional state of cardiac ventricles and character of hemodynamic disorders in 48 patients aged 5-17 years in attack period of moderately-severe and severe bronchial asthma. …”
Get full text
Article -
50
One year Outcomes of Patients with ST-Segment Elevation Myocardial Infarction
Published 2024-06-01“…The objective of this study is to examine the one-year outcomes of acute myocardial infarction with ST-segment elevation among patients under 40 years old. …”
Get full text
Article -
51
Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations
Published 2024-02-01“…The edge-based detection relies on the behavioral characteristics of the power grid in the presence of interconnected EVCS while combining cyber and physical layer features to implement deep learning algorithms for the effective detection of oscillatory load attacks at the EVCS. The proposed detection approach was evaluated by building a real-time test bed to synthesize benign and malicious data, which was generated by analyzing real-life EV charging data collected during recent years. …”
Get full text
Article -
52
An Indian Gaur (Bos gaurus) Gores in the Western Ghats-A case report
Published 2025-08-01“…The forests of the Western Ghats are home to the tallest bovine in the world, the Indian Bison. While attacks are few, they may result in life-threatening injury. …”
Get full text
Article -
53
Pembrolizumab‐Induced Secondary Hypocorticism Manifesting as a Transitory Ischemic Attack
Published 2025-02-01Get full text
Article -
54
A Puzzle of Vestibular Physiology in a Meniere’s Disease Acute Attack
Published 2015-01-01“…The aim of this paper is to present for the first time the functional evaluation of each of the vestibular receptors in the six semicircular canals in a patient diagnosed with Meniere’s disease during an acute attack. A 54-year-old lady was diagnosed with left Meniere’s disease who during her regular clinic review suffers an acute attack of vertigo, with fullness and an increase of tinnitus in her left ear. …”
Get full text
Article -
55
Unusual Evolution of Carotid Atherosclerosis in a Patient with Transient Ischemic Attack
Published 2025-05-01“…Here, we report an unusual case of a nonsmoker and hypertensive 72-year-old male who was admitted with a transient ischemic attack to the Neurology Department of Clinical County Emergency Hospital Bihor. …”
Get full text
Article -
56
Clinical and psychophysiological analysis of panic attacks in patients with various mental diseases
Published 2011-03-01“…One hundred and ninety-three patients with PA, among whom 80 (30 men and 50 women; mean age 31.5±9.66 years) fully met the inclusion-exclusion criteria, were examined. …”
Get full text
Article -
57
Transtelephonic ECG versus electrophysiologic study in children with recurrent palpitation attacks
Published 1997-01-01“…Twenty-three children (mean age 11.7 +/- 2 years, range 7-16 years) with recurrent palpitation attacks (> 2 times), who had normal physical examinations, ECG, echocardiography, 24 hour ambulatory ECG monitoring and treadmill exercise tests, were included in the study. …”
Get full text
Article -
58
The attacking style of teams is determinant of high-intensity actions of soccer referees
Published 2024-09-01“…A total of 3898 (FRs: 2118; ARs: 1780) actions were analyzed by video-motion to determine attacking style: counterattack (CA), fast attack (FA) and positional attack (PA). …”
Get full text
Article -
59
Analyzing TorrentLocker Ransomware Attacks: A Real Case Study
Published 2024-08-01“…These types of software typically encrypt files on the target device, blocking access, and then demand a ransom. TorrentLocker attacks have become particularly popular in recent years, emerging as prominent threats in the realm of cybersecurity. …”
Get full text
Article -
60
Deep learning-based profiling side-channel attacks in SPECK cipher
Published 2025-07-01“…Abstract Over recent years, deep learning-based profiling side-channel analysis has garnered significant attention in both academia and industry. …”
Get full text
Article