Suggested Topics within your search.
Suggested Topics within your search.
-
61
Psychological Aspects of the Organization’s Information Security in the Context of Socio-engineering Attacks
Published 2022-03-01“…The second direction involved the analysis of the representation of this problem in the Scopus database over the past 20 years.Results. The analysis of the psychological aspects of the key elements of a socio-engineering attack is carried out: the knowledge and skills of the attacker, organizational conditions, the characteristics of an employee who is part of information systems and the direction of training and prevention. …”
Get full text
Article -
62
Neutrosophic Set and Machine Learning Models for Detection of DoS Attack Resilience
Published 2025-07-01“…Security has been a major problem in in-vehicle networks (VNs) in recent years, assaults that broadcast a deluge of packets, including Denial of Service (DoS) and Distributed Denial of Service (DDoS) assaults, might put the network at risk. …”
Get full text
Article -
63
Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method
Published 2021-06-01“…Ransomware viruses have become a dangerous threat increasing rapidly in recent years. One of the variants is Conti ransomware that can spread infection and encrypt data simultaneously. …”
Get full text
Article -
64
A Survey on Secure WiFi Sensing Technology: Attacks and Defenses
Published 2025-03-01“…However, these techniques are also maliciously used by attackers to eavesdrop on legitimate users and even tamper the sensing results. …”
Get full text
Article -
65
Multi-view adversarial attack defending method for host intrusion detection
Published 2025-01-01“…In recent years, to address increasingly sophisticated host attacks, provenance graphs were leveraged to parse kernel audit logs, and graph neural network (GNN) were employed to train detection models, significantly enhancing detection performance. …”
Get full text
Article -
66
Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain
Published 2025-01-01“…In recent years, CNN-based object detectors have been widely adopted in autonomous systems. …”
Get full text
Article -
67
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Published 2023-01-01“…It reviews the most recent journal articles, conference proceedings, reports, and online resources published during the last five years. We extensively review the malware landscape from 1970 to the present and analyze malware types, operational mechanisms, attack vectors, and vulnerabilities. …”
Get full text
Article -
68
Leveraging the Chain on Goals Model in Football: Applications for Attack and Defensive Play
Published 2025-01-01“…Introduction: Football analysis has experienced significant growth in recent years as an applied research field. This study aims to contribute to this area by applying the chain on goals model to analyze both the attacking and defensive phases of football matches. …”
Get full text
Article -
69
Navigating human-sloth bear encounters and attacks in Nepal’s unprotected forests
Published 2025-09-01“…Within this time period, 66 human-sloth bear encounters involving 69 human individuals were recorded, with an annual average of 2.06 (SD = 1.48) encounters and 1.75 (SD = 1.34) attacks. Encounters primarily involved working-age men (25–55 years old), whose primary occupation was farming and who frequented the forest daily. …”
Get full text
Article -
70
The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges
Published 2025-04-01“…Additionally, it examines the latest side-channel attacks on ASCON were examined. These attacks exploited weaknesses in the hardware implementations rather than in the algorithm itself. …”
Get full text
Article -
71
Risk of Stroke or Heart Attack in Mild Cognitive Impairment and Subjective Cognitive Impairment
Published 2024-11-01“…Background: The study aimed to identify Mild Cognitive Impairment (MCI) as an alert clinical manifestation of increased probability of major acute vascular events (MVEs), such as Ischemic Stroke and heart attack. Methods: In a longitudinal study, 181 (M = 81, F = 100; mean age of 75.8 ± 8.69 years) patients were enrolled and divided into three groups based on diagnosis: Subjective Cognitive Impairment (SCI), amnestic MCI Single Domain (aMCI-SD), and amnestic MCI More Domain (aMCI-MD). …”
Get full text
Article -
72
Pulsating neck mass in a patient with transient ischaemic attack - an unusual case
Published 2025-03-01“…Patients may have a pulsating mass in the front of the neck and may experience compressive symptoms such as difficulty in swallowing and stridor. We discuss a 71-year-old woman who presented with a pulsating anterior neck mass and also experienced a transient ischaemic attack. …”
Get full text
Article -
73
Parent-child mental health in Ukraine in relation to war trauma and drone attacks
Published 2025-05-01“…Background: We aimed to address the knowledge gap regarding mental health in Ukrainian children and parents one year after Russia's 2022 full-scale invasion including associations with exposure to drone attacks. …”
Get full text
Article -
74
Hyperintense Acute Reperfusion Marker on FLAIR in a Patient with Transient Ischemic Attack
Published 2016-01-01“…Here we report the case of an 80-year-old man who presented with transient paresis and sensory loss in the right arm. …”
Get full text
Article -
75
Nontraumatic Bilateral Neck of Femur Fracture in Elderly Male Post-seizure Attack
Published 2023-01-01Get full text
Article -
76
Ectomycorrhizal response to bark beetle attack: a comparison of dead and surviving trees
Published 2025-04-01Get full text
Article -
77
The membrane attack complex as an indicator of complement hyperactivation in type 2 diabetes mellitus
Published 2011-09-01“…12 years). Serum MAC levels were measured by ELISA, C1 and C3 hemolytic activities by usingrabbit antibody-sensitized ram erythrocytes and C1, C3-deficient sera. …”
Get full text
Article -
78
Effect of powdery mildew attack on quality parameters and experimental bread baking of wheat
Published 2006-09-01Get full text
Article -
79
A New Mechanism to Improve the Detection Rate of Shilling Attacks in the Recommender Systems
Published 2017-12-01“…In recent years, efficient attack detection algorithms have been proposed, but each has its own limitations. …”
Get full text
Article -
80
The determinants of angioedema attacks related to dental and gingival procedures in hereditary angioedema patients
Published 2025-07-01“…Data included demographics, clinical details, intervention history, and types of procedures, aiming to understand acute attack patterns. Results A total of 40 HAE-C1INH patients (36 type 1; 23 female; median age 41.5 (30.8–53.5) years; median disease onset age 10.5 (5.0–15.0) years; median annual attack frequency 24.5 (12.0–52.0) were analyzed. …”
Get full text
Article