Showing 21 - 40 results of 160 for search 'Attack: Part 1', query time: 0.12s Refine Results
  1. 21
  2. 22
  3. 23

    Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers by Deepalakshmi Babu Venkateswaran, Zhihua Qu

    Published 2024-01-01
    “…The simulation section, divided into two parts, demonstrates the effectiveness of the algorithm: one part showcases its scalability in a large-scale system, and the other applies it to a real-world power system using the IEEE 123-node system. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26

    Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks by P. Mamatha, S. Balaji, S. Sai Anuraghav

    Published 2025-02-01
    “…In recent times, intrusion detection systems (IDS) have developed a vital part in ensuring security against these growing attacks. …”
    Get full text
    Article
  7. 27
  8. 28

    Effect of variety and nutrient on insect pest infestation of <i>Amaranthus spp</i> by ABO Ogedegbe, AE Ezeh

    Published 2015-07-01
    “…Amaranthus species is one of the plants often considered as the most important green leaf vegetable in Nigeria and other countries. …”
    Get full text
    Article
  9. 29

    Effect of variety and nutrient on insect pest infestation of <i>Amaranthus spp</i> by ABO Ogedegbe, AE Ezeh

    Published 2015-07-01
    “…Amaranthus species is one of the plants often considered as the most important green leaf vegetable in Nigeria and other countries. …”
    Get full text
    Article
  10. 30

    Investigating the Relationship Between Clinical Characteristics, Mental Health, and Vascular Function in Minor Ischemic Stroke or Transient Ischemic Attack Patients by Witid Mitranun, Witoon Mitarnun, Prasit Peepathum, Amorntheap Wandee, Wenika Mitarnun, Wilasinee Pangwong, Tanormsak Senakham

    Published 2024-06-01
    “…However, there is a notable gap in research focusing on the mental and vascular conditions of minor ischemic stroke or transient ischemic attack (TIA) patients, particularly within the Thai population…”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    Assessing the inflammation in pediatric MOGAD: Significance of CSF HMGB1 and related biomarkers by Xin Wang, Ruibin Zhao, Jiayu Fan, Chong Liu, Li Zhang, Huafang Yang, Weiyi Wang

    Published 2025-02-01
    “…Moreover, we found notable correlation between HMGB1 levels and EDSS (P &lt; 0.05) scores. IL-6 levels were significantly correlated with the total number of attacks (P &lt; 0.05), but not with EDSS scores.ConclusionsThese findings suggest that NLRP3, HMGB1, and IL-6 in the CSF may be potential therapeutic targets and are at least partly involved in the pathogenesis of pediatric MOGAD. …”
    Get full text
    Article
  18. 38
  19. 39

    PECULIARITIES OF CARBOHYDRATE METABOLISM INDICATORS, THE FUNCTIONAL STATE OF THE THYROID GLAND IN THE COURSE TREATMENT WITH TELMISARTAN AS PART OF THE COMPLEX THERAPY OF PATIENTS W... by Nataliya Chmyr, Roman Dutka, Halyna Svitlyk, Iryna Dronyk, Khrystyna Abrahamovych, Oksana Didenko, Nataliia Drobin'ska

    Published 2023-12-01
    “…In the group taking Telmisartan as part of complex treatment, a decrease in clinical manifestations of syntropic pathology was found, and the presence of positive dynamics of diastolic blood pressure indicators was noted even after 1 month of treatment. …”
    Get full text
    Article
  20. 40