Showing 41 - 60 results of 160 for search 'Attack: Part 1', query time: 0.10s Refine Results
  1. 41
  2. 42
  3. 43

    La justice militaire belge en 14-18 : Représentations culturelles et réalités quantitatives by Benoît Amez

    Published 2011-04-01
    “…Quite a lot of Belgian combatants from World War I showed how the military justice was repressive and utterly unequal. …”
    Get full text
    Article
  4. 44

    »Hun plejer da at kunne tåle, at jeg truer med at hente en motorsav ...« – Vold og trusler mod offentligt ansatte undersøgt i en dansk retspsykiatrisk population by Diverse: Møllerhøj, Raben, Sørensen, Brandt-Christensen, Stølan

    Published 2016-09-01
    “…Studies show that victims are most frequently social and health care assistants, nurses and physicians.  This study is part of a larger mixed method study comprising all patients treated in a specialized forensic outreach team (ForACT) in the Mental Health Services in the Capital Region of Denmark over a period of 7½ years (20062014) (n=181). …”
    Get full text
    Article
  5. 45

    « The Fault is that she is my wife » : L’ambivalence des représentations d’Henriette-Marie (1625-1649) by Alice Leroy

    Published 2021-10-01
    “…While her very presence reinforced the trope of Charles I as husband to the nation and father to his people, she also became a source of anxiety at a period when popery and the very institution of the monarchy came under violent attack from a part of the English people.…”
    Get full text
    Article
  6. 46

    Analysis of the Magnus Moment Aerodynamic Characteristics of Rotating Missiles at High Altitudes by Yihang Xu, Shaosong Chen, Hang Zhou

    Published 2021-01-01
    “…The Magnus moment characteristics of rotating missiles with Mach numbers of 1.3 and 1.5 at different altitudes and angles of attack were numerically simulated based on the transition SST model. …”
    Get full text
    Article
  7. 47

    Pripojenie Javoriny a Lesnice k Poľsku 1938–1939 by Pavol Matula

    Published 2015-01-01
    “…The attitude of the local inhabitants to the seceding from Slovakia, and the subsequent Polish pressure, was negative. On 1st September1939, after the German attack on Poland, which the Slovak Army was involved in too, Javorina and Lesnica became a part of Slovakia again. …”
    Get full text
    Article
  8. 48
  9. 49
  10. 50

    Use of the Triptans by Marek J Gawel

    Published 2000-01-01
    “…In the past 10 years, there have been great advances in the understanding of the pathophysiology of the migraine. This has been due in part to the realization that the migraine attack can be blocked by activating the serotonin receptor, namely the 5-hydroxytryptamine/1D receptor. …”
    Get full text
    Article
  11. 51

    Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy by Diah Ratih Destyorini, Ari Kusyanti, Reza Andria Siregar

    Published 2022-12-01
    “…Active attack testing using a known-plaintext attack (KPA) is declared to have failed in obtaining the plaintext value. …”
    Get full text
    Article
  12. 52
  13. 53

    Information security vulnerability scoring model for intelligent vehicles by Haiyang YU, Xiuzhen CHEN, Jin MA, Zhihong ZHOU, Shuning HOU

    Published 2022-02-01
    “…More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the most important factor affecting the vehicle safety.The safety of vehicles is seriously affected by the disclosure of a large number of vulnerabilities, and the wide application of smart cars is also restricted.Vulnerability management is an effective method to reduce the risk of vulnerabilities and improve vehicle security.And vulnerability scoring is one the important step in vulnerability management procedure.However, current method have no capability assessing automotive vulnerabilities reasonably.In order to handle this problem, a vulnerability scoring model for intelligent vehicles was proposed, which was based on CVSS.The attack vector and attack complexity were optimized, and property security, privacy security, functional safety and life safety were added to characterize the possible impact of the vulnerabilities according to the characteristics of intelligent vehicles.With the machine learning method, the parameters in CVSS scoring formula were optimized to describe the characteristics of intelligent vehicle vulnerabilities and adapt to the adjusted and new added weights.It is found in case study and statistics that the diversity and distribution of the model are better than CVSS, which means the model can better score different vulnerabilities.And then AHP is used to evaluate the vulnerability of the whole vehicle based on the vulnerability score of the model, a score is given representing the risk level of whole vehicle.The proposed model can be used to evaluate the severity of information security vulnerabilities in intelligent vehicles and assess the security risks of the entire vehicle or part of the system reasonably, which can provide an evidence for fixing the vulnerabilities or reinforcing the entire vehicle.…”
    Get full text
    Article
  14. 54
  15. 55

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “… Disasters are a part of life. Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
    Get full text
    Article
  16. 56

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “… Disasters are a part of life. Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
    Get full text
    Article
  17. 57

    Traveling Islamophobia in the Global South: by Ashraf Kunnummal & Farid Esack

    Published 2021-05-01
    “… Malala Yousafzai (1997-) became an international icon after Pakistan-based Tehrik-i-Taliban militants attacked her on her way to school on October 9, 2012. …”
    Get full text
    Article
  18. 58

    "Abba" revisited: merging the horizons of history and rhetoric through the new rhetoric structure for metaphors by S. Tsang

    Published 2007-12-01
    “…By looking closely at the theme (i.e., the idea the author tries to convey) and phoros (i.e., the picture the author uses to convey the idea). …”
    Get full text
    Article
  19. 59
  20. 60

    Diplomacy and Recruitment of Mercenaries before the Battle of Žalgiris by Sven Ekdahl

    Published 2010-06-01
    “…Ulrich von Jungingen got this message by the king's emissary on 11 May and immediately stopped the preparations for an intended surprise attack on Poland on 1 June. He had regarded such an attack as legitimate, because the Poles had rejected the arbitration by King Venceslas, and had for that purpose secretly recruited 1,800 mercenaries. …”
    Get full text
    Article