Results 181 to 190 of about 587,598 (211)
Endoscopic and Histological Analysis on Bronchial Asthma : correlation with the severity of attack
Tohru Natsuizaka +6 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Brain Attack: Correlative Anatomy
Journal of Neuroscience Nursing, 1997Approximately 500,000 people suffer a new or recurrent brain attack each year. Despite advanced treatments, stroke continues to be the third leading cause of death in the United States. Survivors of stroke experience many different clinical problems and neurological deficits. Individual symptomatology varies according to specific vessel involvement and
L, Testani-Dufour, C A, Morrison
openaire +2 more sources
Attack Subplan-Based Attack Scenario Correlation
2007 International Conference on Machine Learning and Cybernetics, 2007There are various security sensors deployed in the network to protect the information assets from destruction. These sensors produce a huge amount of alerts in different event granularities and semantics. Such a huge amount of alerts is hard to be comprehended; as a result, a timely response to the attacks is difficult.
Sheng-Hui Chien +3 more
openaire +1 more source
Vectorial Approach to Fast Correlation Attacks
Designs, Codes and Cryptography, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Golić, Jovan Dj., Hawkes, Philip
openaire +2 more sources
Correlations Between Cyberspace Attacks and Kinetic Attacks
2020 12th International Conference on Cyber Conflict (CyCon), 2020Although confrontations in cyberspace can conceivably stay in cyberspace (or at least not involve violent conflict), they can also become entangled with confrontations in the physical world. This paper explores how, by raising the following questions: (1) Do countries retaliate in the real world for operations in cyberspaceƒ (2) Would countries make an
openaire +1 more source
Neural correlates of spontaneous panic attacks
Journal of Neural Transmission, 2011In this report, we present two anxiety disorder patients who spontaneously experienced a panic attack during an fMRI examination and subsequently aborted the measurement. We analyzed the functional data gathered up to that point in relation to the patients' subsequent verbal reports of the course of the panic attacks. Within prominent structures of the
Thomas, Dresler +8 more
openaire +2 more sources
The correlation coefficient attacks again
Accreditation and Quality Assurance, 2006The use of the correlation coefficient for testing the linearity of calibration curves is performed according to the ANOVA checking of the lack-of-fit. The procedure is illustrated from a case study.
A. Gustavo González +3 more
openaire +1 more source
Decimation-Based Fast Correlation Attack
2007 IEEE International Symposium on Information Theory, 2007In this paper, the gains achievable by proper decimation (or puncturing) of the received sample for fast correlation attack are investigated. In particular, the instances in which such an approach is interesting are clearly identified.
Marc Fossorier +2 more
openaire +1 more source
Correlation attacks on combination generators
Cryptography and Communications, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Canteaut, Anne, Naya-Plasencia, María
openaire +3 more sources
Correlated Attack Modeling (CAM)
2003Abstract : This report describes research into the nature of multistep cyber attack scenarios, aimed toward automatic detection and identification of such attacks. Previous work in intrusion detection and cyber attack analysis has been focused mainly on isolated attack steps, and less on how such steps are combined into composite scenarios. The purpose
Rico Valdez +2 more
openaire +1 more source

