Results 261 to 270 of about 257,742 (291)
Some of the next articles are maybe not open access.
Of generators, networks and migraine attacks
Current Opinion in Neurology, 2017Purpose of reviewOne of the most discussed topics in migraine pathophysiology is where migraine attacks originate. Although recent evidence suggests central attack generating loci, there is an ongoing debate about the involved centres of the brain and brainstem.Recent findingsRecent neuroimaging studies focussing on the preictal stage of migraine ...
Laura H. Schulte, Arne May
openaire +2 more sources
Generalized Attacker and Attack Models for Cyber Physical Systems
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016An attacker model is proposed for Cyber Physical Systems (CPS). The attack models derived from the attacker model are used to generate parameterized attack procedures and functions that target a specific CPS. The proposed models capture both physical and cyber attacks and unify a number of existing attack models into a common framework useful for ...
Sridhar Adepu, Aditya Mathur
openaire +1 more source
2016
Proposal of a high speed packet flooding device is presented in this paper. The product is based on the FPGA (Field-programmable Gate Array) platform, developed in VHDL (Very high speed integrated circuit Hardware Description Language) and set into the NetCOPE environment. It uses an existing solution of packet generator.
openaire +1 more source
Proposal of a high speed packet flooding device is presented in this paper. The product is based on the FPGA (Field-programmable Gate Array) platform, developed in VHDL (Very high speed integrated circuit Hardware Description Language) and set into the NetCOPE environment. It uses an existing solution of packet generator.
openaire +1 more source
When attorneys general attack.
Modern healthcare, 2009As more state attorneys general take on healthcare issues, providers are feeling the heat Illinois' Lisa Madigan first had a tense relationship with hospitals, but things have improved. "Because the attorney general and her staff were open to interaction, dialogue and debate, even when we had serious disagreement, it resulted in being able to develop ...
openaire +1 more source
Attack graph generation and analysis
Proceedings of the 2006 ACM Symposium on Information, computer and communications security, 2006Attack graphs represent the ways in which an adversary can exploit vulnerabilities to break into a system. System administrators analyze these attack graphs to understand where their system's weaknesses lie and to help decide which security measures will be effective to deploy. In practice, attack graphs are produced manually by Red Teams. Construction
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
Attack-words Guided Sentence Generation for Textual Adversarial Attack
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), 2021Huan Zhang +5 more
openaire +1 more source
Generic Attacks on Feistel Schemes
2001Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that for most such schemes A: 1. It is possible to distinguish A from a random permutation from 2n bits to 2n bits after doing at most O(2 7n/4) computations with O(2 7n/4) random plaintext/ciphertext pairs. 2.
openaire +1 more source
Attribute attack graph generation method based on attack stage
2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT), 2021ShuChen Teng, Bin Wu
openaire +1 more source

