Results 261 to 270 of about 257,742 (291)
Some of the next articles are maybe not open access.

Of generators, networks and migraine attacks

Current Opinion in Neurology, 2017
Purpose of reviewOne of the most discussed topics in migraine pathophysiology is where migraine attacks originate. Although recent evidence suggests central attack generating loci, there is an ongoing debate about the involved centres of the brain and brainstem.Recent findingsRecent neuroimaging studies focussing on the preictal stage of migraine ...
Laura H. Schulte, Arne May
openaire   +2 more sources

Generalized Attacker and Attack Models for Cyber Physical Systems

2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016
An attacker model is proposed for Cyber Physical Systems (CPS). The attack models derived from the attacker model are used to generate parameterized attack procedures and functions that target a specific CPS. The proposed models capture both physical and cyber attacks and unify a number of existing attack models into a common framework useful for ...
Sridhar Adepu, Aditya Mathur
openaire   +1 more source

Flood attacks generation

2016
Proposal of a high speed packet flooding device is presented in this paper. The product is based on the FPGA (Field-programmable Gate Array) platform, developed in VHDL (Very high speed integrated circuit Hardware Description Language) and set into the NetCOPE environment. It uses an existing solution of packet generator.
openaire   +1 more source

When attorneys general attack.

Modern healthcare, 2009
As more state attorneys general take on healthcare issues, providers are feeling the heat Illinois' Lisa Madigan first had a tense relationship with hospitals, but things have improved. "Because the attorney general and her staff were open to interaction, dialogue and debate, even when we had serious disagreement, it resulted in being able to develop ...
openaire   +1 more source

Attack graph generation and analysis

Proceedings of the 2006 ACM Symposium on Information, computer and communications security, 2006
Attack graphs represent the ways in which an adversary can exploit vulnerabilities to break into a system. System administrators analyze these attack graphs to understand where their system's weaknesses lie and to help decide which security measures will be effective to deploy. In practice, attack graphs are produced manually by Red Teams. Construction
openaire   +1 more source

Integrative oncology: Addressing the global challenges of cancer prevention and treatment

Ca-A Cancer Journal for Clinicians, 2022
Jun J Mao,, Msce   +2 more
exaly  

Attack-words Guided Sentence Generation for Textual Adversarial Attack

2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), 2021
Huan Zhang   +5 more
openaire   +1 more source

Generic Attacks on Feistel Schemes

2001
Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that for most such schemes A: 1. It is possible to distinguish A from a random permutation from 2n bits to 2n bits after doing at most O(2 7n/4) computations with O(2 7n/4) random plaintext/ciphertext pairs. 2.
openaire   +1 more source

Attribute attack graph generation method based on attack stage

2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT), 2021
ShuChen Teng, Bin Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy