-
1
-
2
-
3
Preparing a Family Communication Plan for Terrorist Attacks
Published 2003-06-01Get full text
Article -
4
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
Published 2023-09-01Subjects: Get full text
Article -
5
Relieve Adversarial Attacks Based on Multimodal Training
Published 2025-01-01“…Adversarial training is an effective defense mechanism that incorporates adversarial samples into the training data, enabling models to better detect and resist attacks. This paper first introduces the principles and types of adversarial attacks, as well as basic concepts and related methods, including Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), DeepFool, and Jacobian Saliency Map Attack (JSMA). …”
Get full text
Article -
6
Inhibition of the Wall-attached Fuel Combustion and the Formation of Aerosol Particle
Published 2021-07-01“…Abstract The wall-attached fuel layer of the combustor usually leads to an unstable combustion and produces an unexpected emission, such as aerosol particles and unburn hydrocarbons. …”
Get full text
Article -
7
Attachment Styles, Personality, and Frustration Intolerance
Published 2021-06-01“…Avoidant attachment stood out for its mediating effect on anxious attachment. …”
Get full text
Article -
8
2022–2023 Florida Citrus Production Guide: Soft-Bodied insects Attacking Foliage and Fruit
Published 2022-08-01Get full text
Article -
9
Kiai sebagai Konselor: Pendekatan Spiritual dalam Mereduksi Panic Attack Santri di Pesantren
Published 2024-12-01Subjects: Get full text
Article -
10
Group visit: Blatant Violation of Patient Rights and a Stigma Attached to Health System Responsiveness
Published 2025-01-01Get full text
Article -
11
-
12
Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks
Published 2025-02-01“…Also, the proposed method improved the detection rate of minority attack classes like U2R in NSLKDD and Hearbleed in CICIDS2017.…”
Get full text
Article -
13
Investigating the Relationship Between Clinical Characteristics, Mental Health, and Vascular Function in Minor Ischemic Stroke or Transient Ischemic Attack Patients
Published 2024-06-01“…However, there is a notable gap in research focusing on the mental and vascular conditions of minor ischemic stroke or transient ischemic attack (TIA) patients, particularly within the Thai population…”
Get full text
Article -
14
A Hidden Surveillant Transmission Line Protection Layer for Cyber-Attack Resilience of Power Systems
Published 2025-01-01“…This article proposes a framework to enhance the resilience of cyber-physical power systems (CPPSs) against cyber-attacks that are capable of bypassing the cyber-based defense mechanisms. …”
Get full text
Article -
15
IMPLICATIONS OF XENOPHOBIC ATTACKS ON NIGERIANS AND NIGERIA-SOUTH AFRICA DIPLOMATIC RELATIONS: A REVIEW OF RE-CURRENT ISSUES
Published 2024-07-01“… This study identifies factors that influence the rise in Xenophobia attacks in South Africa and how that affect diplomatic relations between Nigeria and South Africa on the global stage. …”
Get full text
Article -
16
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…The Random Forest Classifier is the key model analyzing network traffic data to predict the origin of cyber-attacks. By converting IP addresses, packet lengths, and protocol types into numerical features from PCAP files, this study applies machine learning techniques to classify attack behaviors. …”
Get full text
Article -
17
-
18
2006 Florida Citrus Pest Management Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2006-08-01“…ENY-604/CG004: 2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit (ufl.edu) …”
Get full text
Article -
19
2020–2021 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2020-08-01Get full text
Article -
20
Assessment of retention characteristics of different attachments following new modifications (an in vitro study)
Published 2022-07-01Subjects: Get full text
Article