Search alternatives:
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
shears » shear (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
shears » shear (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
trackers » tracker (Expand Search), traces (Expand Search), tracks (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checks » check (Expand Search)
-
201
Brownian dynamics simulation of soft matter with hydrodynamics: methods for constrained systems and shear processing of 2D materials
Published 2024“…Then, we give a brief introduction on simple shear and discuss how it is implemented in simulations. …”
Get full text
Thesis -
202
On the shear failure of incipient rock discontinuities under CNL and CNS boundary conditions : insights from DEM modelling
Published 2020“…Peak shear stress increased significantly (up to three times) in the CNS direct shear in comparison with that measured in the CNL direct shear under the same initially applied normal stresses. …”
Get full text
Journal Article -
203
A novel method for segmenting growth of cells in sheared endothelial culture reveals the secretion of an anti-inflammatory mediator
Published 2018“…Background: Effects of shear stress on endothelium are important for the normal physiology of blood vessels and are implicated in the pathogenesis of atherosclerosis. …”
Get full text
Get full text
Journal Article -
204
Maternal postpartum six-week check and short-term health outcomes for women with hypertensive disorders in pregnancy: an observational study using the Clinical Practice Research Datalink (CPRD)
Published 2025“…<p><strong>Background:</strong> In the UK, in addition to the recommended blood pressure check, women with hypertensive disorders of pregnancy (HDP) are offered a postpartum six-week check (SWC) with either a specialist or general practitioner. …”
Journal article -
205
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
Published 2024“…Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. …”
Get full text
Article -
206
Filter design for cyber‐physical systems against DoS attacks and unreliable networks: a Markovian approach
Published 2024“…The CPS operates on an unreliable network that is susceptible to transmission failures and Denial of Service (DoS) attacks. The attackers have limited energy resources, and the duration of the DoS attack is limited to a maximum number of consecutive time instants. …”
Get full text
Article -
207
CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test
Published 2017“…More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. …”
Get full text
Get full text
Journal Article -
208
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. The attacks successfully simplified the underlying Closest-Vector Problem (CVP) and made the security of the scheme broken. …”
Get full text
Article -
209
-
210
Impact of the Wireless Network’s PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid
Published 2018Subjects: Get full text
Get full text
Journal Article -
211
-
212
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information
Published 2021“…We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. …”
Get full text
Journal Article -
213
Supported Lipid Bilayer Platform To Test Inhibitors of the Membrane Attack Complex: Insights into Biomacromolecular Assembly and Regulation
Published 2016“…Complement activation plays an important role in innate immune defense by triggering formation of the membrane attack complex (MAC), which is a biomacromolecular assembly that exhibits membrane-lytic activity against foreign invaders including various pathogens and biomaterials. …”
Get full text
Get full text
Journal Article -
214
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning
Published 2024“…The challenge emerges in harmonizing the delivery of Enhanced Mobile Broadband (eMBB), Massive Machine Type Communication (eMTC), and ultra-reliable Low Latency Communication (uRLLC) on a unified physical network while safeguarding against potential attacks. Thus, our study endeavors to construct a comprehensive network-slicing model integrated with an attack detection system within the 5G framework. …”
Get full text
Article -
215
A deep learning-based approach for the detection of various Internet of Things intrusion attacks through optical networks
Published 2025“…This research introduces XIoT, a novel Explainable IoT attack detection model created to address the changing cyber risks facing IoT networks, particularly as they interact with optical communication infrastructure. …”
Get full text
Article -
216
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system
Published 2017Subjects: Get full text
Get full text
Journal Article -
217
Discovery of reversing enzymes for RNA ADP-ribosylation reveals a possible defence module against toxic attack
Published 2025Journal article -
218
-
219
Design of a Four-Bar Latch Mechanism and a Shear-Based Rotary Viscous Damper for Single-Axis Prosthetic Knees
Published 2024“…The damping module was implemented with a concentric stack of stationary and rotating pairs of plates that shear thin films of high-viscosity silicone oil. …”
Get full text
Article -
220
Ultrasonic welding of novel carbon/Elium® thermoplastic composites with flat and integrated energy directors : lap shear characterisation and fractographic investigation
Published 2020“…The ED integrated configuration showed the best welding results with a lap shear strength of 18.68 MPa. The morphological assessment has shown significant plastic deformation of Elium® resin and the shear cusps formation, which enhances the welding strength. …”
Get full text
Journal Article