Showing 201 - 220 results of 7,065 for search '((((ceers OR peers) OR shears) OR (cher OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.24s Refine Results
  1. 201

    Brownian dynamics simulation of soft matter with hydrodynamics: methods for constrained systems and shear processing of 2D materials by Funkenbusch, William Tian

    Published 2024
    “…Then, we give a brief introduction on simple shear and discuss how it is implemented in simulations. …”
    Get full text
    Thesis
  2. 202

    On the shear failure of incipient rock discontinuities under CNL and CNS boundary conditions : insights from DEM modelling by Shang, Junlong, Zhao, Zhiye, Ma, S.

    Published 2020
    “…Peak shear stress increased significantly (up to three times) in the CNS direct shear in comparison with that measured in the CNL direct shear under the same initially applied normal stresses. …”
    Get full text
    Journal Article
  3. 203

    A novel method for segmenting growth of cells in sheared endothelial culture reveals the secretion of an anti-inflammatory mediator by Ghim, Mean, Pang, Kuin T., Arshad, Mehwish, Wang, Xiaomeng, Weinberg, Peter D.

    Published 2018
    “…Background: Effects of shear stress on endothelium are important for the normal physiology of blood vessels and are implicated in the pathogenesis of atherosclerosis. …”
    Get full text
    Get full text
    Journal Article
  4. 204

    Maternal postpartum six-week check and short-term health outcomes for women with hypertensive disorders in pregnancy: an observational study using the Clinical Practice Research Datalink (CPRD) by Ramakrishnan, R, Korb, D, Li, Y, Knight, M, Carson, C

    Published 2025
    “…<p><strong>Background:</strong> In the UK, in addition to the recommended blood pressure check, women with hypertensive disorders of pregnancy (HDP) are offered a postpartum six-week check (SWC) with either a specialist or general practitioner. …”
    Journal article
  5. 205

    An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN) by Hussain, Muhammad Zunnurain, Mohd Hanapi, Zurina, Abdullah, Azizol, Hussin, Masnida, Ninggal, Mohd Izuan Hafez

    Published 2024
    “…Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. …”
    Get full text
    Article
  6. 206

    Filter design for cyber‐physical systems against DoS attacks and unreliable networks: a Markovian approach by Oliveira, Pedro M., Palma, Jonathan M., Lacerda, Marcio J.

    Published 2024
    “…The CPS operates on an unreliable network that is susceptible to transmission failures and Denial of Service (DoS) attacks. The attackers have limited energy resources, and the duration of the DoS attack is limited to a maximum number of consecutive time instants. …”
    Get full text
    Article
  7. 207

    CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality Test by Lee, Hyung Tae, Ling, San, Seo, Jae Hong, Wang, Huaxiong

    Published 2017
    “…More precisely, we point out that the proof of the indistinguishability under adaptive chosen ciphertext attack (IND-CCA2) security for their scheme has a serious flaw. …”
    Get full text
    Get full text
    Journal Article
  8. 208

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. The attacks successfully simplified the underlying Closest-Vector Problem (CVP) and made the security of the scheme broken. …”
    Get full text
    Article
  9. 209

    Falling for Rachel / by Roberts, Nora, 1950- author 465662

    Published 2014
    Subjects: “…September 11 Terrorist Attacks, 2001…”
    text
  10. 210
  11. 211
  12. 212

    A highly efficient side channel attack with profiling through relevance-learning on physical leakage information by Ali Akbar Pammu, Chong, Kwen-Siong, Wang, Yi, Gwee, Bah-Hwee

    Published 2021
    “…We propose a Profiling through Relevance-Learning (PRL) technique on Physical Leakage Information (PLI) to extract highly correlated PLI with processed data, as to achieve a highly efficient yet robust Side Channel Attack (SCA). There are four key features in our proposed PRL. …”
    Get full text
    Journal Article
  13. 213

    Supported Lipid Bilayer Platform To Test Inhibitors of the Membrane Attack Complex: Insights into Biomacromolecular Assembly and Regulation by Yorulmaz, Saziye, Jackman, Joshua Alexander, Hunziker, Walter, Cho, Nam-Joon

    Published 2016
    “…Complement activation plays an important role in innate immune defense by triggering formation of the membrane attack complex (MAC), which is a biomacromolecular assembly that exhibits membrane-lytic activity against foreign invaders including various pathogens and biomaterials. …”
    Get full text
    Get full text
    Journal Article
  14. 214

    Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning by Abood, Mohammed Salah, Hua, Wang, Virdee, Bal Singh, He, Dongxuan, Fathy, Maha, Yusuf, Abdulganiyu Abdu, Jamal, Omar, Elwi, Taha A., Alibakhshikenari, Mohammad, Kouhalvandi, Lida, Ahmad, Ashfaq

    Published 2024
    “…The challenge emerges in harmonizing the delivery of Enhanced Mobile Broadband (eMBB), Massive Machine Type Communication (eMTC), and ultra-reliable Low Latency Communication (uRLLC) on a unified physical network while safeguarding against potential attacks. Thus, our study endeavors to construct a comprehensive network-slicing model integrated with an attack detection system within the 5G framework. …”
    Get full text
    Article
  15. 215

    A deep learning-based approach for the detection of various Internet of Things intrusion attacks through optical networks by Imtiaz, Nouman, Wahid, Abdul, Abideen, Syed Zain Ul, Kamal, Mian Muhammad, Sehito, Nabila, Khan, Salahuddin, Virdee, Bal Singh, Kouhalvandi, Lida, Alibakhshikenari, Mohammad

    Published 2025
    “…This research introduces XIoT, a novel Explainable IoT attack detection model created to address the changing cyber risks facing IoT networks, particularly as they interact with optical communication infrastructure. …”
    Get full text
    Article
  16. 216
  17. 217
  18. 218
  19. 219

    Design of a Four-Bar Latch Mechanism and a Shear-Based Rotary Viscous Damper for Single-Axis Prosthetic Knees by Arelekatti, VN Murthy, Petelina, Nina T, Johnson, W Brett, Major, Matthew J, Winter V, Amos G

    Published 2024
    “…The damping module was implemented with a concentric stack of stationary and rotating pairs of plates that shear thin films of high-viscosity silicone oil. …”
    Get full text
    Article
  20. 220

    Ultrasonic welding of novel carbon/Elium® thermoplastic composites with flat and integrated energy directors : lap shear characterisation and fractographic investigation by Bhudolia, Somen K., Gohel, Goram, Kantipudi, Jayaram, Leong, Kah Fai, Jr., Robert J. Barsotti

    Published 2020
    “…The ED integrated configuration showed the best welding results with a lap shear strength of 18.68 MPa. The morphological assessment has shown significant plastic deformation of Elium® resin and the shear cusps formation, which enhances the welding strength. …”
    Get full text
    Journal Article