نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
Background—Lower-extremity peripheral arterial disease (PAD) is associated with decreased functional status, diminished quality of life, amputation, myocardial infarction, stroke, and death. Nevertheless, public knowledge of PAD as a morbid and mortal disease has not been previously assessed. Methods and Results—We performed a cross-sectional, population-based telephone survey of a nationally r...
background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...
Recent studies on adversarial examples expose vulnerabilities of natural language processing (NLP) models. Existing techniques for generating are typically driven by deterministic heuristic rules that agnostic to the optimal examples, a strategy often results in attack failures. To this end, research proposes Fraud's Bargain Attack (FBA), which utilizes novel randomization mechanism enlarge sea...
Adversarial attacks on graphs have attracted considerable research interests. Existing works assume the attacker is either (partly) aware of victim model, or able to send queries it. These assumptions are, however, unrealistic. To bridge gap between theoretical graph and real-world scenarios, in this work, we propose a novel more realistic setting: strict black-box attack, which has no knowledg...
In a provenance-aware system, mechanisms gather and report metadata that describes the history of each object being processed on the system, allowing users to understand how data objects came to exist in their present state. However, while past work has demonstrated the usefulness of provenance, less attention has been given to securing provenance-aware systems. Provenance itself is a ripe atta...
background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...
Mobile technology and Internet is becoming an integral part of our daily life. Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. In mobile computing, the characteristic like context awareness allows to provide proactively adapted services to user according to...
BACKGROUND The objectives of the study were to examine linkages between exposure to childhood abuse and interparental violence and the subsequent development of panic attacks and panic disorder using data gathered on a birth cohort of 1265 New Zealand young people studied to the age of 21 years. METHOD Data on: (a) exposure to child abuse and interparental violence; (b) the development of pan...
We were not surprised by the opinion piece written for the Cambridge Quarterly by George J. Agich, Ph.D., who chairs the Cleveland Clinic Foundation’s bioethics department. Dr. Agich uses the article to attack those who criticized his institution’s proposed non-heart-beating organ donor protocol. Because we reported on this controversy for 60 Minutes in April 1997, we wanted to set the record s...
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new model to describe some new phishing attacks, some of which belong to a new class of abuse introduced herein: the context aware phishing attacks. We describe ways of using the model we introduce to quantify the risks of an ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید