نتایج جستجو برای: nano fe3o4py apts

تعداد نتایج: 50804  

2017
Pavlos Lamprakis Ruggiero Dargenio David Gugelmann Vincent Lenders Markus Happe Laurent Vanbever

HTTP is the main protocol used by attackers to establish a command and control (C&C) channel to infected hosts in a network. Identifying such C&C channels in network traffic is however a challenge because of the large volume and complex structure of benign HTTP requests emerging from regular user browsing activities. A common approach to C&C channel detection has been to use supervised learning...

2011
Sandra Lucarelli Giovanni Di Nardo Ginevra Lastrucci Ylenia D'Alfonso Adriana Marcheggiano Tatiana Federici Simone Frediani Tullio Frediani Salvatore Cucchiara

BACKGROUND Allergic proctocolitis (APC) in exclusively breast-fed infants is caused by food proteins, deriving from maternal diet, transferred through lactation. In most cases a maternal cow milk-free diet leads to a prompt resolution of rectal bleeding, while in some patients a multiple food allergy can occur. The aim of this study was to assess whether the atopy patch test (APT) could be help...

Journal: :Biochemical Society transactions 2013
Michael J Shipston

BK (large conductance calcium- and voltage-activated potassium) channels are important determinants of physiological control in the nervous, endocrine and vascular systems with channel dysfunction associated with major disorders ranging from epilepsy to hypertension and obesity. Thus the mechanisms that control channel surface expression and/or activity are important determinants of their (path...

Journal: :Nanoscale 2015
Cheng-Han Lin Jen-Hsuan Chang Yi-Qi Yeh Si-Han Wu Yi-Hsin Liu Chung-Yuan Mou

Uniform hollow silica nanospheres (HSNs) synthesized with reverse microemulsion have great application potential as nanoreactors because enzymes or nanocatalysts can be easily encapsulated de novo in synthesis. Water-in-oil (w/o) reverse microemulsions comprising the polymeric surfactant polyoxyethylene (5) isooctylphenyl ether (Igepal CA-520), ammonia and water in a continuous oil phase (alkan...

Journal: :Journal of advances in mathematics and computer science 2023

The essence of surrogate model is a low-cost alternative, which mainly replaces the computationally heavy simulation process to reduce time cost consumed. In past two decades, this approximation based optimization method has made remarkable progress, and models are widely used in expensive analysis optimization. addition, with development technology, no longer simple substitute, but can drive n...

Journal: :IEEE Access 2022

In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending network perimeter is no longer sufficient. Zero Trust Architecture (ZTA) has recently emerged security model in which breach dominates threat model. By default, ZTA considers any endpoint (i.e., device), user, or application to be untru...

Journal: :IEEE Transactions on Software Engineering 2023

Software updates reduce the opportunity for exploitation. However, since can also introduce breaking changes, enterprises face problem of balancing need to secure software with support operations. We propose a methodology quantitatively investigate effectiveness strategies against attacks Advanced Persistent Threats (APTs). consider where vendor are only limiting factors cases in which delay fr...

Journal: :iranian journal of aquatic animal health 0
h ahari

nowadays, the use of innovative nano-technology in the food industry quality control has significantly increased and it is widely employed in numerous fields such as diagnosis of microbial toxin of foods using nano-biosensors, increasing food shelf-life with the help of nano-clay and nano-silver packaging, as well as changing some of the unpleasant organoleptic properties such as taste, color, ...

Journal: :IEEE Access 2021

Advanced persistent threats (APTs) have emerged as multi-stage attacks that targeted nation-states and their associated entities, including private corporate sectors. Cyber deception has a defense approach to secure our cyber infrastructure from APTs. Practical deployment of relies on defenders' ability place decoy nodes along the APT path optimally. This paper presents focused predicting most ...

Journal: :international journal of nanoscience and nanotechnology 2011
m. e. khosroshahi l. ghazanfari

the main objective of this research was to synthesize and characterize gold-coated fe3o4 /sio2 nanoshells for clinical applications. magnetite nanoparticles (nps) were prepared via co-precipitation. the results showed that smaller particles can be synthesized by decreasing the naoh concentration, which in our case this corresponded to 35 nm by using 0.9 m of naoh at 750 rpm. the nps were then m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید