نتایج جستجو برای: bot networks
تعداد نتایج: 430144 فیلتر نتایج به سال:
OBJECTIVE Patients with diabetes may experience high burden of treatment (BOT), including treatment-related effects and self-care demands. We examined whether patients with type 2 diabetes and their clinicians discuss BOT, the characteristics of their discussions, and their attempts to address BOT during visits. RESEARCH DESIGN AND METHODS Two coders independently reviewed videos of 46 primar...
Boresch, K., Zts. Bot., 13, 65-78 (1921). Emerson, R., and Arnold, W., Jour. Gen. Physiol., 16, 191-205 (1932). Engelmann, Th. W., Bot. Ztg., 41, 1-13 (1883). Gaidukov, N., Anhang Abhandl. preuss. Akad. Wiss., 1-36 (1902). Harder, R., Ber. deutsch. bot. Ges., 40, 26-32 (1922). Harder, R., Zts. Bot., 15, 305-355 (1923). Oltmanns, Fr., Jahrb. wiss. Bot., 23, 349-440 (1893). v. Richter, A., Ber. d...
Bot-like malware has posed an immense threat to computer security. Bot detection is still a challenging task since bot developers are continuously adopting advanced techniques to make bots more stealthy. A typical bot exhibits three invariant features along its onset: (1) the startup of a bot is automatic without requiring any user actions; (2) a bot must establish a command and control channel...
BACKGROUND Borderline tumors of the ovary (BOT) are a distinct entity of ovarian tumors, characterized by lack of stromal invasion. Recent studies postulated that the presence of invasive implants, incomplete staging, fertility sparing surgery and residual tumor after surgery are major prognostic factors for BOT. There are no biomarkers that can predict BOT or the presence of invasive implants....
Socialbots, or non-human/algorithmic social media users, have recently been documented as competing for information dissemination and disruption on online social networks. Here we investigate the influence of socialbots in Mexican Twitter in regards to the"Tanhuato"human rights abuse report. We analyze the applicability of the BotOrNot API to generalize from English to Spanish tweets and propos...
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...
BACKGROUND The lack of consensus around best practices for management of borderline ovarian tumors (BOT) is, in part, to the lack of available data and of clarity in interpreting relationships among various factors that impact outcomes. The objective of this study was to identify clinicopathological factors that impact prognosis of patients with borderline ovarian tumors (BOT) and to address fe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید