نتایج جستجو برای: vulnerable scanner

تعداد نتایج: 71901  

1966
Max Glatt

Why is it that some people who are exposed to drugs ultimately become dependent on them, while others seem to be able to withstand the experience without lasting damage? What are the personal factors that cause addiction? Are they physical or psychological? Dr. Max Glatt of St. Bernard's Hospital has made a special investigation of the causes of addiction and here outlines some significant find...

2012
Yossi Gilad Amir Herzberg

We show that fragmented IPv4 and IPv6 traffic is vulnerable to effective interception and denial-of-service (DoS) attacks by an off-path attacker. Specifically, we demonstrate a weak attacker intercepting more than 80% of the data between peers and causing over 94% loss rate. We show that our attacks are practical through experimental validation on popular industrial and opensource products, wi...

Journal: :JACC. Cardiovascular imaging 2011
Jin-Man Cho Il-Suk Sohn Chong-Jin Kim Ik-Kyung Jang

I T H A S B E E N P R O P O S E D T H A T N O N H E A L I N G E N D O T H E L I U M after percutaeous coronary intervention may allow for insudation of lipids superficial to the stent strut level, specially when the underlying plaque carried a large necrotic core. This may result in formation of a ipid-rich neointima, and the lipid core so created is referred to as nouveau atherosclerosis; the ...

2001
M. H. A. Klaver J. Huizenga

It is impossible to achieve a critical infrastructure that is secured for one hundred percent. One of the main conclusions of the KWINT study on the vulnerabilities of the (Netherlands section of the) Internet is that the aim of the Dutch Government should be to prevent incidents, to reduce critical infrastructure vulnerabilities to an acceptable level for society, and to ensure that control of...

Journal: :JPMA. The Journal of the Pakistan Medical Association 2014
Haya Matouq AlFarhan

OBJECTIVE To compare the accuracy of central corneal thickness measurements using ultrasound biomicroscopy, Orbscan II tomography and an Artemis-2 very high frequency ultrasound scanner. METHODS The prospective study was conducted at Eye World Centre, Riyadh, Saudi Arabia, from September to November 2012. One eye from each of 60 normal subjects was analysed. The central corneal thickness was ...

2005
Hiroshi YOKOYAMA Hirofumi CHIKATSU

Recently, a laser scanner has been receiving more attention as a useful tool for real-time 3D data acquisition, and various applications such as city modeling, DTM generation and 3D modeling of cultural heritage were proposed. However, 3D Representation of historical structures from point cloud 3D data collected by laser scanner is still issues. In order to reduce the time, labor and skill for ...

Journal: :Thorax 1982
M Afschrift P Nachtegaele D Voet L Noens W Van Hove M van der Straeten G Verdonk

Thirty-six punctures of thoracic lesions have been performed with a compound B-scanner or a real-time linear-array scanner for guidance. Twenty-three fluid collections were punctured and aspiration biopsies were performed on 13 echogenic lesions. All the punctures were successful at the first attempt. No complications occurred. The results confirm the usefulness of sonography for guiding punctu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید