Oxford Index Search Results

You are looking at 1-20 of 97 items for:

vectored attack x clear all

Show only full text

Refine by type

Refine by product

 

vectored attack

Overview page. Subjects: Warfare and Defence.

Attack in which a weapon carrier (air, surface, or subsurface), not holding contact on the target, is vectored to the weapon delivery point by a unit (air, surface, or subsurface) that...

See overview in Oxford Index

vectored attack

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 38 words.

attack in which a weapon carrier (air, surface, or subsurface), not holding contact on the target, is vectored to the

Go to Oxford Reference »  home page

vectored attack

Overview page. Subjects: Warfare and Defence.

Attack in which a weapon carrier (air, surface, or subsurface), not holding contact on the target, is vectored to the weapon delivery point by a unit (air, surface, or subsurface) that...

See overview in Oxford Index

Trends in Cyber Attack Vectors

Peter Wood.

in ITNOW

June 2018; p ublished online May 2018 .

Journal Article. Subjects: Computing. 0 words.

Abstract

Peter Wood FBCS, Director Emeritus, Falanx Group, discusses the threat landscape and how attack vectors are developing to exploit increasingly agile...

Go to Oxford Journals »  home page

cutoff attack

Overview page. Subjects: Warfare and Defence.

An attack that provides a direct vector from the interceptor's position to an intercept point with the target track.

See overview in Oxford Index

cutoff attack

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 21 words.

an attack that provides a direct vector from the interceptor's position to an intercept point with the target track.

Go to Oxford Reference »  home page

chigger

Overview page. Subjects: Public Health and Epidemiology.

The larval stage of an arthropod mite, of which about 50 species attack humans and livestock. The main vector-borne disease for this group is scrub typhus.

See overview in Oxford Index

chigger

Edited by John M. Last.

in A Dictionary of Public Health

January 2007; p ublished online January 2007 .

Reference Entry. Subjects: Public Health and Epidemiology. 27 words.

The larval stage of an arthropod mite, of which about 50 species attack humans and livestock. The main vector-borne disease

Go to Oxford Reference »  home page

chigger

Miquel Porta.

Edited by John M. Last.

in A Dictionary of Public Health

P ublished online May 2018 .

Reference Entry. Subjects: Medicine and Health; Public Health and Epidemiology. 28 words.

The larval stage of an arthropod mite, of which about 50 species attack humans and livestock. The main vector-borne disease for this group is ...

Go to Oxford Reference »  home page

Harrier

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 45 words.

AV-8 a single-engine, vectored thrust, turbojet, light attack aircraft capable of vertical or short takeoffs and landings. It is designed

Go to Oxford Reference »  home page

Harrier

Overview page. Subjects: Warfare and Defence.

AV-8 a single-engine, vectored thrust, turbojet, light attack aircraft capable of vertical or short takeoffs and landings. It is designed to operate from land bases and naval bases in a ...

null...

See overview in Oxford Index

Defining the Latest Threats

Gareth Niblett.

in ITNOW

September 2016; p ublished online August 2016 .

Journal Article. Subjects: Computing. 0 words.

As convenience and connectivity breed exposure, cyber criminals are targeting new and previously unseen attack vectors, says Gareth Niblett, Chair of the BCS Information Security Specialist...

Go to Oxford Journals »  home page

Cryptanalysis of Loiss Stream Cipher

Lin Ding and Jie Guan.

in The Computer Journal

October 2012; p ublished online May 2012 .

Journal Article. Subjects: Computer Science. 0 words.

Loiss is a new byte-oriented stream cipher designed in 2010. It takes a 128-bit initial key and a 128-bit initial vector (IV) as inputs, and provides 128-bit-level security claimed by the...

Go to Oxford Journals »  full text   » abstract

Activity of Metarhizium spp. and Isaria spp. from the Central Brazilian Cerrado against Triatoma infestans nymphs

Luiz F.N. Rocha and Christian Luz.

in Transactions of The Royal Society of Tropical Medicine and Hygiene

July 2011; p ublished online July 2011 .

Journal Article. Subjects: Clinical Medicine; Infectious Diseases; Immunology; Medical Microbiology and Virology; Public Health and Epidemiology. 968 words.

Abstract

Entomopathogenic fungi attack Chagas disease vectors, and there is a need of effective isolates for development of biological control. Ten isolates...

Go to Oxford Journals »  abstract

black bean aphid

Will Manley, Katharine Foot and Andrew Davis.

in A Dictionary of Agriculture and Land Management

March 2019; p ublished online March 2019 .

Reference Entry. Subjects: Social Sciences; Agriculture and Farming. 93 words.

(Aphis fabae) A member of the *aphid family, also known as black fly or bean fly, which attacks numerous species of plants but particularly ornamental plants, sugar beet, and leguminous...

Go to Oxford Reference »  home page

In vivo gene repair of point and frameshift mutations directed by chimeric RNA/DNA oligonucleotides and modified single-stranded oligonucleotides

Li Liu, Michael C. Rice and Eric B. Kmiec.

in Nucleic Acids Research

October 2001; p ublished online October 2001 .

Journal Article. Subjects: Chemistry; Biochemistry; Bioinformatics and Computational Biology; Genetics and Genomics; Molecular and Cell Biology. 7610 words.

Synthetic oligonucleotides have been used to direct base exchange and gene repair in a variety of organisms. Among the most promising vectors is chimeric oligonucleotide (CO), a...

Go to Oxford Journals »  full text

Attribution: Attacks

Susan W. Brenner.

in Cyber Threats

March 2009; p ublished online September 2009 .

Chapter. Subjects: Criminal Law. 24331 words.

This chapter begins with a description of cyberattacks against the U.S. Department of Commerce's Bureau of Industry and Security (BIS) in the summer of 2006. The attackers sought access to...

Go to Oxford Scholarship Online »  abstract

Helper-dependent adenoviral liver gene therapy protects against induced attacks and corrects protein folding stress in acute intermittent porphyria mice

Carmen Unzu, Ana Sampedro, Itsaso Mauleón, Manuela González-Aparicio, Rafael Enríquez de Salamanca, Jesús Prieto, Tomás Aragón and Antonio Fontanellas.

in Human Molecular Genetics

July 2013; p ublished online April 2013 .

Journal Article. Subjects: Genetics and Genomics. 6642 words.

Acute intermittent porphyria (AIP) is a hepatic metabolic disease that results from haplo-insufficient activity of porphobilinogen deaminase (PBGD). The dominant clinical feature is acute...

Go to Oxford Journals »  full text   » abstract

Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate

Mingwu Zhang, Bo Yang and Tsuyoshi Takagi.

in The Computer Journal

April 2013; p ublished online September 2012 .

Journal Article. Subjects: Computer Science. 0 words.

Recent research shows that many public-key or identity-based encryption schemes are vulnerable to side-channel attacks on the keys by the interaction of an adversary with a physical device....

Go to Oxford Journals »  full text   » abstract

On Designing Resilient Location-Privacy Obfuscators

Pericle Perazzo, Pavel Skvortsov and Gianluca Dini.

in The Computer Journal

October 2015; p ublished online February 2015 .

Journal Article. Subjects: Computer Science. 8481 words.

The success of location-based services is growing together with the diffusion of GPS-equipped smart devices. As a consequence, privacy concerns are raising year by year. Location privacy is...

Go to Oxford Journals »  full text

Psychodidae

Overview page. Subjects: Zoology and Animal Sciences.

; order Diptera, suborder Nematocera)

Family of minute, moth-like flies in which the legs, body, and wings are covered in long, coarse hairs and often scales. The larvae are mostly...

See overview in Oxford Index