Marek Repka, Michal Varchola and Miloš Drutarovský
of E-SMART ’01, Springer-Verlag, London, UK, 2001, pp. 200-210.
 DING, G. L.-CHU, J.-YUAN, L. ZHAO, Q. : Correlation Electromagnetic Analysis for Cryptographic Device, Proc. of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, IEEE Computer Society, Washington, DC, USA, 2009, pp. 388-391.
 MANGARD, S.-OSWALD, E.-POPP, T. : Power Analysis Attacks - Revealing the Secrets of Smart Cards, Advances in Information Security, Handbook, Springer-Verlag, New York, 2007.
 MEDWED, M.-OSWALD, M. E
). Core Specifications, 2018.
 Bluetooth Special Interest Group (SIG). Our History, 2018.
 Britt Cyr, Webb Horn, Daniela Miao, and Michael Specter. Security Analysis of Wearable Fitness Devices (Fitbit). Massachusetts Institute of Technology , pages 1–14, 2014.
 D.A. Dai Zovi and S.A. Macaulay. Attacking Automatic Wireless Network Selection. In Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. , volume 2005, pages 365–372. IEEE, 2005.
 Dino A Dai Zovi. KARMA Attacks
Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh and Prateek Mittal
. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. In 28th USENIX Security Symposium , 2019.
 Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In ACM Conference on Computer and Communications Security (CCS) , CCS ’13, 2013.
 Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt. A Critical Evaluation of Website Fingerprinting Attacks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Dharshana Kasthurirathna, Mahendra Piraveenan and Gnanakumar Thedchanamoorthy
 R. Albert, H. Jeong, and A.-L. Barab´asi, “Error and attack tolerance of complex networks,” Nature, vol. 406, pp. 378-382, 2000.
 A.-L. Barabáasi, “Scale-free networks: A decade and beyond,” Science, vol. 325, no. 5939, pp. 412-413, 2009.
 A.-L. Barabáasi, R. Albert, and H. Jeong, “Scalefree characteristics of random networks: The topology of the world-wide web,” Physica A, vol. 281, pp. 69-77, 2000.
 A.-L. Barabáasi and E. Bonabeau, “Scale-free networks,” Scientific American, vol. 288, pp. 50-59, 2003
 I. C. Avramopoulos and J. Rexford. Stealth Probing: Efficient Data- Plane Security for IP Routing. In USENIX Annual Technical Conference (USENIX-ATC), 2006.
 CAIDA UCSD IPv4 Routed /24 Topology Dataset. http://www.caida.org/data/active/ipv4_routed_24_topology_dataset.xml.
 D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84-90, 1981.
 S. P. Chung and A. K. Mok. Allergy Attack against Automatic Signature
2007) . Springer, June 2007.
 G. O’Gorman and S. Blott. Improving stream correlationattacks on anonymous networks. In Proceedings of the 2009 ACM symposium on Applied Computing , pages 2024–2028. ACM, 2009.
 A. Pfitzmann and M. Hansen. Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft, July 2000.
 A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002
Thanin Asawavichienjinda, Pongpat Vorasayan, Jirawadee Noiwattanakul and Kammant Phanthumchinda
completing the first and second questionnaires is displayed in Table 2 . Findings were almost identical including frequency of attacks, average pain duration, average pain severity score, and associated symptoms except headache severity, with a slightly higher score for mild degree in the first questionnaire (73% vs 67%). The concurrent validity of the Thai version of MSQv2.1 as shown in Table 3 had a significant reverse correlation with the migraine characteristics; correlation coefficient ranged from –0.62 to –0.39 except average pain duration and RP, headache
Piotr Tabor, Czesław Urbanik and Andrzej Mastalerz
1. Rokito A.S., Jobe F.W., Pink M.M., Perry J., Brault J. (1998). Electromyography analysis of shoulder function during the volleyball serve and spike. Journal Shoulder Elbow 7, 256-263. DOI: 10.1016/S1058-2746(98)90054-4.
2. Forthome B., Croisier J.L., Ciccarone G., Crielaard J.M., Cloes M. (2005). Factors correlated with volleyball spike velocity. American Journal of Sport Medicine 33, 1513-1519. DOI: 10.1177/0363546505274935.
3. Park S. (2003). Anticipation and acquiring processes of visual cues on a spiker’s attack patterns
Jiabei Li, Yanqi Zhang, Juan Wang, Dehui Qian, Hui Guo, Mingbao Song, Xiaojing Wu, Jun Jin, Junfu Huang and Lan Huang
individuals taking aspirin. We calculated a cut-off based on the mean impedance measured at 6 min in normal individuals, and aspirin resistance was defined as having normal impedance (impedance <10 Ω, the cut-off value) despite regular aspirin therapy.
Study end points
Primary end points were MACEs, including cardiovascular death, nonfatal myocardial infarction, revascularization, stroke/transient ischemic attack, or worsening UAP that required the patient to be readmitted to hospital. We defined cardiovascular death as death because of acute myocardial infarction
Notes in Comput. Sci., Vol. 1556, Springer, Berlin, 1999, pp. 362-375.
 CHO, J. Y.-PIERPRZYK, J.: Crossword puzzle attack on NLS , Sel. Areas in Cryptogr. 2006, 1-15, research.ics.tkk.fi/publications/jcho/cpa-nls.pdf.
 CHO, J. Y.-PIERPRZYK, J.: Linear distinguishing attack on NLS , Project eSTREAM web page, 2006, 1-10, http://www.ecrypt.eu.org/stream/papersdir/2006/018.pdf.
 CHO, J. Y.-PIERPRZYK, J.: Multiple modular additions and crossword puzzle attack on NLSv2 , Project eSTREAM web page, 2006, 1-19, http