Showing 181 - 200 results of 2,093 for search '"Attacker"', query time: 0.07s Refine Results
  1. 181

    Damage and Degradation of Concrete under Coupling Action of Freeze-Thaw Cycle and Sulfate Attack by Wei Tian, Fangfang Gao

    Published 2020-01-01
    “…In this study, the mechanical behaviors, failure characteristics, and microstructure of concrete containing fly ash (FA) against combined freeze-thaw cycles and sulfate attack were studied compared with normal concrete, and the formation rates of corrosion products during coupling cycles were investigated. …”
    Get full text
    Article
  2. 182

    A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks by Ramzi Saifan, Omar Al-Jarrah

    Published 2010-12-01
    “…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). If checking integrity and authenticity of a message is done only at the final destination, the intermediate nodes are going to forward bogus packets injected by an adversary many hops before they are detected. …”
    Get full text
    Article
  3. 183
  4. 184
  5. 185

    Memory and Cerebral Blood Flow in Cases of Transient Global Amnesia During and After the Attack by H. Kazui, H. Tanabe, M. Ikeda, Y. Nakagawa, J. Shiraishi, K. Hashikawa

    Published 1995-01-01
    “…We administered various memory tests and neuroimaging examinations to four pure cases who met Hodges' clinical criteria for transient global amnesia (TGA), during and after the attack. The purpose of the present study was to determine whether procedural learning is acquired during TGA and whether priming effects are preserved during TGA, and to investigate the anatomical basis of various memory subcomponents through these cases. …”
    Get full text
    Article
  6. 186

    Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles by Qiyi He, Xiaolin Meng, Rong Qu

    Published 2020-01-01
    “…Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. …”
    Get full text
    Article
  7. 187
  8. 188

    Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks by Marcos Luengo Viñuela, Jesús-Ángel Román Gallego

    Published 2024-12-01
    “…The escalating integration of Internet of Things (IoT) devices has led to a surge in data generation within networks, consequently elevating the vulnerability to Distributed Denial of Service (DDoS) attacks. Detecting such attacks in IoT Networks is critical, and Machine Learning (ML) models have shown efficacy in this realm. …”
    Get full text
    Article
  9. 189

    Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis by Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li

    Published 2013-01-01
    “…Distributed denial of service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. …”
    Get full text
    Article
  10. 190

    Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks by Xiao Cai, Jian Kang, Kaibo Shi

    Published 2022-01-01
    “…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
    Get full text
    Article
  11. 191

    Detecting Attacks and Estimating States of Power Grids from Partial Observations with Machine Learning by Zheng-Meng Zhai, Mohammadamin Moradi, Ying-Cheng Lai

    Published 2025-02-01
    “…The ever-increasing complexity of modern power grids makes them vulnerable to cyber and/or physical attacks. To protect them, accurate attack detection is essential. …”
    Get full text
    Article
  12. 192

    Distribution and Attack Rate of Spodoptera frugiperda on Maize in Sijunjung District, West Sumatera Province by Syafria Syafria, Reflinaldon Reflinaldon, Novri Nelly

    Published 2023-07-01
    “…The results showed that S. frugiperda had spread and attacked maize crops evenly in Sijunjung District, but the attack rate (26.96%) and density (0.24 individuals) were low. …”
    Get full text
    Article
  13. 193

    A Case of Status Epilepticus in a Patient Experiencing an Acute Attack of Hereditary Angioedema by Danielle Weinberg, Steven Gayda, Kyle Hultz, Hanan Atia, Brian Kohen, Eric Boccio

    Published 2025-01-01
    “…The treatment of an acute attack of HAE should focus on replacing C1-INH and preventing the formation and limiting the action of bradykinin.…”
    Get full text
    Article
  14. 194

    Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS by G. Y. Sree Varshini, S. Latha

    Published 2023-01-01
    “…This paper addresses the attack impact on WAC applications and attack detection using the model-based method and data-driven-based methods. …”
    Get full text
    Article
  15. 195

    A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning by Bin Jia, Xiaohong Huang, Rujun Liu, Yan Ma

    Published 2017-01-01
    “…The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR), accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD) to construct our detection system. …”
    Get full text
    Article
  16. 196

    Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm by Sherril Sophie Maria Vincent

    Published 2025-02-01
    “… In network topology, the sinkhole attacks ensue while a malicious node deceives it’s adjust mode in the routing traffic and it results a predominant interruptions like amplified latency, depletion of energy with conceded data reliability. …”
    Get full text
    Article
  17. 197
  18. 198
  19. 199
  20. 200