-
201
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: Get full text
Article -
202
Hybrid quantum enhanced federated learning for cyber attack detection
Published 2024-12-01“…Abstract Cyber-attack brings significant threat and become a critical issue in the digital world network security. …”
Get full text
Article -
203
Model of coorperation defense DDoS attack based on client reputation
Published 2009-01-01Subjects: “…DDoS attack…”
Get full text
Article -
204
Research on tracking DDoS based on NTP reflection amplification attack
Published 2014-10-01Subjects: “…reflection amplification attack…”
Get full text
Article -
205
Adaptive secure network coding scheme against pollution attacks
Published 2013-11-01Subjects: Get full text
Article -
206
Survey of optical-based physical domain adversarial attacks and defense
Published 2024-04-01Subjects: “…adversarial attack…”
Get full text
Article -
207
Recurrent Transient Ischemic Attacks in a Patient with POEMS Syndrome
Published 2014-01-01“…A 47-year-old female with a prior history of POEMS (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes) syndrome was admitted with transient ischemic attacks complicated by dysarthria and right-sided hemiparesis. …”
Get full text
Article -
208
Membership inference attacks against transfer learning for generalized model
Published 2021-10-01Subjects: “…membership inference attack…”
Get full text
Article -
209
Multidimensional detection and dynamic defense method for link flooding attack
Published 2019-08-01Subjects: “…link flood attack…”
Get full text
Article -
210
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01Subjects: Get full text
Article -
211
Enhancing the Diagnosis of Transient Ischemic Attacks Through Biomarker Innovation
Published 2025-01-01Get full text
Article -
212
Fuzzy intrusion detection system for MANET packet dropping attack
Published 2016-10-01Subjects: Get full text
Article -
213
Detection method of LDoS attacks based on combination of ANN & KPCA
Published 2018-05-01“…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
Get full text
Article -
214
Network security situation evaluation method for multi-step attack
Published 2017-01-01Subjects: Get full text
Article -
215
Attack path prediction method based on causal knowledge net
Published 2016-10-01Subjects: “…attack path prediction…”
Get full text
Article -
216
Meet-in-the-middle attack on 11-round 3D cipher
Published 2015-08-01Subjects: Get full text
Article -
217
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…Abstract Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels. …”
Get full text
Article -
218
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. …”
Get full text
Article -
219
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
Published 2022-01-01“…First, to effectively distinguish DoS attacks with different energy levels, the DoS attack detection method is established based on the maximum allowable delay of the system. …”
Get full text
Article -
220
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Published 2015-01-01“…Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. …”
Get full text
Article