Showing 201 - 220 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 201
  2. 202

    Hybrid quantum enhanced federated learning for cyber attack detection by G. Subramanian, M. Chinnadurai

    Published 2024-12-01
    “…Abstract Cyber-attack brings significant threat and become a critical issue in the digital world network security. …”
    Get full text
    Article
  3. 203
  4. 204

    Research on tracking DDoS based on NTP reflection amplification attack by Kai-da JIANG, Si-yu ZHANG, Qiang SUN

    Published 2014-10-01
    Subjects: “…reflection amplification attack…”
    Get full text
    Article
  5. 205
  6. 206
  7. 207

    Recurrent Transient Ischemic Attacks in a Patient with POEMS Syndrome by A. Akyol, B. Nazliel, H. Z. Batur Caglayan, Y. Oner, G. Turkoz Sucak

    Published 2014-01-01
    “…A 47-year-old female with a prior history of POEMS (polyneuropathy, organomegaly, endocrinopathy, monoclonal gammopathy, and skin changes) syndrome was admitted with transient ischemic attacks complicated by dysarthria and right-sided hemiparesis. …”
    Get full text
    Article
  8. 208
  9. 209
  10. 210
  11. 211
  12. 212
  13. 213

    Detection method of LDoS attacks based on combination of ANN & KPCA by Zhijun WU, Liang LIU, Meng YUE

    Published 2018-05-01
    “…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
    Get full text
    Article
  14. 214
  15. 215

    Attack path prediction method based on causal knowledge net by Shuo WANG, Guang-ming TANG, Guang KOU, Hai-tao SONG

    Published 2016-10-01
    Subjects: “…attack path prediction…”
    Get full text
    Article
  16. 216
  17. 217

    Verification of serialising instructions for security against transient execution attacks by Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-07-01
    “…Abstract Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels. …”
    Get full text
    Article
  18. 218

    Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application by Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono

    Published 2022-01-01
    “…One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. …”
    Get full text
    Article
  19. 219

    Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach by Li Zhao, Wei Li, Yajie Li

    Published 2022-01-01
    “…First, to effectively distinguish DoS attacks with different energy levels, the DoS attack detection method is established based on the maximum allowable delay of the system. …”
    Get full text
    Article
  20. 220

    Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets by Alexander DeTrano, Naghmeh Karimi, Ramesh Karri, Xiaofei Guo, Claude Carlet, Sylvain Guilley

    Published 2015-01-01
    “…Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. …”
    Get full text
    Article