Showing 201 - 220 results of 2,093 for search '"Attacker"', query time: 0.05s Refine Results
  1. 201
  2. 202
  3. 203

    Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks by Selvakumar B, Sivaanandh M, Muneeswaran K, Lakshmanan B

    Published 2025-02-01
    “…Also, the proposed method improved the detection rate of minority attack classes like U2R in NSLKDD and Hearbleed in CICIDS2017.…”
    Get full text
    Article
  4. 204

    A Hidden Surveillant Transmission Line Protection Layer for Cyber-Attack Resilience of Power Systems by Hossein Ebrahimi, Sajjad Golshannavaz, Amin Yazdaninejadi, Edris Pouresmaeil

    Published 2025-01-01
    “…This article proposes a framework to enhance the resilience of cyber-physical power systems (CPPSs) against cyber-attacks that are capable of bypassing the cyber-based defense mechanisms. …”
    Get full text
    Article
  5. 205
  6. 206

    2006 Florida Citrus Pest Management Guide: Soft-Bodied Insects Attacking Foliage and Fruit by Harold W. Browning, Carl C. Childers, Philip A. Stansly, Jorge Peña, Michael E. Rogers

    Published 2006-08-01
    “…ENY-604/CG004: 2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit (ufl.edu) …”
    Get full text
    Article
  7. 207
  8. 208

    Paroxysmal Sneezing at the Onset of Syncopes and Transient Ischemic Attack Revealing a Papillary Cardiac Fibroelastoma by Stéphane Mathis, Matthias Lamy, Jonathan Ciron, Anna Iljicsov, Roxana Arjmand, Pierre Agius, Jean-Philippe Neau

    Published 2014-01-01
    “…To the best of our knowledge, this is the first description of a transient ischemic attack due to cardiac papillary fibroelastoma and revealed by violent episodes of sneezing.…”
    Get full text
    Article
  9. 209

    Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors by Lázaro J. González‐Soler, Marta Gomez‐Barrero, Jascha Kolberg, Leonardo Chang, Airel Pérez‐Suárez, Christoph Busch

    Published 2021-07-01
    “…Abstract In spite of the advantages of using fingerprints for subject authentication, several works have shown that fingerprint recognition systems can be easily circumvented by means of artificial fingerprints or presentation attack instruments (PAIs). In order to address that threat, the existing presentation attack detection (PAD) methods have reported a high detection performance when materials used for the fabrication of PAIs and capture devices are known. …”
    Get full text
    Article
  10. 210

    The White Matter Functional Abnormalities in Patients with Transient Ischemic Attack: A Reinforcement Learning Approach by Huibin Ma, Zhou Xie, Lina Huang, Yanyan Gao, Linlin Zhan, Su Hu, Jiaxi Zhang, Qingguo Ding

    Published 2022-01-01
    “…Background. Transient ischemic attack (TIA) is a known risk factor for stroke. Abnormal alterations in the low-frequency range of the gray matter (GM) of the brain have been studied in patients with TIA. …”
    Get full text
    Article
  11. 211

    2006 Florida Citrus Pest Management Guide: Soft-Bodied Insects Attacking Foliage and Fruit by Harold W. Browning, Carl C. Childers, Philip A. Stansly, Jorge Peña, Michael E. Rogers

    Published 2006-08-01
    “…ENY-604/CG004: 2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit (ufl.edu) …”
    Get full text
    Article
  12. 212

    A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks by Ibrahim S. Alsukayti, Mohammed Alreshoodi, Mehdi Rouissat

    Published 2025-01-01
    “…Comparable QoS performance to the attack-free RPL was also maintained during the attack.…”
    Get full text
    Article
  13. 213
  14. 214
  15. 215
  16. 216
  17. 217

    Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them by Abdullah Alabdulatif, Navod Neranjan Thilakarathne

    Published 2025-01-01
    “…Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. …”
    Get full text
    Article
  18. 218
  19. 219

    Dissipative Filter Design for Nonlinear Time-Varying-Delay Singular Systems against Deception Attacks by Guobao Liu, Shibin Shen, Xianglei Jia

    Published 2021-01-01
    “…This paper applies a T-S fuzzy model to depict a class of nonlinear time-varying-delay singular systems and investigates the dissipative filtering problem for these systems under deception attacks. The measurement output is assumed to encounter random deception attacks during signal transmission, and a Bernoulli distribution is used to describe this random phenomena. …”
    Get full text
    Article
  20. 220