-
221
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01Subjects: Get full text
Article -
222
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
223
Cellular automata model based power network attack prediction technology
Published 2023-04-01Subjects: Get full text
Article -
224
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
225
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Published 2017-12-01“…Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. …”
Get full text
Article -
226
New attack based on smartwatch motion sensors and the protection method research
Published 2015-11-01Get full text
Article -
227
Comparative study of power analysis attacks based on template and KNN algorithm
Published 2022-04-01Subjects: “…power analysis attack…”
Get full text
Article -
228
An Improved Nonlinear Aerodynamic Derivative Model of Aircraft at High Angles of Attack
Published 2021-01-01“…The classical aerodynamic derivative model is widely used in flight dynamics, but its application is extremely limited in cases with complicated nonlinear flows, especially at high angles of attack. A modified nonlinear aerodynamic derivative model for predicting unsteady aerodynamic forces and moments at a high angle of attack is developed in this study. …”
Get full text
Article -
229
Robustness of Dengue Complex Network under Targeted versus Random Attack
Published 2017-01-01“…The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. …”
Get full text
Article -
230
DDoS attack detection method based on conditional entropy and GHSOM in SDN
Published 2018-08-01Subjects: Get full text
Article -
231
Membership inference attack and defense method in federated learning based on GAN
Published 2023-05-01Subjects: Get full text
Article -
232
Research on Sulfate Attack Mechanism of Cement Concrete Based on Chemical Thermodynamics
Published 2020-01-01“…Based on principles of chemical thermodynamics, the relationship between temperature and the Gibbs free energy of erosion products generated during the sulfate attack on cement concrete was deduced. The orientation of chemical reactions of sulfate attack on cement concrete was theoretically determined as well as the critical sulfate ion concentration and the formation conditions of erosion products. …”
Get full text
Article -
233
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01Subjects: Get full text
Article -
234
Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks
Published 2021-01-01“…The experiment results on UCID and BOSSBase datasets show that the proposed forensic technique based on MTPM is capable of detecting the JPEG compression traces even in the presence of anti-forensic attacks.…”
Get full text
Article -
235
Leveraging the Chain on Goals Model in Football: Applications for Attack and Defensive Play
Published 2025-01-01“…Variables analyzed included team performance, attack and defensive performance, goals saved above average (GSAA), goals and possession value (PV), expected goals (xG), and xG on target (xGOT) for attack and defensive phases. …”
Get full text
Article -
236
Defense strategies selection based on attack-defense evolutionary game model
Published 2017-01-01Subjects: “…network attack-defense…”
Get full text
Article -
237
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
Published 2009-01-01Subjects: Get full text
Article -
238
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01Subjects: Get full text
Article -
239
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. …”
Get full text
Article -
240
Altered Effective Connectivity of the Primary Motor Cortex in Transient Ischemic Attack
Published 2022-01-01“…This study is aimed at exploring alteration in motor-related effective connectivity in individuals with transient ischemic attack (TIA). Methods. A total of 48 individuals with TIA and 41 age-matched and sex-matched healthy controls (HCs) were recruited for this study. …”
Get full text
Article