Showing 221 - 240 results of 2,093 for search '"Attacker"', query time: 0.05s Refine Results
  1. 221

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. …”
    Get full text
    Article
  2. 222
  3. 223

    Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination by Xinlei Liu, Jichao Xie, Tao Hu, Peng Yi, Yuxiang Hu, Shumin Huo, Zhen Zhang

    Published 2025-01-01
    “…MAPE effectively eliminates adversarial perturbations in various adversarial examples, providing a robust defense against attacks from different substitute models. In a black-box attack scenario utilizing ResNet-34 as the target model, our approach achieves average defense rates of over 95.1% on CIFAR-10 and over 71.5% on Mini-ImageNet, demonstrating state-of-the-art performance.…”
    Get full text
    Article
  4. 224
  5. 225

    Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method by Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal

    Published 2015-01-01
    “…Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. …”
    Get full text
    Article
  6. 226

    Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability by Suman Bhunia, Matthew Blackert, Henry Deal, Andrew DePero, Amar Patra

    Published 2025-01-01
    “…The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. …”
    Get full text
    Article
  7. 227

    Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model by Jimmy K. W. Wong, Ki Ki Chung, Yuen Wing Lo, Chun Yin Lai, Steve W. Y. Mung

    Published 2025-01-01
    “…Abstract This article details the development of a next-word prediction model utilizing federated learning and introduces a mechanism for detecting backdoor attacks. Federated learning enables multiple devices to collaboratively train a shared model while retaining data locally. …”
    Get full text
    Article
  8. 228

    Intermittent Control for Synchronization of Discrete-Delayed Complex Cyber-Physical Networks under Mixed Attacks by Chaoqun Zhu, Xuan Jia, Pan Zhang

    Published 2022-01-01
    “…This paper is concerned with the synchronization control problem for discrete-delayed complex cyber-physical networks under mixed attacks. To handle input delays and mixed attacks, the intermittent control mechanism is employed, which is distinctly different from the traditional control method. …”
    Get full text
    Article
  9. 229

    Study on Fluid-Induced Vibration Power Harvesting of Square Columns under Different Attack Angles by Meng Zhang, Guifeng Zhao, Junlei Wang

    Published 2017-01-01
    “…The results show that attack angles play an important role in the performance of square column VIVPEH, of which α=45° is a relatively ideal attack angle of square column VIVPEH.…”
    Get full text
    Article
  10. 230
  11. 231

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. …”
    Get full text
    Article
  12. 232
  13. 233

    Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP. by Sajid Mehmood, Rashid Amin, Jamal Mustafa, Mudassar Hussain, Faisal S Alsubaei, Muhammad D Zakaria

    Published 2025-01-01
    “…Denial-of-service (DoS) attacks continuously impact users and Internet service providers (ISPs). …”
    Get full text
    Article
  14. 234

    Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review by Tamara Al-Shurbaji, Mohammed Anbar, Selvakumar Manickam, Iznan H Hasbullah, Nadia Alfriehat, Basim Ahmad Alabsi, Ahmad Reda Alzighaibi, Hasan Hashim

    Published 2025-01-01
    “…The proliferation of Internet of Things (IoT) devices has brought about an increased threat of botnet attacks, necessitating robust security measures. In response to this evolving landscape, deep learning (DL)-based intrusion detection systems (IDS) have emerged as a promising approach for detecting and mitigating botnet activities in IoT environments. …”
    Get full text
    Article
  15. 235

    CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data by Aulia Arif Wardana, Grzegorz Kołaczek, Parman Sukarno

    Published 2025-04-01
    “…CoAt-Set focuses on coordinated attack scenarios such as large-scale stealthy scans, worm outbreaks, and distributed denial-of-service (DDoS) attacks, simulating realistic and high-impact threats that commonly observed in modern networks. …”
    Get full text
    Article
  16. 236

    Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations by Phuc Hao do, Tran Duc Le, Truong Duy Dinh, van Dai Pham

    Published 2025-01-01
    “…The rapid expansion of devices on the Internet of Things (IoTs) has led to a significant rise in IoT botnet attacks, creating an urgent need for advanced detection and classification methods. …”
    Get full text
    Article
  17. 237
  18. 238

    Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection by Yixian Liu, Yupeng Dai

    Published 2024-01-01
    “…Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack. …”
    Get full text
    Article
  19. 239
  20. 240