-
221
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
Published 2016-01-01“…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. …”
Get full text
Article -
222
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
223
Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination
Published 2025-01-01“…MAPE effectively eliminates adversarial perturbations in various adversarial examples, providing a robust defense against attacks from different substitute models. In a black-box attack scenario utilizing ResNet-34 as the target model, our approach achieves average defense rates of over 95.1% on CIFAR-10 and over 71.5% on Mini-ImageNet, demonstrating state-of-the-art performance.…”
Get full text
Article -
224
2024–2025 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2024-08-01Get full text
Article -
225
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method
Published 2015-01-01“…Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. …”
Get full text
Article -
226
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. …”
Get full text
Article -
227
Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model
Published 2025-01-01“…Abstract This article details the development of a next-word prediction model utilizing federated learning and introduces a mechanism for detecting backdoor attacks. Federated learning enables multiple devices to collaboratively train a shared model while retaining data locally. …”
Get full text
Article -
228
Intermittent Control for Synchronization of Discrete-Delayed Complex Cyber-Physical Networks under Mixed Attacks
Published 2022-01-01“…This paper is concerned with the synchronization control problem for discrete-delayed complex cyber-physical networks under mixed attacks. To handle input delays and mixed attacks, the intermittent control mechanism is employed, which is distinctly different from the traditional control method. …”
Get full text
Article -
229
Study on Fluid-Induced Vibration Power Harvesting of Square Columns under Different Attack Angles
Published 2017-01-01“…The results show that attack angles play an important role in the performance of square column VIVPEH, of which α=45° is a relatively ideal attack angle of square column VIVPEH.…”
Get full text
Article -
230
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
231
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. …”
Get full text
Article -
232
Lysosome-related proteins may have changes in the urinary exosomes of patients with acute gout attack
Published 2025-01-01Subjects: “…Acute gout attack…”
Get full text
Article -
233
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP.
Published 2025-01-01“…Denial-of-service (DoS) attacks continuously impact users and Internet service providers (ISPs). …”
Get full text
Article -
234
Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review
Published 2025-01-01“…The proliferation of Internet of Things (IoT) devices has brought about an increased threat of botnet attacks, necessitating robust security measures. In response to this evolving landscape, deep learning (DL)-based intrusion detection systems (IDS) have emerged as a promising approach for detecting and mitigating botnet activities in IoT environments. …”
Get full text
Article -
235
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01“…CoAt-Set focuses on coordinated attack scenarios such as large-scale stealthy scans, worm outbreaks, and distributed denial-of-service (DDoS) attacks, simulating realistic and high-impact threats that commonly observed in modern networks. …”
Get full text
Article -
236
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01“…The rapid expansion of devices on the Internet of Things (IoTs) has led to a significant rise in IoT botnet attacks, creating an urgent need for advanced detection and classification methods. …”
Get full text
Article -
237
2020–2021 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2020-08-01Get full text
Article -
238
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack. …”
Get full text
Article -
239
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Published 2025-01-01Subjects: Get full text
Article -
240
Density and Attack Rate of Snails on Some Cabbage Plants (Brassicaceae) in Marapi Mount of West Sumatera
Published 2021-06-01Get full text
Article