Showing 241 - 260 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 241
  2. 242
  3. 243
  4. 244
  5. 245
  6. 246
  7. 247

    An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems by Ping Yu, Ding Yang, Khalid A. Alattas, Ardashir Mohammadzadeh, Afef Fekih

    Published 2025-01-01
    “…False data injection (FDI) attacks are among the most prevalent attacks in DBS, where the attacker injects false data into the communication infrastructure. …”
    Get full text
    Article
  8. 248

    Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm by Bambang Susilo, Abdul Muis, Riri Fitri Sari

    Published 2025-01-01
    “…Our framework is specifically designed to address various attacks, including denial of service (DoS) and Mirai attacks, which are particularly harmful to IoT systems. …”
    Get full text
    Article
  9. 249

    Probability-Based Sensitivity of Service Life of Chloride-Attacked Concrete Structures with Multiple Cover Concrete Repairs by Aruz Petcherdchoo

    Published 2018-01-01
    “…From the sensitivity analysis, the cover depth is found to be the most important parameter in the design of chloride-attacked concrete structures to extend the corrosion initiation and repair application times and to reduce the total expected number of repairs.…”
    Get full text
    Article
  10. 250

    COVID-19 outbreak rates and infection attack rates associated with the workplace: a descriptive epidemiological study by Yiqun Chen, Fu-Meng Khaw, Timothy Aldridge, Claire Ferraro

    Published 2022-07-01
    “…The objectives of this paper are to identify the geographical areas and industrial sectors with a high rate of outbreaks of COVID-19 and to compare infection attack rates by enterprise size and sector in England.Methods Public Health England (PHE) HPZone data on COVID-19 outbreaks in workplaces, between 18 May and 12 October 2020, were analysed. …”
    Get full text
    Article
  11. 251
  12. 252

    Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm by Demei Mao, Mingzhu Wang

    Published 2025-12-01
    “…Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. …”
    Get full text
    Article
  13. 253
  14. 254
  15. 255
  16. 256

    Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis by Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee

    Published 2013-01-01
    “…Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. …”
    Get full text
    Article
  17. 257

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…Wireless sensor networks (WSNs) are vulnerable to false endorsement insertion attacks (FEIAs), where a malicious adversary intentionally inserts incorrect endorsements into legitimate sensing reports in order to block notifications of real events. …”
    Get full text
    Article
  18. 258

    Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method by Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly

    Published 2025-01-01
    “…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. …”
    Get full text
    Article
  19. 259

    High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties by Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu, Shunjiang Wang

    Published 2020-01-01
    “…However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. …”
    Get full text
    Article
  20. 260

    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks by Jiaqi Liang, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, Ming Ni

    Published 2021-01-01
    “…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). …”
    Get full text
    Article