-
241
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
242
-
243
2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2021-10-01Get full text
Article -
244
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
245
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01Subjects: Get full text
Article -
246
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01Subjects: “…False data injection attack…”
Get full text
Article -
247
An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems
Published 2025-01-01“…False data injection (FDI) attacks are among the most prevalent attacks in DBS, where the attacker injects false data into the communication infrastructure. …”
Get full text
Article -
248
Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm
Published 2025-01-01“…Our framework is specifically designed to address various attacks, including denial of service (DoS) and Mirai attacks, which are particularly harmful to IoT systems. …”
Get full text
Article -
249
Probability-Based Sensitivity of Service Life of Chloride-Attacked Concrete Structures with Multiple Cover Concrete Repairs
Published 2018-01-01“…From the sensitivity analysis, the cover depth is found to be the most important parameter in the design of chloride-attacked concrete structures to extend the corrosion initiation and repair application times and to reduce the total expected number of repairs.…”
Get full text
Article -
250
COVID-19 outbreak rates and infection attack rates associated with the workplace: a descriptive epidemiological study
Published 2022-07-01“…The objectives of this paper are to identify the geographical areas and industrial sectors with a high rate of outbreaks of COVID-19 and to compare infection attack rates by enterprise size and sector in England.Methods Public Health England (PHE) HPZone data on COVID-19 outbreaks in workplaces, between 18 May and 12 October 2020, were analysed. …”
Get full text
Article -
251
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
Published 2025-01-01Subjects: Get full text
Article -
252
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01“…Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. …”
Get full text
Article -
253
-
254
-
255
Investigation of the correlation of C1 esterase inhibitor levels and functions with attack severity and frequency in hereditary angioedema
Published 2024-06-01Subjects: Get full text
Article -
256
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01“…Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. …”
Get full text
Article -
257
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…Wireless sensor networks (WSNs) are vulnerable to false endorsement insertion attacks (FEIAs), where a malicious adversary intentionally inserts incorrect endorsements into legitimate sensing reports in order to block notifications of real events. …”
Get full text
Article -
258
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method
Published 2025-01-01“…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. …”
Get full text
Article -
259
High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties
Published 2020-01-01“…However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. …”
Get full text
Article -
260
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
Published 2021-01-01“…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). …”
Get full text
Article