Showing 261 - 280 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 261

    Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations by Aleksėjus Michalkovič, Jokūbas Žitkevičius

    Published 2023-11-01
    “… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
    Get full text
    Article
  2. 262
  3. 263
  4. 264

    Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects by Bader Rasheed, Adil Khan, Muhammad Ahmad, Manuel Mazzara, S. M. Ahsan Kazmi

    Published 2022-01-01
    “…However, AT usually decreases the model’s accuracy on clean samples and could overfit to a specific attack, inhibiting its ability to generalize to new attacks. …”
    Get full text
    Article
  5. 265
  6. 266
  7. 267

    Attack detection model based on stacking ensemble learning for Internet of vehicles by XU Huibin, FANG Long, ZHANG Sha

    Published 2024-12-01
    “…Due to openness of wireless communication, Internet of vehicles (IoV) is vulnerable to many cyber-attacks such as denial of service, spoofing and fuzzy attacks. …”
    Get full text
    Article
  8. 268
  9. 269

    Optimal Decisions and Pricing in Mail Service Systems Subject to Virus Attacks by Sheng Zhu, Jinting Wang

    Published 2020-01-01
    “…We consider an optimal decision problem of the service providers in public mail service systems subject to virus attacks. Two scenarios, i.e., free service systems and payment systems, are investigated in the paper. …”
    Get full text
    Article
  10. 270

    Face presentation attack detection. A comprehensive evaluation of the generalisation problem by Artur Costa‐Pazo, Daniel Pérez‐Cabo, David Jiménez‐Cabello, José Luis Alba‐Castro, Esteban Vazquez‐Fernandez

    Published 2021-07-01
    “…However, it still needs to increase robustness against imposter attacks. In this regard, face Presentation Attack Detection (face‐PAD) is a key component in providing trustable facial access to digital devices. …”
    Get full text
    Article
  11. 271
  12. 272

    Suspected Transient Ischemic Attack Related to Dysfunctional Quadricuspid Aortic Valve by Arun Katwaroo MBBS, Jessica Kawall MBBS, Priya Ramcharan MBBS, Valmiki Seecheran MBBS, MSc, Rajeev Seecheran MBBS, MHA, Nafeesah Ali MBBS, Shari Khan MBBS, Naveen Anand Seecheran MBBS, MD, MSc

    Published 2025-01-01
    “…We describe a 30-year-old Caribbean-Black woman with a clinical presentation suggestive of a transient ischemic attack (TIA) with no conventional cerebrovascular risk factors, albeit with a newly diagnosed quadricuspid aortic valve (QAV) with moderate aortic regurgitation (AR). …”
    Get full text
    Article
  13. 273

    Serum Leptin Is not a Diagnostic Marker for Familial Mediterranean Fever Attacks by Bülent Toy, Orhan Tarçın, Sait Bağcı, Yücel Üstündağ, Ali Inal, Arzu Tiftikçi

    Published 2006-01-01
    “…The mean serum leptin levels before the attacks were 6.45±1.05 (Mean ± SEM) and during the attacks were 7.59±1.3 (Mean ± SEM) in FMF group, respectively. …”
    Get full text
    Article
  14. 274
  15. 275

    Research on Aircraft Attack Angle Control Considering Servo-Loop Dynamics by Xiaodong Liu, Yan Wang, Wanwei Huang, Zongxia Jiao

    Published 2015-01-01
    “…This paper presents a novel robust attack angle control approach, which can effectively suppress the impacts from system uncertainties and servo-loop dynamics. …”
    Get full text
    Article
  16. 276

    Estimation of the Occurrence Time of Thaumasite Sulfate Attack on Tunnel Lining Concrete by Chongbang Xu, Xiaojing Gao, Xuefeng Li, Kaishun Zhang

    Published 2020-01-01
    “…The thaumasite sulfate attack (TSA) on tunnel concrete structure has been reported increasingly in the past decades. …”
    Get full text
    Article
  17. 277
  18. 278

    Self-defence model of SIP proxy server for against DoS attack by ZHANG Zhao-xin, DU Yue-jin, LI Bin, ZHANG Hong-li

    Published 2009-01-01
    “…Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy server,the defence model of SIP proxy server for DoS attack was put forward,and the testbed to test the ability of this model to resist DoS attack was designed.The experiment result proves that this model can effectively resist the DoS attack for SIP proxy server with millisecond delay of signal transfer,and improves the usablity of SIP network.…”
    Get full text
    Article
  19. 279
  20. 280

    MARPUF: physical unclonable function with improved machine learning attack resistance by Somanath Tripathy, Vikash Kumar Rai, Jimson Mathew

    Published 2021-08-01
    “…Ssome of the popular ML techniques are used to test the ML attack resistance and compare the results with some existing PUFs. …”
    Get full text
    Article