Showing 261 - 280 results of 2,093 for search '"Attacker"', query time: 0.05s Refine Results
  1. 261

    Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems by Abdollah Mirzabeigi, Ali Kazemy, Mehdi Ramezani, Seyed Mohammad Azimi

    Published 2023-01-01
    “…Today, eliminating the effects of cyber-attacks is essential for stability and synchronization in island microgrids. …”
    Get full text
    Article
  2. 262

    Reflected-Afterflow Virtual-Source Model Compared to Exact Calculations for Elastic Cylinders Attacked by Planar Waves by George V. Waldo

    Published 1997-01-01
    “…A recently developed theoretical approximation, the reflected-afterflow virtual-source (RAVS) model, is applied to the case of a planar shock wave attacking an elastic cylindrical shell. Calculations are shown to be in good agreement with the exact calculations that were published by Huang for all locations and times. …”
    Get full text
    Article
  3. 263

    Familial Hemiplegic Migraine with Severe Attacks: A New Report with ATP1A2 Mutation by E. Martínez, R. Moreno, L. López-Mesonero, I. Vidriales, M. Ruiz, A. L. Guerrero, J. J. Tellería

    Published 2016-01-01
    “…Familial hemiplegic migraine (FHM) is a rare disorder characterized by migraine attacks with motor weakness during the aura phase. …”
    Get full text
    Article
  4. 264
  5. 265

    Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side-Channel Attack Resistance by Siva Kotipalli, Yong-Bin Kim, Minsu Choi

    Published 2014-01-01
    “…Hardware implementation has been carried out on both designs exploiting a specified side-channel attack standard evaluation FPGA board, called SASEBO-GII, and the corresponding power waveforms for both designs have been collected. …”
    Get full text
    Article
  6. 266
  7. 267

    Assessment of the Dynamics of Experiencing a Terrorist Threat before and after the Terrorist Attack at Crocus City Hall by J.V. Bykhovets, N.N. Kazymova

    Published 2025-01-01
    “…It was shown that after the March 22, 2024 terrorist attack in Crocus City Hall, there was an increase in experience of the threat due to increased vigilance, alertness, anticipation of future attacks, concern for loved ones and need for information about attacks. …”
    Get full text
    Article
  8. 268

    A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks by Mohammed A. Saleh, Azizah Abdul Manaf

    Published 2015-01-01
    “…However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. …”
    Get full text
    Article
  9. 269
  10. 270
  11. 271

    Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks by Hongliang Zhu, Zhihua Zhang, Juan Du, Shoushan Luo, Yang Xin

    Published 2018-11-01
    “…Wireless sensor networks face threats of selective forwarding attacks which are simple to implement but difficult to detect. …”
    Get full text
    Article
  12. 272
  13. 273
  14. 274

    Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack by Hongbin Wang, Liping Feng

    Published 2020-01-01
    “…This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. …”
    Get full text
    Article
  15. 275

    False data injection attack sample generation using an adversarial attention-diffusion model in smart grids by Kunzhan Li, Fengyong Li, Baonan Wang, Meijing Shan

    Published 2024-12-01
    “…A false data injection attack (FDIA) indicates that attackers mislead system decisions by inputting false or tampered data into the system, which seriously threatens the security of power cyber-physical systems. …”
    Get full text
    Article
  16. 276

    CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD by DRAGOS-ALEXANDRU ANDRIOAIA

    Published 2022-10-01
    Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
    Get full text
    Article
  17. 277

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
    Get full text
    Article
  18. 278

    A Review of the Engineering Properties of Metakaolin Based Concrete: Towards Combatting Chloride Attack in Coastal/Marine Structures by Deveshan L. Pillay, Oladimeji B. Olalusi, Paul O. Awoyera, Carlos Rondon, Ana María Echeverría, John Temitope Kolawole

    Published 2020-01-01
    “…Hence, there is an increased need for alternate binder systems with the ability to reduce the effects of chloride attack in concrete. This paper presents a critical review of the engineering properties of metakaolin (MK) based concrete exposed to chloride attack. …”
    Get full text
    Article
  19. 279
  20. 280