-
261
Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
Published 2023-11-01“… In this paper we consider a modification of the attack on the classic RSA cryptosystem aimed at factoring the public modulus n, which is a product of three primes. …”
Get full text
Article -
262
Attack detection method based on spatiotemporal event correlation in intranet environment
Published 2020-01-01Subjects: Get full text
Article -
263
Research on filter-based adversarial feature selection against evasion attacks
Published 2023-07-01Subjects: Get full text
Article -
264
Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects
Published 2022-01-01“…However, AT usually decreases the model’s accuracy on clean samples and could overfit to a specific attack, inhibiting its ability to generalize to new attacks. …”
Get full text
Article -
265
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01Subjects: Get full text
Article -
266
Network security equipment evaluation based on attack tree with risk fusion
Published 2017-07-01Get full text
Article -
267
Attack detection model based on stacking ensemble learning for Internet of vehicles
Published 2024-12-01“…Due to openness of wireless communication, Internet of vehicles (IoV) is vulnerable to many cyber-attacks such as denial of service, spoofing and fuzzy attacks. …”
Get full text
Article -
268
Dual-Targeted adversarial example in evasion attack on graph neural networks
Published 2025-01-01Subjects: Get full text
Article -
269
Optimal Decisions and Pricing in Mail Service Systems Subject to Virus Attacks
Published 2020-01-01“…We consider an optimal decision problem of the service providers in public mail service systems subject to virus attacks. Two scenarios, i.e., free service systems and payment systems, are investigated in the paper. …”
Get full text
Article -
270
Face presentation attack detection. A comprehensive evaluation of the generalisation problem
Published 2021-07-01“…However, it still needs to increase robustness against imposter attacks. In this regard, face Presentation Attack Detection (face‐PAD) is a key component in providing trustable facial access to digital devices. …”
Get full text
Article -
271
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01Subjects: Get full text
Article -
272
Suspected Transient Ischemic Attack Related to Dysfunctional Quadricuspid Aortic Valve
Published 2025-01-01“…We describe a 30-year-old Caribbean-Black woman with a clinical presentation suggestive of a transient ischemic attack (TIA) with no conventional cerebrovascular risk factors, albeit with a newly diagnosed quadricuspid aortic valve (QAV) with moderate aortic regurgitation (AR). …”
Get full text
Article -
273
Serum Leptin Is not a Diagnostic Marker for Familial Mediterranean Fever Attacks
Published 2006-01-01“…The mean serum leptin levels before the attacks were 6.45±1.05 (Mean ± SEM) and during the attacks were 7.59±1.3 (Mean ± SEM) in FMF group, respectively. …”
Get full text
Article -
274
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01Subjects: Get full text
Article -
275
Research on Aircraft Attack Angle Control Considering Servo-Loop Dynamics
Published 2015-01-01“…This paper presents a novel robust attack angle control approach, which can effectively suppress the impacts from system uncertainties and servo-loop dynamics. …”
Get full text
Article -
276
Estimation of the Occurrence Time of Thaumasite Sulfate Attack on Tunnel Lining Concrete
Published 2020-01-01“…The thaumasite sulfate attack (TSA) on tunnel concrete structure has been reported increasingly in the past decades. …”
Get full text
Article -
277
AFault Tolerant Multi-Controller Framework for SDN DDoS Attacks Detection
Published 2022-01-01Subjects: Get full text
Article -
278
Self-defence model of SIP proxy server for against DoS attack
Published 2009-01-01“…Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy server,the defence model of SIP proxy server for DoS attack was put forward,and the testbed to test the ability of this model to resist DoS attack was designed.The experiment result proves that this model can effectively resist the DoS attack for SIP proxy server with millisecond delay of signal transfer,and improves the usablity of SIP network.…”
Get full text
Article -
279
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01Get full text
Article -
280
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01“…Ssome of the popular ML techniques are used to test the ML attack resistance and compare the results with some existing PUFs. …”
Get full text
Article