-
261
Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems
Published 2023-01-01“…Today, eliminating the effects of cyber-attacks is essential for stability and synchronization in island microgrids. …”
Get full text
Article -
262
Reflected-Afterflow Virtual-Source Model Compared to Exact Calculations for Elastic Cylinders Attacked by Planar Waves
Published 1997-01-01“…A recently developed theoretical approximation, the reflected-afterflow virtual-source (RAVS) model, is applied to the case of a planar shock wave attacking an elastic cylindrical shell. Calculations are shown to be in good agreement with the exact calculations that were published by Huang for all locations and times. …”
Get full text
Article -
263
Familial Hemiplegic Migraine with Severe Attacks: A New Report with ATP1A2 Mutation
Published 2016-01-01“…Familial hemiplegic migraine (FHM) is a rare disorder characterized by migraine attacks with motor weakness during the aura phase. …”
Get full text
Article -
264
-
265
Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side-Channel Attack Resistance
Published 2014-01-01“…Hardware implementation has been carried out on both designs exploiting a specified side-channel attack standard evaluation FPGA board, called SASEBO-GII, and the corresponding power waveforms for both designs have been collected. …”
Get full text
Article -
266
-
267
Assessment of the Dynamics of Experiencing a Terrorist Threat before and after the Terrorist Attack at Crocus City Hall
Published 2025-01-01“…It was shown that after the March 22, 2024 terrorist attack in Crocus City Hall, there was an increase in experience of the threat due to increased vigilance, alertness, anticipation of future attacks, concern for loved ones and need for information about attacks. …”
Get full text
Article -
268
A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks
Published 2015-01-01“…However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. …”
Get full text
Article -
269
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2024-11-01Subjects: Get full text
Article -
270
-
271
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks
Published 2018-11-01“…Wireless sensor networks face threats of selective forwarding attacks which are simple to implement but difficult to detect. …”
Get full text
Article -
272
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects
Published 2025-01-01Subjects: Get full text
Article -
273
The effect of the Ayas model to learning individual fast attack and high-order thinking skills of handball for students
Published 2025-01-01Subjects: Get full text
Article -
274
Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack
Published 2020-01-01“…This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. …”
Get full text
Article -
275
False data injection attack sample generation using an adversarial attention-diffusion model in smart grids
Published 2024-12-01“…A false data injection attack (FDIA) indicates that attackers mislead system decisions by inputting false or tampered data into the system, which seriously threatens the security of power cyber-physical systems. …”
Get full text
Article -
276
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
277
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
Get full text
Article -
278
A Review of the Engineering Properties of Metakaolin Based Concrete: Towards Combatting Chloride Attack in Coastal/Marine Structures
Published 2020-01-01“…Hence, there is an increased need for alternate binder systems with the ability to reduce the effects of chloride attack in concrete. This paper presents a critical review of the engineering properties of metakaolin (MK) based concrete exposed to chloride attack. …”
Get full text
Article -
279
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
280
Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model
Published 2024-01-01Subjects: Get full text
Article