Showing 281 - 300 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 281
  2. 282
  3. 283
  4. 284

    Research of Hamming weight-based algebraic side-channel attack on LED by Ke-ke JI, Tao WANG, Shi-ze GUO, Xin-jie ZHAO, Hui-ying LIU

    Published 2013-07-01
    “…Abstract:The security of LED against the algebraic side-channel attack (ASCA)was evaluated, which is a lightweight block cipher proposed in CHES 2011.Firstly, the attack model of ASCA was analyzed, and then the design and algebraic representations of LED were described. …”
    Get full text
    Article
  5. 285
  6. 286
  7. 287

    Effects of Sodium Sulfate Attack on Concrete Incorporated with Drying-Wetting Cycles by Fang Liu, Zhanping You, Rui Xiong, Xu Yang

    Published 2021-01-01
    “…It has been widely observed that sulfate attack can damage the durability of concrete. This research investigated the mass loss and damage degree of concrete under sodium sulfate attack incorporated with drying-wetting cycles. …”
    Get full text
    Article
  8. 288
  9. 289

    Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version by M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan

    Published 2015-01-01
    “…The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. …”
    Get full text
    Article
  10. 290
  11. 291
  12. 292
  13. 293
  14. 294
  15. 295
  16. 296
  17. 297

    Microbial communities in the phyllosphere and endosphere of Norway spruce under attack by Heterobasidion by Wen-jing Meng, Zi-lan Wen, Risto Kasanen, Hui Sun, Hui Sun, Fred O. Asiegbu

    Published 2025-01-01
    “…In conclusion, the Heterobasidion attack decreased the microbial community species richness and shifted the community structure and functional structure to varying degrees. …”
    Get full text
    Article
  18. 298

    APT attack threat-hunting network model based on hypergraph Transformer by Yuancheng LI, Yukun LIN

    Published 2024-02-01
    “…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
    Get full text
    Article
  19. 299

    AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid by Jongbin Ko, Hyunwoo Lim, Seokjun Lee, Taeshik Shon

    Published 2014-01-01
    “…To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. …”
    Get full text
    Article
  20. 300

    An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid by Yihe Wang, Mingli Zhang, Kun Song, Tie Li, Na Zhang

    Published 2021-01-01
    “…Then, the evolution mechanism of the dispatch system of the microgrid under different attack scenarios is adequately discussed. On this basis, an optimal attack strategy based on enumerating-search algorithm is presented to allocate the limited attack resources reasonably, so as to maximize the effect of DoS attacks. …”
    Get full text
    Article