-
281
IMPLICATIONS OF XENOPHOBIC ATTACKS ON NIGERIANS AND NIGERIA-SOUTH AFRICA DIPLOMATIC RELATIONS: A REVIEW OF RE-CURRENT ISSUES
Published 2024-07-01“… This study identifies factors that influence the rise in Xenophobia attacks in South Africa and how that affect diplomatic relations between Nigeria and South Africa on the global stage. …”
Get full text
Article -
282
Vortex Shedding Lock-In due to Pitching Oscillation of a Wind Turbine Blade Section at High Angles of Attack
Published 2019-01-01“…A prescribed sinusoidal pitching motion has been applied at a fixed amplitude of 7° for a range of high angles of attack 30°<α<150°. At these incidences, the airfoil will behave more like a bluff body and may experience periodic vortex shedding. …”
Get full text
Article -
283
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01“…However, its user-friendly simplicity also makes it susceptible to threats such as Dispersed Services Rejection (DDOS), Brete-Force, and incorrectly shaped package attacks. This article introduces a robust and reliable framework for preventing and defending against such attacks in MQTT-based IIoT systems based on the theory of merging attacks. …”
Get full text
Article -
284
Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)
Published 2019-01-01“…With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. …”
Get full text
Article -
285
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
Get full text
Article -
286
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
287
-
288
-
289
The Closer, The Harder? Investigating the use of peripheral vision in 3vs3 counter-attack VR situations in football
Published 2025-01-01“…Methods: Eighteen experienced football players were shown 3 vs. 3 virtual-reality football counter-attack situations from the perspective of the central defender. …”
Get full text
Article -
290
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
Published 2025-01-01“…Through this systematic inquiry, we have successfully identified the vulnerabilities and mitigation factors to deal with malware attacks. This SLR uncovers the vulnerabilities, emphasizing non-compliance with cybersecurity infrastructure. …”
Get full text
Article -
291
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01Subjects: Get full text
Article -
292
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01Subjects: Get full text
Article -
293
-
294
A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets
Published 2025-01-01Subjects: “…Trending topic attacks…”
Get full text
Article -
295
Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks
Published 2022-01-01“…This study concentrates on adaptive event-triggered control of complex dynamical networks with unpredictable coupling delays and stochastic deception attacks. The adaptive event-triggered mechanism is used to avoid the wasting of limited bandwidth. …”
Get full text
Article -
296
A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection
Published 2025-01-01“…With the continuous advancement of Internet technology, cybersecurity threats are growing more urgent as attack techniques become increasingly sophisticated. …”
Get full text
Article -
297
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01Subjects: Get full text
Article -
298
Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning
Published 2025-01-01“…Despite this, DDoS attacks through IoT botnets remain a significant threat. …”
Get full text
Article -
299
In search of a warning strategy against exchange-rate attacks: Forecasting tactics using artificial neural networks
Published 2000-01-01“…“Heart attacks and devaluations are not predictable and, certainly, are never preannounced”. …”
Get full text
Article -
300
Species and Termite Attack Intensity on Pine Trees in Nagari Talang Babungo, Solok District, West Sumatra Province
Published 2023-07-01“…The intensity of the termite attack was relatively low, with a percentage of lose weight by using graveyard test was 17.7%. …”
Get full text
Article