-
281
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01Subjects: Get full text
Article -
282
Geometry-covering based localization for Jamming attack in wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
283
STUDY ON FLOW CHARACTERISTICS OF WAVE-SHAPED RODS WITH SPATIAL ANGLE OF ATTACK
Published 2021-01-01Subjects: Get full text
Article -
284
Research of Hamming weight-based algebraic side-channel attack on LED
Published 2013-07-01“…Abstract:The security of LED against the algebraic side-channel attack (ASCA)was evaluated, which is a lightweight block cipher proposed in CHES 2011.Firstly, the attack model of ASCA was analyzed, and then the design and algebraic representations of LED were described. …”
Get full text
Article -
285
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: Get full text
Article -
286
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: Get full text
Article -
287
Effects of Sodium Sulfate Attack on Concrete Incorporated with Drying-Wetting Cycles
Published 2021-01-01“…It has been widely observed that sulfate attack can damage the durability of concrete. This research investigated the mass loss and damage degree of concrete under sodium sulfate attack incorporated with drying-wetting cycles. …”
Get full text
Article -
288
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01Subjects: “…SSL/TLS attacks…”
Get full text
Article -
289
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. …”
Get full text
Article -
290
You Only Attack Once: Single-Step DeepFool Algorithm
Published 2024-12-01Subjects: Get full text
Article -
291
Causality adversarial attack generation algorithm for intelligent unmanned communication system
Published 2024-01-01Subjects: Get full text
Article -
292
Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
Published 2007-01-01Subjects: Get full text
Article -
293
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01Subjects: Get full text
Article -
294
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
295
Mutual information power analysis attack of HMAC based on SM3
Published 2016-10-01Subjects: Get full text
Article -
296
Gradient purification federated adaptive learning algorithm for Byzantine attack resistance
Published 2024-10-01Subjects: Get full text
Article -
297
Microbial communities in the phyllosphere and endosphere of Norway spruce under attack by Heterobasidion
Published 2025-01-01“…In conclusion, the Heterobasidion attack decreased the microbial community species richness and shifted the community structure and functional structure to varying degrees. …”
Get full text
Article -
298
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01“…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
Get full text
Article -
299
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Published 2014-01-01“…To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. …”
Get full text
Article -
300
An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid
Published 2021-01-01“…Then, the evolution mechanism of the dispatch system of the microgrid under different attack scenarios is adequately discussed. On this basis, an optimal attack strategy based on enumerating-search algorithm is presented to allocate the limited attack resources reasonably, so as to maximize the effect of DoS attacks. …”
Get full text
Article