Showing 281 - 300 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 281

    IMPLICATIONS OF XENOPHOBIC ATTACKS ON NIGERIANS AND NIGERIA-SOUTH AFRICA DIPLOMATIC RELATIONS: A REVIEW OF RE-CURRENT ISSUES by ABDULRASHEED ABDULYAKEEN, MUHAMMAD RABIU

    Published 2024-07-01
    “… This study identifies factors that influence the rise in Xenophobia attacks in South Africa and how that affect diplomatic relations between Nigeria and South Africa on the global stage. …”
    Get full text
    Article
  2. 282

    Vortex Shedding Lock-In due to Pitching Oscillation of a Wind Turbine Blade Section at High Angles of Attack by Craig Meskell, Alberto Pellegrino

    Published 2019-01-01
    “…A prescribed sinusoidal pitching motion has been applied at a fixed amplitude of 7° for a range of high angles of attack 30°<α<150°. At these incidences, the airfoil will behave more like a bluff body and may experience periodic vortex shedding. …”
    Get full text
    Article
  3. 283

    A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques by Serkan Gönen

    Published 2024-12-01
    “…However, its user-friendly simplicity also makes it susceptible to threats such as Dispersed Services Rejection (DDOS), Brete-Force, and incorrectly shaped package attacks. This article introduces a robust and reliable framework for preventing and defending against such attacks in MQTT-based IIoT systems based on the theory of merging attacks. …”
    Get full text
    Article
  4. 284

    Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN) by Robert A. Sowah, Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, Koudjo M. Koumadi

    Published 2019-01-01
    “…With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. …”
    Get full text
    Article
  5. 285

    Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay by MI Yang, YANG Zishuai, XU Mingming, ZHOU Jie, HAN Yunhao

    Published 2025-02-01
    Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
    Get full text
    Article
  6. 286
  7. 287
  8. 288
  9. 289

    The Closer, The Harder? Investigating the use of peripheral vision in 3vs3 counter-attack VR situations in football by Božo Vukojević, Svitlana Pinchuk, Christian Vater

    Published 2025-01-01
    “…Methods: Eighteen experienced football players were shown 3 vs. 3 virtual-reality football counter-attack situations from the perspective of the central defender. …”
    Get full text
    Article
  10. 290

    Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review by Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna, Kiran Adnan

    Published 2025-01-01
    “…Through this systematic inquiry, we have successfully identified the vulnerabilities and mitigation factors to deal with malware attacks. This SLR uncovers the vulnerabilities, emphasizing non-compliance with cybersecurity infrastructure. …”
    Get full text
    Article
  11. 291
  12. 292
  13. 293
  14. 294
  15. 295

    Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks by M. Mubeen Tajudeen, M. Syed Ali, Syeda Asma Kauser, Khanyaluck Subkrajang, Anuwat Jirawattanapanit, Grienggrai Rajchakit

    Published 2022-01-01
    “…This study concentrates on adaptive event-triggered control of complex dynamical networks with unpredictable coupling delays and stochastic deception attacks. The adaptive event-triggered mechanism is used to avoid the wasting of limited bandwidth. …”
    Get full text
    Article
  16. 296

    A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection by Han Zhuoxi

    Published 2025-01-01
    “…With the continuous advancement of Internet technology, cybersecurity threats are growing more urgent as attack techniques become increasingly sophisticated. …”
    Get full text
    Article
  17. 297
  18. 298
  19. 299

    In search of a warning strategy against exchange-rate attacks: Forecasting tactics using artificial neural networks by A. S. Andreou, G. A. Zombanakis, E. F. Georgopoulos, S. D. Likothanassis

    Published 2000-01-01
    “…“Heart attacks and devaluations are not predictable and, certainly, are never preannounced”. …”
    Get full text
    Article
  20. 300

    Species and Termite Attack Intensity on Pine Trees in Nagari Talang Babungo, Solok District, West Sumatra Province by Desyanti Desyanti, Fauzan Fauzan, Zulhilda Yenti

    Published 2023-07-01
    “…The intensity of the termite attack was relatively low, with a percentage of lose weight by using graveyard test was 17.7%. …”
    Get full text
    Article