Showing 321 - 340 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 321
  2. 322

    Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method by Ting Ma, Xiaofeng Zhang, Zhexin Miao

    Published 2024-12-01
    “…Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences. …”
    Get full text
    Article
  3. 323
  4. 324

    Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading by Xin-Rui Liu, Yuan Meng, Peng Chang

    Published 2021-01-01
    “…The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. …”
    Get full text
    Article
  5. 325
  6. 326
  7. 327

    An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things by Sabeen Tahir, Sheikh Tahir Bakhsh, Rayan A Alsemmeari

    Published 2019-11-01
    “…Security is a critical challenge for a stable IoT network, for instance, routing attacks, especially sinkhole attack is a severe attack which has the capability to direct network data toward the intruder, and it can also disrupt and disconnect the devices from their network. …”
    Get full text
    Article
  8. 328

    Phenomenon of the “dawn attacks operation” as a money politics practices in Indonesian election by Yusa Djuyandi, Diana Mahmuda

    Published 2024-08-01
    “…The practice of handing out money before voting or dawn raids is still the choice of some legislative candidates to gain votes from citizens. Dawn attacks as a practice of money politics are an act of malpractice that can damage the democratic essence of holding general elections, because dawn attacks use money as a reciprocal tool to buy votes. …”
    Get full text
    Article
  9. 329

    Related-key impossible differential attack on a lightweight block cipher MIBS by Ping CHEN, Fu-cheng LIAO, Hong-ru WEI

    Published 2014-02-01
    Subjects: “…impossible differential attack…”
    Get full text
    Article
  10. 330
  11. 331
  12. 332
  13. 333
  14. 334

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  15. 335
  16. 336

    Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach by Abdulaziz Aborujilah, Shahrulniza Musa

    Published 2017-01-01
    “…This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. …”
    Get full text
    Article
  17. 337

    Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet by Rebeen Rebwar Hama Amin, Dana Hassan, Masnida Hussin

    Published 2020-12-01
    “…DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. …”
    Get full text
    Article
  18. 338
  19. 339
  20. 340