-
321
Electromagnetic signal fast adversarial attack method based on Jacobian saliency map
Published 2024-01-01Subjects: Get full text
Article -
322
Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method
Published 2024-12-01“…Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences. …”
Get full text
Article -
323
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: Get full text
Article -
324
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
Published 2021-01-01“…The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. …”
Get full text
Article -
325
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: Get full text
Article -
326
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01Subjects: “…multi-step attack pattern…”
Get full text
Article -
327
An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things
Published 2019-11-01“…Security is a critical challenge for a stable IoT network, for instance, routing attacks, especially sinkhole attack is a severe attack which has the capability to direct network data toward the intruder, and it can also disrupt and disconnect the devices from their network. …”
Get full text
Article -
328
Phenomenon of the “dawn attacks operation” as a money politics practices in Indonesian election
Published 2024-08-01“…The practice of handing out money before voting or dawn raids is still the choice of some legislative candidates to gain votes from citizens. Dawn attacks as a practice of money politics are an act of malpractice that can damage the democratic essence of holding general elections, because dawn attacks use money as a reciprocal tool to buy votes. …”
Get full text
Article -
329
Related-key impossible differential attack on a lightweight block cipher MIBS
Published 2014-02-01Subjects: “…impossible differential attack…”
Get full text
Article -
330
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Subjects: Get full text
Article -
331
Multi-step attack detection method based on network communication anomaly recognition
Published 2019-07-01Subjects: “…multi-step attack…”
Get full text
Article -
332
Fast Frequency Control Strategy Based on Worst-Case Network Attack Perception
Published 2024-12-01Subjects: Get full text
Article -
333
Transferable Targeted Adversarial Attack on Synthetic Aperture Radar (SAR) Image Recognition
Published 2025-01-01Subjects: Get full text
Article -
334
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
335
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
336
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach
Published 2017-01-01“…This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. …”
Get full text
Article -
337
Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
Published 2020-12-01“…DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. …”
Get full text
Article -
338
Attacks against Cultural Property in Armed Conflict – How to Reduce the Risk of Impunity?
Published 2024-12-01Get full text
Article -
339
Dual-branch autoencoder network for attacking deep hashing image retrieval models
Published 2023-11-01Subjects: “…targeted attack…”
Get full text
Article -
340
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01Subjects: Get full text
Article