-
361
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
Published 2018-04-01Subjects: Get full text
Article -
362
Analysis of attacking styles and goal-scoring in the 2021/22 Women's Super League.
Published 2025-01-01“…The style of attack for each attacking sequence was characterised by research guided key performance indicators and recorded with the outcome of the subsequent shot on target. …”
Get full text
Article -
363
The Holling Type II Population Model Subjected to Rapid Random Attacks of Predator
Published 2018-01-01“…We present the analysis of a mathematical model of the dynamics of interacting predator and prey populations with the Holling type random trophic function under the assumption of random time interval passage between predator attacks on prey. We propose a stochastic approximation algorithm for quantitative analysis of the above model based on the probabilistic limit theorem. …”
Get full text
Article -
364
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Published 2025-01-01Get full text
Article -
365
Improvement of Early Recognition of Attacks in Karate Kumite Due to Training in Virtual Reality
Published 2019-11-01“…Early steps for the preparation of the attack and the reduction of distance seem to be important signals for attack recognition. …”
Get full text
Article -
366
Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm
Published 2014-01-01Get full text
Article -
367
Study of a new packet marking scheme for DDoS attack source traceback
Published 2005-01-01Subjects: Get full text
Article -
368
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01Subjects: Get full text
Article -
369
Literature Review and Clinical Presentation of Bilateral Acetabular Fractures Secondary to Seizure Attacks
Published 2012-01-01“…However, 26 cases that occurred as a result of a seizure attack appeared in the literature from 1970 to 2007, with the seizure attacks themselves caused by many different factors. …”
Get full text
Article -
370
Secure privacy-preserving record linkage system from re-identification attack.
Published 2025-01-01“…Privacy-preserving record linkage (PPRL) technology, crucial for linking records across datasets while maintaining privacy, is susceptible to graph-based re-identification attacks. These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. …”
Get full text
Article -
371
UDM:NFV-based prevention mechanism against DDoS attack on SDN controller
Published 2019-03-01Subjects: “…DDoS attack…”
Get full text
Article -
372
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01Subjects: Get full text
Article -
373
Effects on lifetime of opportunistic network based on Epidemic routing under flooding attacks
Published 2012-09-01Subjects: Get full text
Article -
374
Learning-based DoS attack game strategy over multi-process systems
Published 2024-12-01Subjects: Get full text
Article -
375
Safety Analysis against Tsunami Attacks at a Nuclear Power Plant Site
Published 2013-01-01“…These nuclear power plant sites may be vulnerable to unexpected tsunami attacks. In this study, a coupled numerical model based on the shallow-water theory was employed to analyze the safety of the Uljin Nuclear Power Plant site against three historical and eleven virtual tsunami attacks. …”
Get full text
Article -
376
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack
Published 2016-01-01“…The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave), and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. …”
Get full text
Article -
377
Limits of deception in Islamic laws of war: the case of civilian disguises in suicide attacks
Published 2020-10-01“…The suicide attack is an infamous method of warfare mostly associated with Islamic militant groups. …”
Get full text
Article -
378
Unsupervised detection method of RoQ covert attacks based on multilayer features
Published 2022-09-01Subjects: “…RoQ converts attack…”
Get full text
Article -
379
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
380
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01“…The massive APT attack analysis reports and threat intelligence generated by security companies have significant research value. …”
Get full text
Article