Showing 21 - 40 results of 2,093 for search '"Attacker"', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23

    New attacks against reduced Rijndael‐160 by Xiaoli Dong, Yongzhuang Wei

    Published 2022-01-01
    “…Abstract The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. …”
    Get full text
    Article
  4. 24

    Hybrid Intrusion Detection System for DDoS Attacks by Özge Cepheli, Saliha Büyükçorak, Güneş Karabulut Kurt

    Published 2016-01-01
    “…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. …”
    Get full text
    Article
  5. 25

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…The classification resulting from this model yielded high accuracy with robust results for different attack scenarios. Results reflect the potential superiority of the given model in detecting DDoS attacks. …”
    Get full text
    Article
  6. 26

    Prediction of Network Threats and Attacks by Mathematical Simulation by Daniil Doroshenko

    Published 2024-11-01
    “…The purpose of the article is a comprehensive study of modern methods of mathematical modeling of network threats and attacks, as well as studying their effectiveness. …”
    Get full text
    Article
  7. 27

    The Application of Baum-Welch Algorithm in Multistep Attack by Yanxue Zhang, Dongmei Zhao, Jinxing Liu

    Published 2014-01-01
    “…In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34

    Layperson knowledge of heart attacks in the state of Georgia, USA by Shiva Sajja, Thor Stead, Rohan Mangal, Latha Ganti

    Published 2023-09-01
    “…A survey of 200 residents of the state of Georgia, United States was conducted to assess the knowledge of heart attacks. Results depict that Georgia residents have only a basic understanding of heart attack symptoms suggesting the need for medical professionals to spend more time educating their patients on their health in simple terms so that the patients can be knowledgeable on their personal health.…”
    Get full text
    Article
  15. 35

    A Second Preimage Attack on the XOR Hash Combiner by Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang

    Published 2024-01-01
    “…Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about O2n+12n/2+n−l2n−l+n−k2n−k+2l+1+2k+1) (n is the size of the XOR hash combiner and l and k are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity O2n, and memory of about O2k+2l.…”
    Get full text
    Article
  16. 36

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.…”
    Get full text
    Article
  17. 37

    Intra-Attack Vestibuloocular Reflex Changes in Ménière’s Disease by Dario A. Yacovino, John B. Finlay

    Published 2016-01-01
    “…Ménière’s attack has been shown to temporarily alter the vestibuloocular reflex (VOR). …”
    Get full text
    Article
  18. 38

    Aortic Valve Fibroelastoma Masquerading as Transient Ischaemic Attack by Penelope-Anne Gowland, Ragheb Hasan

    Published 2012-01-01
    “…This patient experienced recurrent transient ischemic attacks (TIAs’). He was taken to theatre on urgent basis to remove the papillary fibroelastoma. …”
    Get full text
    Article
  19. 39

    An exploratory study of interpretability for face presentation attack detection by Ana F. Sequeira, Tiago Gonçalves, Wilson Silva, João Ribeiro Pinto, Jaime S. Cardoso

    Published 2021-07-01
    “…Abstract Biometric recognition and presentation attack detection (PAD) methods strongly rely on deep learning algorithms. …”
    Get full text
    Article
  20. 40

    Vegetative status in patients with transient ischemic attack and stroke by N. V. Halinouskaya, S. V. Samsonau

    Published 2018-06-01
    Subjects: “…transient ischemic attack…”
    Get full text
    Article