Showing 381 - 400 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 381

    An Acute Transverse Myelitis Attack after Total Body Irradiation: A Rare Case by Muzaffer Keklik, Leylagul Kaynar, Afra Yildirim, Serdar Sivgin, Celalettin Eroglu, Serife Cingoz, Cigdem Pala, Bulent Eser, Mustafa Cetin, Ali Unal

    Published 2013-01-01
    “…In this paper, we presented an ATM attack developed after TBI in a patient with acute lymphoblastic leukemia (ALL) as it is a rarely seen case.…”
    Get full text
    Article
  2. 382

    Defending against social engineering attacks: A security pattern‐based analysis framework by Tong Li, Chuanyong Song, Qinyu Pang

    Published 2023-07-01
    “…Abstract Social engineering attacks are a growing threat to modern complex systems. …”
    Get full text
    Article
  3. 383

    PFM:a SMS4 algorithm against high-order power analysis attacks by LI Lang1, LI Ren-fa1, LI Jing1, WU Ke-shou3

    Published 2010-01-01
    “…A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method(PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.…”
    Get full text
    Article
  4. 384

    Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems by Xile Kang, Hideaki Ishii

    Published 2025-01-01
    “…We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. …”
    Get full text
    Article
  5. 385
  6. 386

    How Prepared Are We for Possible Bioterrorist Attacks: An Approach from Emergency Medicine Perspective by Ali Kemal Erenler, Murat Güzel, Ahmet Baydin

    Published 2018-01-01
    “…Preparedness for bioterrorist attacks and early recognition of specific agents are essential for public health. …”
    Get full text
    Article
  7. 387

    Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation by Bin WANG, Simin LI, Yaguan QIAN, Jun ZHANG, Chaohao LI, Chenming ZHU, Hongfei ZHANG

    Published 2022-12-01
    “…Adversarial training is one of the commonly used defense methods against adversarial attacks, by incorporating adversarial samples into the training process.However, the effectiveness of adversarial training heavily relied on the size of the trained model.Specially, the size of trained models generated by the adversarial training will significantly increase for defending against adversarial attacks.This imposes constraints on the usability of adversarial training, especially in a resource-constraint environment.Thus, how to reduce the model size while ensuring the robustness of the trained model is a challenge.To address the above issues, a lightweight defense mechanism was proposed against adversarial attacks, with adaptive pruning and robust distillation.A hierarchically adaptive pruning method was applied to the model generated by adversarial training in advance.Then the trained model was further compressed by a modified robust distillation method.Experimental results on CIFAR-10 and CIFAR-100 datasets showed that our hierarchically adaptive pruning method presented stronger robustness under various FLOP than the existing pruning methods.Moreover, the fusion of pruning and robust distillation presented higher robustness than the state-of-art robust distillation methods.Therefore, the experimental results prove that the proposed method can improve the usability of the adversarial training in the IoT edge computing environment.…”
    Get full text
    Article
  8. 388

    McEliece public key cryptosystem attack algorithm based on enumeration error vector by Jing-mei LIU, Yan-li WANG, Bin LIANG, Lin-sen ZHAO

    Published 2014-05-01
    “…Considering the above analysis, an attack algorithm based on enumeration error vector was proposed. …”
    Get full text
    Article
  9. 389
  10. 390
  11. 391

    An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks by Selvam Saravanan, Uma Maheswari Balasubramanian

    Published 2024-06-01
    “…The current large-scale Internet of Things (IoT) networks typically generate high-velocity network traffic streams. Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc. …”
    Get full text
    Article
  12. 392

    Effect of Limestone Powder on Thaumasite Form of Sulfate Attack (TSA) of Cement-Based Materials by Yuxin Gao, Yaoling Luo, Lili Jia, Wen Yang, Chong Wang

    Published 2021-01-01
    “…Limestone powder can cause the thaumasite form of sulfate attack (TSA) of cement-based materials, but the relationship between the content of limestone powder and the degree of TSA is unclear. …”
    Get full text
    Article
  13. 393

    VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms by UZhi-jun W, UIYi C, UEMeng Y

    Published 2015-01-01
    “…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
    Get full text
    Article
  14. 394
  15. 395

    Identification method for malicious traffic in industrial Internet under new unknown attack scenarios by ZENG Fanyi, MAN Dapeng, XU Chen, HAN Shuai, WANG Huanran, ZHOU Xue, LI Xinchun, YANG Wu

    Published 2024-06-01
    “…Aiming at the problem of traffic data distribution shift caused by new unknown attacks in the industrial Internet, a malicious traffic identification method based on neighborhood filtering and stable learning was proposed to enhance the effectiveness and robustness of the existing graph neural network model in identifying known malicious traffic. …”
    Get full text
    Article
  16. 396

    A deep learning‐based attack on text CAPTCHAs by using object detection techniques by Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo

    Published 2022-03-01
    “…Abstract Text‐based CAPTCHAs have been widely deployed by many popular websites, and many have been attacked. However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training samples, thus making such attacks complicated and costly. …”
    Get full text
    Article
  17. 397
  18. 398

    Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding by Jen-Yeu Chen, Yi-Ying Tseng

    Published 2012-12-01
    “…Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
    Get full text
    Article
  19. 399

    Estimation of the Secondary Attack Rate for Delta Hepatitis Coinfection among Injection Drug Users by Christiane Poulin, Theresa Gyorkos, Lawrence Joseph

    Published 1993-01-01
    “…The secondary attack rate for delta hepatitis coinfection was estimated among a cluster of injection drug users (IDUs). …”
    Get full text
    Article
  20. 400