-
381
An Acute Transverse Myelitis Attack after Total Body Irradiation: A Rare Case
Published 2013-01-01“…In this paper, we presented an ATM attack developed after TBI in a patient with acute lymphoblastic leukemia (ALL) as it is a rarely seen case.…”
Get full text
Article -
382
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…Abstract Social engineering attacks are a growing threat to modern complex systems. …”
Get full text
Article -
383
PFM:a SMS4 algorithm against high-order power analysis attacks
Published 2010-01-01“…A fixed-value mask algorithm for SMS4 was proposed in order to resist power analysis attack based SMS4.Firstly,an atomic mask algorithm of SMS4 was designed to resist against high-order power analysis attack based on the study of the structure of SMS4 algorithm,the intermediate variables were masked in the method.Secondly,pseudo-random fixed-value mask method(PFM) was proposed based on the above method,when its hardware implementation aiming at low power and less areas was considered about.Moreover,PFM has the ability to resist against high-order power analysis attacks when applied to the sensor node of special environment of communication.Finally,the experimental results show that the proposed algorithm has the ability to effectively resist second high-order differential power analysis attack without increasing much power and hardware resources.…”
Get full text
Article -
384
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01“…We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. …”
Get full text
Article -
385
Enhancing Heart Attack Prediction with Machine Learning: A Study at Jordan University Hospital
Published 2024-01-01Get full text
Article -
386
How Prepared Are We for Possible Bioterrorist Attacks: An Approach from Emergency Medicine Perspective
Published 2018-01-01“…Preparedness for bioterrorist attacks and early recognition of specific agents are essential for public health. …”
Get full text
Article -
387
Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation
Published 2022-12-01“…Adversarial training is one of the commonly used defense methods against adversarial attacks, by incorporating adversarial samples into the training process.However, the effectiveness of adversarial training heavily relied on the size of the trained model.Specially, the size of trained models generated by the adversarial training will significantly increase for defending against adversarial attacks.This imposes constraints on the usability of adversarial training, especially in a resource-constraint environment.Thus, how to reduce the model size while ensuring the robustness of the trained model is a challenge.To address the above issues, a lightweight defense mechanism was proposed against adversarial attacks, with adaptive pruning and robust distillation.A hierarchically adaptive pruning method was applied to the model generated by adversarial training in advance.Then the trained model was further compressed by a modified robust distillation method.Experimental results on CIFAR-10 and CIFAR-100 datasets showed that our hierarchically adaptive pruning method presented stronger robustness under various FLOP than the existing pruning methods.Moreover, the fusion of pruning and robust distillation presented higher robustness than the state-of-art robust distillation methods.Therefore, the experimental results prove that the proposed method can improve the usability of the adversarial training in the IoT edge computing environment.…”
Get full text
Article -
388
McEliece public key cryptosystem attack algorithm based on enumeration error vector
Published 2014-05-01“…Considering the above analysis, an attack algorithm based on enumeration error vector was proposed. …”
Get full text
Article -
389
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01Subjects: Get full text
Article -
390
-
391
An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks
Published 2024-06-01“…The current large-scale Internet of Things (IoT) networks typically generate high-velocity network traffic streams. Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc. …”
Get full text
Article -
392
Effect of Limestone Powder on Thaumasite Form of Sulfate Attack (TSA) of Cement-Based Materials
Published 2021-01-01“…Limestone powder can cause the thaumasite form of sulfate attack (TSA) of cement-based materials, but the relationship between the content of limestone powder and the degree of TSA is unclear. …”
Get full text
Article -
393
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Published 2015-01-01“…Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving the Chord algorithm according to the routing strategy in cloud computing.Hence,the virtualization hash security access path (VHSAP) in three-layer structure is proposed to protect the cloud computing platform.In VHSAP,the heartbeat mechanism is applied to realize virtual nodes by using the virtual technology.Therefore,the virtual nodes have the ability of resilience,which can complete the seamless switching between being attacked nodes in cloud computing platform,and guarantee the legitimate user's authority of accessing to the resource in cloud computing platform.Experiments of VHSAP defending against DDoS attacks are carried out in simulation network environment.The parameters,such as the number of being attacked nodes in hash secure access path (HSAP),and the switching time and the handoff delay between nodes,are focused in experiments.The result shows that VHSAP achieves a higher data pass rate than that of SOS approach,and enhances the security of cloud computing platform.…”
Get full text
Article -
394
Where does the panic attack come from... – characteristics and forms of therapy for anxiety disorders
Published 2025-01-01Get full text
Article -
395
Identification method for malicious traffic in industrial Internet under new unknown attack scenarios
Published 2024-06-01“…Aiming at the problem of traffic data distribution shift caused by new unknown attacks in the industrial Internet, a malicious traffic identification method based on neighborhood filtering and stable learning was proposed to enhance the effectiveness and robustness of the existing graph neural network model in identifying known malicious traffic. …”
Get full text
Article -
396
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…Abstract Text‐based CAPTCHAs have been widely deployed by many popular websites, and many have been attacked. However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training samples, thus making such attacks complicated and costly. …”
Get full text
Article -
397
Machine learning-based detection, identification and restoration method of jamming attacks in optical networks
Published 2023-07-01Subjects: Get full text
Article -
398
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
Get full text
Article -
399
Estimation of the Secondary Attack Rate for Delta Hepatitis Coinfection among Injection Drug Users
Published 1993-01-01“…The secondary attack rate for delta hepatitis coinfection was estimated among a cluster of injection drug users (IDUs). …”
Get full text
Article -
400
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: “…DDoS attacks…”
Get full text
Article