-
421
Multicast communication protocol based on quantum key distribution against trojan horse attacking
Published 2014-07-01“…A multicast communication protocol over quantum channel against Trojan horse attacking was proposed, in the network with one source quantum node and M target quantum nodes. …”
Get full text
Article -
422
A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks
Published 2010-12-01“…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). If checking integrity and authenticity of a message is done only at the final destination, the intermediate nodes are going to forward bogus packets injected by an adversary many hops before they are detected. …”
Get full text
Article -
423
Multibit image watermarking algorithm resistant to geometric attacks based on level set method
Published 2011-01-01Subjects: Get full text
Article -
424
Islamophobia and Values in Western Societies: An Analysis of the Impacts on Muslim Men of Islamophobic Attacks in the UK
Published 2023-12-01“…Instead, its focus is a thorough examination of the decline in the beliefs of Muslim men in these values, particularly in response to the growing incidents of Islamophobic attacks. The study delved into two specific Islamophobic assaults to shed light on the concerning extent of Islamophobia, suggesting a potential threat to both universal and Western values as well as social cohesion in the UK. …”
Get full text
Article -
425
Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
Published 2023-09-01Subjects: “…load redistribution attacks…”
Get full text
Article -
426
Research on discovering multi-step attack patterns based on clustering IDS alert sequences
Published 2011-01-01Subjects: Get full text
Article -
427
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Published 2014-02-01Subjects: Get full text
Article -
428
Experimental assessment of аdversarial attacks to the deep neural networks in medical image recognition
Published 2019-09-01Subjects: “…adversarial attacks…”
Get full text
Article -
429
Memory and Cerebral Blood Flow in Cases of Transient Global Amnesia During and After the Attack
Published 1995-01-01“…We administered various memory tests and neuroimaging examinations to four pure cases who met Hodges' clinical criteria for transient global amnesia (TGA), during and after the attack. The purpose of the present study was to determine whether procedural learning is acquired during TGA and whether priming effects are preserved during TGA, and to investigate the anatomical basis of various memory subcomponents through these cases. …”
Get full text
Article -
430
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
Published 2020-01-01“…Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. …”
Get full text
Article -
431
October 7th Mass Casualty Attack in Israel: Injury Profiles of Hospitalized Casualties
Published 2024-09-01“…This surprise attack involved an unprecedented number of casualties. …”
Get full text
Article -
432
Research review of network defense decision-making methods based on attack and defense game
Published 2022-02-01Subjects: Get full text
Article -
433
Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks
Published 2024-12-01“…The escalating integration of Internet of Things (IoT) devices has led to a surge in data generation within networks, consequently elevating the vulnerability to Distributed Denial of Service (DDoS) attacks. Detecting such attacks in IoT Networks is critical, and Machine Learning (ML) models have shown efficacy in this realm. …”
Get full text
Article -
434
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01Subjects: Get full text
Article -
435
Prediction method of 0day attack path based on cyber defense knowledge graph
Published 2022-02-01Subjects: Get full text
Article -
436
Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis
Published 2013-01-01“…Distributed denial of service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. …”
Get full text
Article -
437
Evaluating Uncertainty Behaviors of Cognitive Users Against SSDF Attack for Cooperative Spectrum Sensing
Published 2015-02-01Subjects: Get full text
Article -
438
Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks
Published 2022-01-01“…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
Get full text
Article -
439
Detecting Attacks and Estimating States of Power Grids from Partial Observations with Machine Learning
Published 2025-02-01“…The ever-increasing complexity of modern power grids makes them vulnerable to cyber and/or physical attacks. To protect them, accurate attack detection is essential. …”
Get full text
Article -
440
Distribution and Attack Rate of Spodoptera frugiperda on Maize in Sijunjung District, West Sumatera Province
Published 2023-07-01“…The results showed that S. frugiperda had spread and attacked maize crops evenly in Sijunjung District, but the attack rate (26.96%) and density (0.24 individuals) were low. …”
Get full text
Article