Showing 421 - 440 results of 3,648 for search '"Attacker"', query time: 0.10s Refine Results
  1. 421

    Multicast communication protocol based on quantum key distribution against trojan horse attacking by Hong-yang MA, Xing-kui FAN

    Published 2014-07-01
    “…A multicast communication protocol over quantum channel against Trojan horse attacking was proposed, in the network with one source quantum node and M target quantum nodes. …”
    Get full text
    Article
  2. 422

    A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks by Ramzi Saifan, Omar Al-Jarrah

    Published 2010-12-01
    “…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). If checking integrity and authenticity of a message is done only at the final destination, the intermediate nodes are going to forward bogus packets injected by an adversary many hops before they are detected. …”
    Get full text
    Article
  3. 423
  4. 424

    Islamophobia and Values in Western Societies: An Analysis of the Impacts on Muslim Men of Islamophobic Attacks in the UK by Durali Karacan

    Published 2023-12-01
    “…Instead, its focus is a thorough examination of the decline in the beliefs of Muslim men in these values, particularly in response to the growing incidents of Islamophobic attacks. The study delved into two specific Islamophobic assaults to shed light on the concerning extent of Islamophobia, suggesting a potential threat to both universal and Western values as well as social cohesion in the UK. …”
    Get full text
    Article
  5. 425
  6. 426
  7. 427
  8. 428
  9. 429

    Memory and Cerebral Blood Flow in Cases of Transient Global Amnesia During and After the Attack by H. Kazui, H. Tanabe, M. Ikeda, Y. Nakagawa, J. Shiraishi, K. Hashikawa

    Published 1995-01-01
    “…We administered various memory tests and neuroimaging examinations to four pure cases who met Hodges' clinical criteria for transient global amnesia (TGA), during and after the attack. The purpose of the present study was to determine whether procedural learning is acquired during TGA and whether priming effects are preserved during TGA, and to investigate the anatomical basis of various memory subcomponents through these cases. …”
    Get full text
    Article
  10. 430

    Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles by Qiyi He, Xiaolin Meng, Rong Qu

    Published 2020-01-01
    “…Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. …”
    Get full text
    Article
  11. 431
  12. 432
  13. 433

    Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks by Marcos Luengo Viñuela, Jesús-Ángel Román Gallego

    Published 2024-12-01
    “…The escalating integration of Internet of Things (IoT) devices has led to a surge in data generation within networks, consequently elevating the vulnerability to Distributed Denial of Service (DDoS) attacks. Detecting such attacks in IoT Networks is critical, and Machine Learning (ML) models have shown efficacy in this realm. …”
    Get full text
    Article
  14. 434
  15. 435
  16. 436

    Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis by Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li

    Published 2013-01-01
    “…Distributed denial of service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. …”
    Get full text
    Article
  17. 437
  18. 438

    Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks by Xiao Cai, Jian Kang, Kaibo Shi

    Published 2022-01-01
    “…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. …”
    Get full text
    Article
  19. 439

    Detecting Attacks and Estimating States of Power Grids from Partial Observations with Machine Learning by Zheng-Meng Zhai, Mohammadamin Moradi, Ying-Cheng Lai

    Published 2025-02-01
    “…The ever-increasing complexity of modern power grids makes them vulnerable to cyber and/or physical attacks. To protect them, accurate attack detection is essential. …”
    Get full text
    Article
  20. 440

    Distribution and Attack Rate of Spodoptera frugiperda on Maize in Sijunjung District, West Sumatera Province by Syafria Syafria, Reflinaldon Reflinaldon, Novri Nelly

    Published 2023-07-01
    “…The results showed that S. frugiperda had spread and attacked maize crops evenly in Sijunjung District, but the attack rate (26.96%) and density (0.24 individuals) were low. …”
    Get full text
    Article