Showing 441 - 460 results of 2,093 for search '"Attacker"', query time: 0.05s Refine Results
  1. 441

    One-Time Broadcast Encryption Schemes in Distributed Sensor Networks by Pawel Szalachowski, Zbigniew Kotulski

    Published 2012-03-01
    “…This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. Furthermore, an attacker in this environment is powerful. He can eavesdrop, modify, and inject messages or even capture a large number of nodes, so the solutions must be both secure and efficient. …”
    Get full text
    Article
  2. 442

    Robustness of Big Language Modeling in Finance by Yao Mohan

    Published 2025-01-01
    “…It is shown that an attacker can trigger the model illusion of a large language model through an adversarial attack to reduce the reliability of the large language model. …”
    Get full text
    Article
  3. 443

    Spoofing detection on adaptive authentication System‐A survey by Hind Baaqeel, Sunday Olusanya Olatunji

    Published 2022-03-01
    “…However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. …”
    Get full text
    Article
  4. 444

    Copyright protection of deep image classification models by Y.D. Vybornova, D.I. Ulyanov

    Published 2023-12-01
    “…The conducted series of attacks on protected models show that attempts of an attacker to completely remove the watermark will almost inevitably lead to a significant loss in the model prediction quality. …”
    Get full text
    Article
  5. 445

    Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network by Yongchao Ye, Lingjie Lao, Diqun Yan, Rangding Wang

    Published 2020-01-01
    “…It is likely to be abused by the malicious attacker to conceal his/her true identity. Existing forensic detection methods are no longer effective for weakly pitch-shifted voice. …”
    Get full text
    Article
  6. 446

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Finally, the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy mechanism. Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.…”
    Get full text
    Article
  7. 447

    Password strength verification based on machine learning algorithms and LSTM recurrent neural networks by V. V. Belikov, I. A. Prokuronov

    Published 2023-08-01
    “…One of the most commonly used authentication methods in computer systems, password authentication is susceptible to various attacks including brute-force and dictionary attacks. …”
    Get full text
    Article
  8. 448

    Hybrid Botnet Detection Based on Host and Network Analysis by Suzan Almutairi, Saoucene Mahfoudh, Sultan Almutairi, Jalal S. Alowibdi

    Published 2020-01-01
    “…The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. …”
    Get full text
    Article
  9. 449

    University proceedings. Volga region. Social sciences by D.V. Elistratov

    Published 2024-11-01
    “…Therefore, the aim of the study was to find new approaches to organizing and conducting classes on tactical and spe-cial training of the personnel of the Internal Affairs Directorate, including abandoning the principle of causing the least harm to the attacker, in the event of an armed attack on a In-ternal Affairs Directorate facility, taking into account, within the framework of tactical and special training, certain training elements used in the Armed Forces. …”
    Article
  10. 450

    Security protection method based on mimic defense and Paillier encryption for smart IoT terminals by GU Tiansheng, ZENG Fukang, SHAO Sisi, NIE Yijun, JI Zongkai, ZHENG Yulu, SHI Yuchen, LIU Shangdong, JI Yimu

    Published 2024-12-01
    “…During data encryption, it employed blind factor technology to execute a blind signature, rendering ciphertext information indecipherable even if an attacker obtained access to the decryption key of the Paillier encryption algorithm. …”
    Get full text
    Article
  11. 451

    Extremist Legitimate Defense in Iran's Criminal Proceedings (with an Emphasis on Intentional Homicide) by Saeed Ghaedi

    Published 2024-09-01
    “…The current research, using the analytical-descriptive method and collecting the required information in the library method, and relying on the cases of intentional homicide in the criminal justice system, Iran tries to evaluate the impact and impression of the judicial procedure of legal duality with the approaches of punishment based on defense conditions. and show the levels of defense, and at the end, while emphasizing the need for consistent criminal policy in order to protect the rights of walid the conclusion is reached that Note 2 of Article 302 is only about crimes and is based on non-observance of the levels of defense despite the necessity and truth of the principle of defense And the position of Note 2 of Article 156 also applies to other crimes in the absence of one of the conditions of legitimate defense .The effect of extreme legitimate defense in crimes is the deliberate impunity of revenge, and in other crimes, it is simply the imposition of the burden of the lack of defense conditions on the defender from the attacker.…”
    Get full text
    Article
  12. 452

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…This algorithm simulates the game between the attacker trying to infer private information through the attack model and the data processor retaining the original content of the traffic to the maximum extent. …”
    Get full text
    Article
  13. 453

    Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora by Ari Kusyanti, I Putu Agrahita Wiguna, Fariz Andri Bakhtiar

    Published 2023-12-01
    “…Testing of data security with active attack testing is successful because when the attacker sends the modified data, it has been checked on the gateway node and the resulting data is invalid. …”
    Get full text
    Article
  14. 454

    An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model by Mahan Fakhrooeian, Ali Basem, Mohammad Mahdi Gholami, Nahal Iliaee, Alireza Mohammadi Amidi, Amin Heydarian Hamzehkanloo, Akbar Karimipouya

    Published 2025-01-01
    “…Albeit microgrids can gain beneficial results in cost and energy schedules once operating in grid-connected mode, such systems are vulnerable to malicious attacks from the viewpoint of cybersecurity. With this in mind, this paper explores a novel advanced attack model named the false transferred data injection (FTDI) attack aiming to manipulatively alter the power flowing from the microgrid to the upstream grid to raise voltage usability probability. …”
    Get full text
    Article
  15. 455

    Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach by Afnan Alhindi, Saad Al-Ahmadi, Mohamed Maher Ben Ismail

    Published 2025-01-01
    “…In particular, the SSIM between the original data and the data reconstructed by the attacker, achieved by our approach, decreased significantly by 57%. …”
    Get full text
    Article
  16. 456

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…So that it raises the suspicion of an attacker who threatens the security of the information in it. …”
    Get full text
    Article
  17. 457

    Is low‐rate distributed denial of service a great threat to the Internet? by Ming Chen, Jing Chen, Xianglin Wei, Bing Chen

    Published 2021-09-01
    “…Abstract Low‐rate Distributed Denial of Service (LDDoS) attacks, in which the attackers send packets to a victim at a sufficiently low rate to avoid being detected, are considered to be a subtype of DDoS attacks and a potential threat to Internet security. …”
    Get full text
    Article
  18. 458

    Revisit two memoryless state‐recovery cryptanalysis methods on A5/1 by Yanbin Xu, Yonglin Hao, Mingxing Wang

    Published 2023-07-01
    “…Soon after its proposal, Zhang's near collision attack was severely challenged by Derbez et al. who claimed that Zhang's attack cannot have a time complexity lower than Golic's memoryless guess‐and‐determine attack dating back to EUROCRYPT 1997. …”
    Get full text
    Article
  19. 459

    Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System by Hyoungjun Kim, Jae-Yeol Kim, Kyung-Ho Lee

    Published 2025-01-01
    “…These attacks have a tendency to continuously expand the scale of the damage during the attack stage. …”
    Get full text
    Article
  20. 460

    The Security Weakness of Block Cipher Piccolo against Fault Analysis by Junghwan Song, Kwanhyung Lee, Younghoon Jung

    Published 2014-03-01
    “…Fault analysis is a type of side channel attack and cube attack is an algebraic attack finding sufficiently low-degree polynomials in a cipher. …”
    Get full text
    Article