-
481
Research and application of defense mechanism for prompt injection attack of large language model in financial industry
Published 2024-10-01“…A risk taxonomy encompassing eight forms of input prompt injection attacks and five categories of safety scenarios on the output side was developed, and a financial domain large model prompt injection attack dataset, FIN-CSAPrompts, was collected using a human-machine adversarial approach. …”
Get full text
Article -
482
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01Subjects: Get full text
Article -
483
-
484
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01Subjects: Get full text
Article -
485
2018–2019 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2018-08-01Get full text
Article -
486
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01“…Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. …”
Get full text
Article -
487
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
488
Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
Published 2013-08-01“…Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. …”
Get full text
Article -
489
Dissipative Filter Design for Nonlinear Time-Varying-Delay Singular Systems against Deception Attacks
Published 2021-01-01“…This paper applies a T-S fuzzy model to depict a class of nonlinear time-varying-delay singular systems and investigates the dissipative filtering problem for these systems under deception attacks. The measurement output is assumed to encounter random deception attacks during signal transmission, and a Bernoulli distribution is used to describe this random phenomena. …”
Get full text
Article -
490
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01Subjects: “…property inference attack…”
Get full text
Article -
491
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01Subjects: Get full text
Article -
492
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
Published 2016-01-01“…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. …”
Get full text
Article -
493
Cooperative spectrum sensing scheme against SSDF attack based on ESD test in radio network
Published 2016-10-01“…Aiming at the problem that the cooperative spectrum sensing vulnerable to falsify data attacks in cognitive radio network, a cooperative spectrum sensing scheme with against SSDF attack based on test statistic and extreme studentized deviate test was proposed. …”
Get full text
Article -
494
2019–2020 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2019-08-01Get full text
Article -
495
Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination
Published 2025-01-01“…MAPE effectively eliminates adversarial perturbations in various adversarial examples, providing a robust defense against attacks from different substitute models. In a black-box attack scenario utilizing ResNet-34 as the target model, our approach achieves average defense rates of over 95.1% on CIFAR-10 and over 71.5% on Mini-ImageNet, demonstrating state-of-the-art performance.…”
Get full text
Article -
496
2024–2025 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2024-08-01Get full text
Article -
497
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method
Published 2015-01-01“…Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. …”
Get full text
Article -
498
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. …”
Get full text
Article -
499
A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks
Published 2025-01-01“…It incorporates limited protection from external security attacks but stays considerably vulnerable to internal routing attacks. …”
Get full text
Article -
500
Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model
Published 2025-01-01“…Abstract This article details the development of a next-word prediction model utilizing federated learning and introduces a mechanism for detecting backdoor attacks. Federated learning enables multiple devices to collaboratively train a shared model while retaining data locally. …”
Get full text
Article