Showing 481 - 500 results of 3,648 for search '"Attacker"', query time: 0.08s Refine Results
  1. 481

    Research and application of defense mechanism for prompt injection attack of large language model in financial industry by MOU Daen, WEI Zhihua, SUN Minglong, SONG Na, NI Lin

    Published 2024-10-01
    “…A risk taxonomy encompassing eight forms of input prompt injection attacks and five categories of safety scenarios on the output side was developed, and a financial domain large model prompt injection attack dataset, FIN-CSAPrompts, was collected using a human-machine adversarial approach. …”
    Get full text
    Article
  2. 482
  3. 483
  4. 484
  5. 485
  6. 486

    Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them by Abdullah Alabdulatif, Navod Neranjan Thilakarathne

    Published 2025-01-01
    “…Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. …”
    Get full text
    Article
  7. 487
  8. 488

    Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks by Wei-dong YANG, Yun-hua HE, Li-min SUN

    Published 2013-08-01
    “…Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. …”
    Get full text
    Article
  9. 489

    Dissipative Filter Design for Nonlinear Time-Varying-Delay Singular Systems against Deception Attacks by Guobao Liu, Shibin Shen, Xianglei Jia

    Published 2021-01-01
    “…This paper applies a T-S fuzzy model to depict a class of nonlinear time-varying-delay singular systems and investigates the dissipative filtering problem for these systems under deception attacks. The measurement output is assumed to encounter random deception attacks during signal transmission, and a Bernoulli distribution is used to describe this random phenomena. …”
    Get full text
    Article
  10. 490
  11. 491
  12. 492

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. …”
    Get full text
    Article
  13. 493

    Cooperative spectrum sensing scheme against SSDF attack based on ESD test in radio network by Lichun XIE, Chunqin ZHANG

    Published 2016-10-01
    “…Aiming at the problem that the cooperative spectrum sensing vulnerable to falsify data attacks in cognitive radio network, a cooperative spectrum sensing scheme with against SSDF attack based on test statistic and extreme studentized deviate test was proposed. …”
    Get full text
    Article
  14. 494
  15. 495

    Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination by Xinlei Liu, Jichao Xie, Tao Hu, Peng Yi, Yuxiang Hu, Shumin Huo, Zhen Zhang

    Published 2025-01-01
    “…MAPE effectively eliminates adversarial perturbations in various adversarial examples, providing a robust defense against attacks from different substitute models. In a black-box attack scenario utilizing ResNet-34 as the target model, our approach achieves average defense rates of over 95.1% on CIFAR-10 and over 71.5% on Mini-ImageNet, demonstrating state-of-the-art performance.…”
    Get full text
    Article
  16. 496
  17. 497

    Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method by Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal

    Published 2015-01-01
    “…Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. …”
    Get full text
    Article
  18. 498

    Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability by Suman Bhunia, Matthew Blackert, Henry Deal, Andrew DePero, Amar Patra

    Published 2025-01-01
    “…The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. …”
    Get full text
    Article
  19. 499

    A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks by Mehdi Rouissat, Ibrahim S. Alsukayti, Mohammed Belkheir, Mohammed Alreshoodi, Allel Mokaddem, Djamila Ziani

    Published 2025-01-01
    “…It incorporates limited protection from external security attacks but stays considerably vulnerable to internal routing attacks. …”
    Get full text
    Article
  20. 500

    Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model by Jimmy K. W. Wong, Ki Ki Chung, Yuen Wing Lo, Chun Yin Lai, Steve W. Y. Mung

    Published 2025-01-01
    “…Abstract This article details the development of a next-word prediction model utilizing federated learning and introduces a mechanism for detecting backdoor attacks. Federated learning enables multiple devices to collaboratively train a shared model while retaining data locally. …”
    Get full text
    Article