Showing 521 - 540 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 521
  2. 522
  3. 523
  4. 524
  5. 525
  6. 526
  7. 527

    An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems by Ping Yu, Ding Yang, Khalid A. Alattas, Ardashir Mohammadzadeh, Afef Fekih

    Published 2025-01-01
    “…False data injection (FDI) attacks are among the most prevalent attacks in DBS, where the attacker injects false data into the communication infrastructure. …”
    Get full text
    Article
  8. 528
  9. 529

    Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm by Bambang Susilo, Abdul Muis, Riri Fitri Sari

    Published 2025-01-01
    “…Our framework is specifically designed to address various attacks, including denial of service (DoS) and Mirai attacks, which are particularly harmful to IoT systems. …”
    Get full text
    Article
  10. 530

    Probability-Based Sensitivity of Service Life of Chloride-Attacked Concrete Structures with Multiple Cover Concrete Repairs by Aruz Petcherdchoo

    Published 2018-01-01
    “…From the sensitivity analysis, the cover depth is found to be the most important parameter in the design of chloride-attacked concrete structures to extend the corrosion initiation and repair application times and to reduce the total expected number of repairs.…”
    Get full text
    Article
  11. 531
  12. 532

    COVID-19 outbreak rates and infection attack rates associated with the workplace: a descriptive epidemiological study by Yiqun Chen, Fu-Meng Khaw, Timothy Aldridge, Claire Ferraro

    Published 2022-07-01
    “…The objectives of this paper are to identify the geographical areas and industrial sectors with a high rate of outbreaks of COVID-19 and to compare infection attack rates by enterprise size and sector in England.Methods Public Health England (PHE) HPZone data on COVID-19 outbreaks in workplaces, between 18 May and 12 October 2020, were analysed. …”
    Get full text
    Article
  13. 533
  14. 534

    Communication performance analysis of secondary users in cognitive radio networks under primary user emulation attacks by Shan-shan WANG, Xing-guo LUO, Peng LI

    Published 2012-11-01
    “…Cognitive radio network(CRN)is an effective technology and a hot research direction which could solve the problem of deficient resource and revolutionize utilization.And its safety technology attracted more and more researches.Primary user emulation(PUE)is a typically easily and largely affecting attack.PUE attacked come from both malicious misbehavior secondary users(MMU)and selfish misbehavior secondary users(SMU).The former was studied much more deeply than the later one.Distinguishing MMU and SMU,a four dimensional continuous time markov chain model to analyze the communication performance of normal secondary users under PUE attacks,and typically affected by SMUs was proposed.Furthermore,several PUE detection technologies were compared.The emulation results indicate that the SMU detection mechanism is essential for the PUE attack detection technology,which can improve the detection effects largely.…”
    Get full text
    Article
  15. 535
  16. 536

    Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm by Demei Mao, Mingzhu Wang

    Published 2025-12-01
    “…Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. …”
    Get full text
    Article
  17. 537
  18. 538
  19. 539

    Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks by Zhiguo SUN, Zhao WANG, Zengmao CHEN, Rongchen SUN

    Published 2023-12-01
    “…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
    Get full text
    Article
  20. 540