-
521
-
522
2021–2022 Florida Citrus Production Guide: Soft-Bodied Insects Attacking Foliage and Fruit
Published 2021-10-01Get full text
Article -
523
Website defense strategy selection method based on attack-defense game and Monte Carlo simulation
Published 2018-08-01Subjects: “…attack-defense game…”
Get full text
Article -
524
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
525
Novel extended multivariate public key cryptosystem
Published 2014-04-01Subjects: Get full text
Article -
526
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01Subjects: “…False data injection attack…”
Get full text
Article -
527
An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems
Published 2025-01-01“…False data injection (FDI) attacks are among the most prevalent attacks in DBS, where the attacker injects false data into the communication infrastructure. …”
Get full text
Article -
528
Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios
Published 2025-01-01Subjects: Get full text
Article -
529
Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm
Published 2025-01-01“…Our framework is specifically designed to address various attacks, including denial of service (DoS) and Mirai attacks, which are particularly harmful to IoT systems. …”
Get full text
Article -
530
Probability-Based Sensitivity of Service Life of Chloride-Attacked Concrete Structures with Multiple Cover Concrete Repairs
Published 2018-01-01“…From the sensitivity analysis, the cover depth is found to be the most important parameter in the design of chloride-attacked concrete structures to extend the corrosion initiation and repair application times and to reduce the total expected number of repairs.…”
Get full text
Article -
531
Design of a Flapping Aircraft with Variable Angles of Attack Based on a RC/RRU Parallel Mechanism
Published 2023-10-01Subjects: Get full text
Article -
532
COVID-19 outbreak rates and infection attack rates associated with the workplace: a descriptive epidemiological study
Published 2022-07-01“…The objectives of this paper are to identify the geographical areas and industrial sectors with a high rate of outbreaks of COVID-19 and to compare infection attack rates by enterprise size and sector in England.Methods Public Health England (PHE) HPZone data on COVID-19 outbreaks in workplaces, between 18 May and 12 October 2020, were analysed. …”
Get full text
Article -
533
Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme
Published 2017-08-01Subjects: “…primary user emulation attack…”
Get full text
Article -
534
Communication performance analysis of secondary users in cognitive radio networks under primary user emulation attacks
Published 2012-11-01“…Cognitive radio network(CRN)is an effective technology and a hot research direction which could solve the problem of deficient resource and revolutionize utilization.And its safety technology attracted more and more researches.Primary user emulation(PUE)is a typically easily and largely affecting attack.PUE attacked come from both malicious misbehavior secondary users(MMU)and selfish misbehavior secondary users(SMU).The former was studied much more deeply than the later one.Distinguishing MMU and SMU,a four dimensional continuous time markov chain model to analyze the communication performance of normal secondary users under PUE attacks,and typically affected by SMUs was proposed.Furthermore,several PUE detection technologies were compared.The emulation results indicate that the SMU detection mechanism is essential for the PUE attack detection technology,which can improve the detection effects largely.…”
Get full text
Article -
535
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
Published 2025-01-01Subjects: Get full text
Article -
536
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01“…Among them, MKSE uses an improved TF-IDF weight calculation method to extract keywords and applies virtual keywords to construct inverted indexes, making it difficult for malicious attackers to infer the index content easily. SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. …”
Get full text
Article -
537
-
538
-
539
Double reputation and multi-angle weight-based cooperative spectrum sensing method against SSDF attacks
Published 2023-12-01“…In order to improve the ability of cooperative spectrum sensing to withstand spectrum sensing data falsification (SSDF) attacks, a double reputation and multi-angle weight-based cooperative spectrum sensing (DRMW-CSS) method was proposed.Firstly, a scoring reputation was obtained by multiple iterations of historical local decision results, and an accuracy reputation was calculated on this basis.Secondly, secondary users (SU) were screened by double reputation and multiple reputation thresholds.Then, the impact of SSDF attacks on the screening method was judged and divided into three situations.Finally, the final global decision was made using the corresponding multi-angle weight data fusion decision method according to different situations.Simulation results show that the proposed method has good sensing accuracy when facing SSDF attacks with different attack strategies and probabilities, and has better anti-attack capability compared to traditional methods.…”
Get full text
Article -
540
Investigation of the correlation of C1 esterase inhibitor levels and functions with attack severity and frequency in hereditary angioedema
Published 2024-06-01Subjects: Get full text
Article