Showing 541 - 560 results of 2,093 for search '"Attacker"', query time: 0.07s Refine Results
  1. 541

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks. In this paper, we present a security analysis of their scheme and our results show that scheme does not have resistance against malicious-KGC attack. …”
    Get full text
    Article
  2. 542

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…The existing privacy big data encryption algorithm cannot achieve real-time update of big data and repeat more big data, resulting in low attack resistance and more malicious attack data. …”
    Get full text
    Article
  3. 543

    APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS by Pham Nguyen Huy Phuong, Dang Le Nam

    Published 2013-06-01
    “…Nowadays, developing and evaluating pattern matching algorithms for the identification of network-attack has been constantly evolving. In this paper, the pattern matching algorithms is deployed by emulating forms of network attacks on intrusion detection system together with firewall IOS/I PS. …”
    Get full text
    Article
  4. 544

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. …”
    Get full text
    Article
  5. 545

    A Secure RFID Authentication Protocol Adopting Error Correction Code by Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, Hung-Min Sun

    Published 2014-01-01
    “…Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. …”
    Get full text
    Article
  6. 546

    Prediction of Future Terrorist Activities Using Deep Neural Networks by M. Irfan Uddin, Nazir Zada, Furqan Aziz, Yousaf Saeed, Asim Zeb, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud

    Published 2020-01-01
    “…Or what type of weapon is going to be used in the attack? Or what type of attack is going to be carried out? …”
    Get full text
    Article
  7. 547

    Risk factors for loss to follow-up in patients with gout: A Korean prospective cohort study. by Hyunsue Do, Chang-Nam Son, Hyo Jin Choi, Ji Hyoun Kim, Min Jung Kim, Kichul Shin, Sang-Hyon Kim, Byoongyong Choi, You-Jung Ha, Joong Kyong Ahn, Hyun-Ok Kim, Sung Won Lee, Chang Hoon Lee, Ran Song, Kyeong Min Son, Seung-Geun Lee, Ki Won Moon

    Published 2025-01-01
    “…Logistic regression identified frequent gout attacks, concerns about attacks, anxiety, impaired mobility, and EQ-5D scores as significant predictors of LTFU.…”
    Get full text
    Article
  8. 548

    Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks by Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz

    Published 2025-01-01
    “…These connected devices pose a challenge to cybersecurity systems due attacks in network communications. Such attacks have continued to threaten the operation of systems and end-users. …”
    Get full text
    Article
  9. 549

    Improved integral cryptanalysis of SPNbox in digital rights management systems by Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang

    Published 2023-01-01
    “…On this basis, we propose new competitive 3‐round key recovery attacks with lower complexities. Particularly, the improved attack on 3‐round SPNbox‐32 only requires 232 chosen plaintexts, whereas the current best attack necessitates 262 chosen plaintexts. …”
    Get full text
    Article
  10. 550

    Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments by Mukund Bhole, Thilo Sauter, Wolfgang Kastner

    Published 2025-01-01
    “…We aim to provide relevant stakeholders (manufacturers, asset owners and system integrators), including Chief Information Security Officers, with information on emerging threat groups, attack victims and their locations, the origins of attacks, the tools and types of tools used, and the motivations behind these attacks. …”
    Get full text
    Article
  11. 551

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…The algorithm can also resist some common attacks and accidents, such as exhaustion attack, differential attack, noise attack, information loss and so on.…”
    Get full text
    Article
  12. 552

    ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization by Shaochen Ren, Jianian Jin, Guanchong Niu, Yang Liu

    Published 2025-01-01
    “…The increasing sophistication and frequency of cyber attacks necessitate automated and intelligent response mechanisms that can adapt to evolving threats. …”
    Get full text
    Article
  13. 553

    Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN by Kuni Inayah, Kalamullah Ramli

    Published 2024-08-01
    “…The model classifies 10 (ten) classifications, namely Benign, Information Leak, Malware, Trojan Activity, Information Gathering, APT, Exploit, Web Application Attack, Denial of Service (DoS), and other types of attacks. …”
    Get full text
    Article
  14. 554

    Developing an Intelligent System for Efficient Botnet Detection in IoT Environment by Ramesh Singh Rawat, Manoj Diwakar, Umang Garg, Prakash Srivastava

    Published 2025-04-01
    “…Smart technological instruments and Internet of Things (IoT) systems are now targeted by network attacks because of their widespread rising use. Attackers can take over IoT devices via botnets, and pre-configured attack vectors, and use them to do harmful actions. …”
    Get full text
    Article
  15. 555

    APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System by Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty

    Published 2023-01-01
    “…The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. …”
    Get full text
    Article
  16. 556

    Jamming-resilient algorithm for underwater cognitive acoustic networks by Zixiang Wang, Fan Zhen, Senlin Zhang, Meiqin Liu, Qunfei Zhang

    Published 2017-08-01
    “…The channel sharing mechanism in cognitive networks can improve the communication capacity efficiently. Jamming attack is a common deny of service attack in cognitive networks. …”
    Get full text
    Article
  17. 557

    A Very Rare Cause of Pleuritic Chest Pain: Bilateral Pleuritis as a First Sign of Familial Mediterranean Fever by Sevket Ozkaya, Saliha E. Butun, Serhat Findik, Atilla Atici, Adem Dirican

    Published 2013-01-01
    “…After the colchicine treatment, the attack has not developed. In conclusion, recurrent pleural effusion and pleuritic chest pain may be the first signs of the FMF.…”
    Get full text
    Article
  18. 558

    Transportation Laws for Carbonate and Sulfate Ions in Concrete Based on Compartment Model by Boxin Wang, Ruichang Fang, Xu Chai, Qing Wang

    Published 2020-01-01
    “…The compartment model in this article provides references for predicting the drying-wetting varied cycles and ions attack depth of concrete under carbonate and sulfate ions attack.…”
    Get full text
    Article
  19. 559

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
    Get full text
    Article
  20. 560

    Black Turpentine Beetle, Dendroctonus terebrans (Olivier) (Insecta: Coleoptera: Curculionidae: Scolytinae) by Albert E. Mayfield, John L. Foltz

    Published 2005-10-01
    “…Light attacks may kill only localized sections of phloem tissue, but numerous attacks per stem result in tree mortality. …”
    Get full text
    Article