Showing 541 - 560 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 541
  2. 542

    Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis by Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee

    Published 2013-01-01
    “…Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. …”
    Get full text
    Article
  3. 543
  4. 544

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…Wireless sensor networks (WSNs) are vulnerable to false endorsement insertion attacks (FEIAs), where a malicious adversary intentionally inserts incorrect endorsements into legitimate sensing reports in order to block notifications of real events. …”
    Get full text
    Article
  5. 545

    Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method by Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly

    Published 2025-01-01
    “…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. …”
    Get full text
    Article
  6. 546

    High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties by Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu, Shunjiang Wang

    Published 2020-01-01
    “…However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. …”
    Get full text
    Article
  7. 547

    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks by Jiaqi Liang, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, Ming Ni

    Published 2021-01-01
    “…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). …”
    Get full text
    Article
  8. 548
  9. 549

    Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems by Abdollah Mirzabeigi, Ali Kazemy, Mehdi Ramezani, Seyed Mohammad Azimi

    Published 2023-01-01
    “…Today, eliminating the effects of cyber-attacks is essential for stability and synchronization in island microgrids. …”
    Get full text
    Article
  10. 550

    Reflected-Afterflow Virtual-Source Model Compared to Exact Calculations for Elastic Cylinders Attacked by Planar Waves by George V. Waldo

    Published 1997-01-01
    “…A recently developed theoretical approximation, the reflected-afterflow virtual-source (RAVS) model, is applied to the case of a planar shock wave attacking an elastic cylindrical shell. Calculations are shown to be in good agreement with the exact calculations that were published by Huang for all locations and times. …”
    Get full text
    Article
  11. 551
  12. 552

    Familial Hemiplegic Migraine with Severe Attacks: A New Report with ATP1A2 Mutation by E. Martínez, R. Moreno, L. López-Mesonero, I. Vidriales, M. Ruiz, A. L. Guerrero, J. J. Tellería

    Published 2016-01-01
    “…Familial hemiplegic migraine (FHM) is a rare disorder characterized by migraine attacks with motor weakness during the aura phase. …”
    Get full text
    Article
  13. 553
  14. 554
  15. 555
  16. 556

    Volatile Organic Compounds from the Clone Populus x canadensis “Conti” Associated with Megaplatypus mutatus Attack by Alejandro Lucia, Paola González-Audino, Héctor Masuh

    Published 2014-01-01
    “…The comparison of the VOCs profiles of attacked and nonattacked P. x canadensis “Conti” 12 during M. mutatus flying season showed both qualitative and quantitative differences. …”
    Get full text
    Article
  17. 557

    Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side-Channel Attack Resistance by Siva Kotipalli, Yong-Bin Kim, Minsu Choi

    Published 2014-01-01
    “…Hardware implementation has been carried out on both designs exploiting a specified side-channel attack standard evaluation FPGA board, called SASEBO-GII, and the corresponding power waveforms for both designs have been collected. …”
    Get full text
    Article
  18. 558
  19. 559

    Assessment of the Dynamics of Experiencing a Terrorist Threat before and after the Terrorist Attack at Crocus City Hall by J.V. Bykhovets, N.N. Kazymova

    Published 2025-01-01
    “…It was shown that after the March 22, 2024 terrorist attack in Crocus City Hall, there was an increase in experience of the threat due to increased vigilance, alertness, anticipation of future attacks, concern for loved ones and need for information about attacks. …”
    Get full text
    Article
  20. 560

    A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks by Mohammed A. Saleh, Azizah Abdul Manaf

    Published 2015-01-01
    “…However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. …”
    Get full text
    Article