-
541
Evaluation of Airport Buildings Against Terrorist Attacks in the Context of Architecture and Planning Criteria: Five Case Study
Published 2025-01-01Subjects: Get full text
Article -
542
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01“…Applying our attacks on AES-192/256, we improve the attack result based on meet-in-the-middle attack (AES-192) and the attack result proposed in AES’00 (AES-256), respectively. …”
Get full text
Article -
543
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2025-01-01Subjects: Get full text
Article -
544
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…Wireless sensor networks (WSNs) are vulnerable to false endorsement insertion attacks (FEIAs), where a malicious adversary intentionally inserts incorrect endorsements into legitimate sensing reports in order to block notifications of real events. …”
Get full text
Article -
545
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method
Published 2025-01-01“…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. …”
Get full text
Article -
546
High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties
Published 2020-01-01“…However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. …”
Get full text
Article -
547
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
Published 2021-01-01“…First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). …”
Get full text
Article -
548
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01Subjects: Get full text
Article -
549
Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems
Published 2023-01-01“…Today, eliminating the effects of cyber-attacks is essential for stability and synchronization in island microgrids. …”
Get full text
Article -
550
Reflected-Afterflow Virtual-Source Model Compared to Exact Calculations for Elastic Cylinders Attacked by Planar Waves
Published 1997-01-01“…A recently developed theoretical approximation, the reflected-afterflow virtual-source (RAVS) model, is applied to the case of a planar shock wave attacking an elastic cylindrical shell. Calculations are shown to be in good agreement with the exact calculations that were published by Huang for all locations and times. …”
Get full text
Article -
551
Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game
Published 2025-01-01Subjects: Get full text
Article -
552
Familial Hemiplegic Migraine with Severe Attacks: A New Report with ATP1A2 Mutation
Published 2016-01-01“…Familial hemiplegic migraine (FHM) is a rare disorder characterized by migraine attacks with motor weakness during the aura phase. …”
Get full text
Article -
553
-
554
Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers
Published 2024-01-01Subjects: Get full text
Article -
555
State Estimation in Power Systems Under False Data Injection Attack Using Total Least Squares
Published 2025-01-01Subjects: Get full text
Article -
556
Volatile Organic Compounds from the Clone Populus x canadensis “Conti” Associated with Megaplatypus mutatus Attack
Published 2014-01-01“…The comparison of the VOCs profiles of attacked and nonattacked P. x canadensis “Conti” 12 during M. mutatus flying season showed both qualitative and quantitative differences. …”
Get full text
Article -
557
Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side-Channel Attack Resistance
Published 2014-01-01“…Hardware implementation has been carried out on both designs exploiting a specified side-channel attack standard evaluation FPGA board, called SASEBO-GII, and the corresponding power waveforms for both designs have been collected. …”
Get full text
Article -
558
-
559
Assessment of the Dynamics of Experiencing a Terrorist Threat before and after the Terrorist Attack at Crocus City Hall
Published 2025-01-01“…It was shown that after the March 22, 2024 terrorist attack in Crocus City Hall, there was an increase in experience of the threat due to increased vigilance, alertness, anticipation of future attacks, concern for loved ones and need for information about attacks. …”
Get full text
Article -
560
A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks
Published 2015-01-01“…However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. …”
Get full text
Article