Showing 561 - 580 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 561
  2. 562
  3. 563

    Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks by Hongliang Zhu, Zhihua Zhang, Juan Du, Shoushan Luo, Yang Xin

    Published 2018-11-01
    “…Wireless sensor networks face threats of selective forwarding attacks which are simple to implement but difficult to detect. …”
    Get full text
    Article
  4. 564
  5. 565
  6. 566

    Research on Wireless Sensor Network Security Location Based on Received Signal Strength Indicator Sybil Attack by Hongbin Wang, Liping Feng

    Published 2020-01-01
    “…This paper studies the security location mechanism of the sensor network node under the attack of Sybil and analyzes the safe attacks which are possibly accepted and safe requirement in the location system. …”
    Get full text
    Article
  7. 567

    False data injection attack sample generation using an adversarial attention-diffusion model in smart grids by Kunzhan Li, Fengyong Li, Baonan Wang, Meijing Shan

    Published 2024-12-01
    “…A false data injection attack (FDIA) indicates that attackers mislead system decisions by inputting false or tampered data into the system, which seriously threatens the security of power cyber-physical systems. …”
    Get full text
    Article
  8. 568
  9. 569
  10. 570
  11. 571
  12. 572

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…However, these technical advancements also allow malicious individuals to obtain high computational power to attack cryptosystems. Traditional cryptosystem countermeasures have been somewhat passive in response to this change, because they simply increase computational costs by increasing key lengths. …”
    Get full text
    Article
  13. 573
  14. 574

    A Review of the Engineering Properties of Metakaolin Based Concrete: Towards Combatting Chloride Attack in Coastal/Marine Structures by Deveshan L. Pillay, Oladimeji B. Olalusi, Paul O. Awoyera, Carlos Rondon, Ana María Echeverría, John Temitope Kolawole

    Published 2020-01-01
    “…Hence, there is an increased need for alternate binder systems with the ability to reduce the effects of chloride attack in concrete. This paper presents a critical review of the engineering properties of metakaolin (MK) based concrete exposed to chloride attack. …”
    Get full text
    Article
  15. 575
  16. 576
  17. 577
  18. 578

    Trauma echoes: factors associated with peritraumatic distress and anxiety five days following Iranian missile attack on Israel by Boaz M. Ben-David, Tchelet E. Bressler, Lia Ring, Ortal Shimon-Raz, Yuval Palgi

    Published 2025-12-01
    “…Introduction: On 13–14 April 2024, Iran launched ∼300 drones and missiles at Israel, in an unprecedented attack. As most studies examine the effects of trauma months or years later, less is known about its effects days later. …”
    Get full text
    Article
  19. 579

    IMPLICATIONS OF XENOPHOBIC ATTACKS ON NIGERIANS AND NIGERIA-SOUTH AFRICA DIPLOMATIC RELATIONS: A REVIEW OF RE-CURRENT ISSUES by ABDULRASHEED ABDULYAKEEN, MUHAMMAD RABIU

    Published 2024-07-01
    “… This study identifies factors that influence the rise in Xenophobia attacks in South Africa and how that affect diplomatic relations between Nigeria and South Africa on the global stage. …”
    Get full text
    Article
  20. 580

    Vortex Shedding Lock-In due to Pitching Oscillation of a Wind Turbine Blade Section at High Angles of Attack by Craig Meskell, Alberto Pellegrino

    Published 2019-01-01
    “…A prescribed sinusoidal pitching motion has been applied at a fixed amplitude of 7° for a range of high angles of attack 30°<α<150°. At these incidences, the airfoil will behave more like a bluff body and may experience periodic vortex shedding. …”
    Get full text
    Article