-
581
A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques
Published 2024-12-01“…However, its user-friendly simplicity also makes it susceptible to threats such as Dispersed Services Rejection (DDOS), Brete-Force, and incorrectly shaped package attacks. This article introduces a robust and reliable framework for preventing and defending against such attacks in MQTT-based IIoT systems based on the theory of merging attacks. …”
Get full text
Article -
582
Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)
Published 2019-01-01“…With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. …”
Get full text
Article -
583
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
Get full text
Article -
584
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
585
-
586
-
587
Mechanical properties and durability against the dry termite attacks of particleboard made from bamboo with citric acid as adhesive
Published 2015-03-01“…Therefore this research focused on effects of citric acid content and pressing temperature on properties of particleboard made from bamboo, including its durability to the dry termite attacks. Petung bamboo particles were used as raw materials. …”
Get full text
Article -
588
The Closer, The Harder? Investigating the use of peripheral vision in 3vs3 counter-attack VR situations in football
Published 2025-01-01“…Methods: Eighteen experienced football players were shown 3 vs. 3 virtual-reality football counter-attack situations from the perspective of the central defender. …”
Get full text
Article -
589
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
Published 2025-01-01“…Through this systematic inquiry, we have successfully identified the vulnerabilities and mitigation factors to deal with malware attacks. This SLR uncovers the vulnerabilities, emphasizing non-compliance with cybersecurity infrastructure. …”
Get full text
Article -
590
Development of 3D satisfaction surface for concrete durability design under chloride attack considering climate change
Published 2025-07-01“…The service life of the target structure against chloride attack was evaluated using the proposed 3D PBE. The result show that the durability life of the structure decreased as the relative humidity decreased and the temperature increased during curing. …”
Get full text
Article -
591
Characteristics of Fast-Growing Wood Impregnated Using Monoethylene Glycol and SiO Nanoparticles Against Fungal Attacks
Published 2024-10-01“…The results showed that impregnation treatment with MEG and SiO2 nanoparticles significantly improved the durability of Jabon and Sengon against fungal attacks. Furthermore, MEGSiO2 with 24-hour polymerization had a better impact on durability compared to both the control and MEGSiO2 with 12-hour polymerization. …”
Get full text
Article -
592
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks
Published 2025-01-01Subjects: “…Man-in-the-middle (MitM) attacks…”
Get full text
Article -
593
Multi‐data classification detection in smart grid under false data injection attack based on Inception network
Published 2024-10-01“…Abstract During operation, the smart grid is subject to different false data injection attacks (FDIA). If the different kinds of FDIAs and typical failures have been detected, the system operator can develop various defenses to protect the smart grid in multiple categories. …”
Get full text
Article -
594
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01Subjects: Get full text
Article -
595
Detection of False Data Injection Attack in Smart Grid Based on Extended Kalman and Smooth Variable Structure Filter
Published 2025-01-01Subjects: Get full text
Article -
596
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01Subjects: Get full text
Article -
597
Key predistribution with location and time binding:novel approach against node replication attacks in wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
598
-
599
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
600
ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation
Published 2017-08-01Subjects: Get full text
Article