Showing 581 - 600 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 581

    A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques by Serkan Gönen

    Published 2024-12-01
    “…However, its user-friendly simplicity also makes it susceptible to threats such as Dispersed Services Rejection (DDOS), Brete-Force, and incorrectly shaped package attacks. This article introduces a robust and reliable framework for preventing and defending against such attacks in MQTT-based IIoT systems based on the theory of merging attacks. …”
    Get full text
    Article
  2. 582

    Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN) by Robert A. Sowah, Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, Koudjo M. Koumadi

    Published 2019-01-01
    “…With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. …”
    Get full text
    Article
  3. 583

    Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay by MI Yang, YANG Zishuai, XU Mingming, ZHOU Jie, HAN Yunhao

    Published 2025-02-01
    Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
    Get full text
    Article
  4. 584
  5. 585
  6. 586
  7. 587

    Mechanical properties and durability against the dry termite attacks of particleboard made from bamboo with citric acid as adhesive by Ragil Widyorini, Ari Puspa Yudha, Ganis Lukmandaru, Tibertius Agus Prayitno

    Published 2015-03-01
    “…Therefore this research focused on effects of citric acid content and pressing temperature on properties of particleboard made from bamboo, including its durability to the dry termite attacks. Petung bamboo particles were used as raw materials. …”
    Get full text
    Article
  8. 588

    The Closer, The Harder? Investigating the use of peripheral vision in 3vs3 counter-attack VR situations in football by Božo Vukojević, Svitlana Pinchuk, Christian Vater

    Published 2025-01-01
    “…Methods: Eighteen experienced football players were shown 3 vs. 3 virtual-reality football counter-attack situations from the perspective of the central defender. …”
    Get full text
    Article
  9. 589

    Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review by Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna, Kiran Adnan

    Published 2025-01-01
    “…Through this systematic inquiry, we have successfully identified the vulnerabilities and mitigation factors to deal with malware attacks. This SLR uncovers the vulnerabilities, emphasizing non-compliance with cybersecurity infrastructure. …”
    Get full text
    Article
  10. 590

    Development of 3D satisfaction surface for concrete durability design under chloride attack considering climate change by Yeongmo Yeon, Jang-Ho Jay Kim

    Published 2025-07-01
    “…The service life of the target structure against chloride attack was evaluated using the proposed 3D PBE. The result show that the durability life of the structure decreased as the relative humidity decreased and the temperature increased during curing. …”
    Get full text
    Article
  11. 591

    Characteristics of Fast-Growing Wood Impregnated Using Monoethylene Glycol and SiO Nanoparticles Against Fungal Attacks by Istie Rahayu, Egydia Saputri, Trisna Priadi, Irma Wahyuningtyas, Esti Prihatini, Rohmat Ismail

    Published 2024-10-01
    “…The results showed that impregnation treatment with MEG and SiO2 nanoparticles significantly improved the durability of Jabon and Sengon against fungal attacks. Furthermore, MEGSiO2 with 24-hour polymerization had a better impact on durability compared to both the control and MEGSiO2 with 12-hour polymerization. …”
    Get full text
    Article
  12. 592
  13. 593

    Multi‐data classification detection in smart grid under false data injection attack based on Inception network by H. Pan, H. Yang, C. N. Na, J. Y. Jin

    Published 2024-10-01
    “…Abstract During operation, the smart grid is subject to different false data injection attacks (FDIA). If the different kinds of FDIAs and typical failures have been detected, the system operator can develop various defenses to protect the smart grid in multiple categories. …”
    Get full text
    Article
  14. 594
  15. 595
  16. 596
  17. 597
  18. 598
  19. 599
  20. 600