-
661
A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques
Published 2015-04-01“…However, most of them are insecure against various attacks. This paper summarizes attacks and security requirements for two-factor user authentication in WSNs. …”
Get full text
Article -
662
ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments
Published 2024-01-01“…Efficient resource and security management in multi-domain V2X environments is vital, especially with the growing threat of distributed denial-of-service (DDoS) attacks against critical V2X services within MEC. …”
Get full text
Article -
663
Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics
Published 2025-01-01“…Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. …”
Get full text
Article -
664
Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks
Published 2024-01-01“…The study implemented an event-triggered consensus-based attack detection scheme capable of distinguishing between replay (RA), denial-of-service (DoS), and false data injection (FDI) attacks. …”
Get full text
Article -
665
-
666
Utilizing of black cumin (Nigella sativa) flour to increase the immunity system of tilapia (Oreochromis niloticus) against Aeromonas hydrophila bacteria attack
Published 2022-10-01“… ABSTRACT This study aims to determine dose of black cumin flour in fish feed diets which can improve the disease resistance of tilapia against the attack of A. hydrophila. This study was used tilapia juvenile with a size of 7 – 8 cm. …”
Get full text
Article -
667
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01“…The TCP-SYNC SDN dataset, a collection of labelled network traffic data for investigating DDoS attack detection in Software-Defined Networking (SDN) environments. …”
Get full text
Article -
668
The large and central Caligo martia eyespot may reduce fatal attacks by birds: a case study supports the deflection hypothesis in nature
Published 2024-08-01“…In both experiments facsimiles were placed in two forest sites, organized in 50 blocks with four facsimiles each, and checked for predator attacks every 24 h for five consecutive days. While WE and UV facsimiles were mostly attacked in non-vital areas (wings), most bird attacks on CM were directed at vital body areas. …”
Get full text
Article -
669
Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley
Published 2025-02-01“…These signals serve as a complementary example of adversarial attacks, demonstrating how such noise can destabilize estimation algorithms and lead to critical control errors. …”
Get full text
Article -
670
State of Siege in South Dobrogea. Action plan and instructions against attacks by Bulgarian komitadjis developed by the 9th Romanian Division command
Published 2025-01-01“…Like an arch in time, in 1926, in peacetime, after 62 years since the vote on the Siege Law of 1864, the attacks of the Bulgarian comitages threatening the population, territory, and the exercise of state authority at the southern border imposed the extension of the provisions on the state of siege and their application by the War Council of the 9th Division. …”
Get full text
Article -
671
A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems
Published 2021-03-01“…It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks. …”
Get full text
Article -
672
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
673
Multitier ensemble classifiers for malicious network traffic detection
Published 2018-10-01Subjects: Get full text
Article -
674
A Probabilistic Analysis to Quantify the Effect of March 11, 2004, Attacks in Madrid on the March 14 Elections in Spain: A Dynamic Modelling Approach
Published 2015-01-01“…Using this model, we conclude that the probability is very low that the PSOE would have won had the attack not happened. Moreover, after the attack, the PSOE increased an average of 5.6% in voting on March 14 and an average of 11.2% of the Spanish people changed their vote between March 11 and March 14. …”
Get full text
Article -
675
Resolution of Refractory Status Epilepticus With Ketamine Without Intubation in a Patient With Stroke-Like Migraine Attacks After Radiation Therapy (SMART) Syndrome
Published 2025-01-01“…Stroke-like migraine attacks after radiation therapy (SMART) syndrome is an infrequently reported complication arising years after radiation therapy that manifests as a reversible syndrome marked by migraine-like headaches, focal neurologic signs, and/or seizures. …”
Get full text
Article -
676
-
677
Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks
Published 2012-09-01“…Our scheme has the properties of constant storage, lower communication overhead, long lifespan, forward secrecy, backward secrecy, and resistance to collusion attacks.…”
Get full text
Article -
678
GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks
Published 2024-12-01“…The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. …”
Get full text
Article -
679
-
680