Showing 661 - 680 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 661

    A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques by Lei Chen, Fushan Wei, Chuangui Ma

    Published 2015-04-01
    “…However, most of them are insecure against various attacks. This paper summarizes attacks and security requirements for two-factor user authentication in WSNs. …”
    Get full text
    Article
  2. 662

    ZSM-Based E2E Security Slice Management for DDoS Attack Protection in MEC-Enabled V2X Environments by Rodrigo Asensio-Garriga, Pol Alemany, Alejandro M. Zarca, Roshan Sedar, Charalampos Kalalas, Jordi Ortiz, Ricard Vilalta, Raul Munoz, Antonio Skarmeta

    Published 2024-01-01
    “…Efficient resource and security management in multi-domain V2X environments is vital, especially with the growing threat of distributed denial-of-service (DDoS) attacks against critical V2X services within MEC. …”
    Get full text
    Article
  3. 663

    Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics by Rana Alabdan, Bayan Alabduallah, Nuha Alruwais, Munya A. Arasi, Somia A. Asklany, Omar Alghushairy, Fouad Shoie Alallah, Abdulrhman Alshareef

    Published 2025-01-01
    “…Still, IoT remains to transform the consumer electronics field; security in IoT becomes critical, and it is utilized by cyber attackers to pose risks to public safety, compromise data privacy, gain unauthorized access, and even disrupt operations. …”
    Get full text
    Article
  4. 664

    Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks by Amir Mohammed, Craig Ramlal, Lincoln Marine, Fasil Muddeen

    Published 2024-01-01
    “…The study implemented an event-triggered consensus-based attack detection scheme capable of distinguishing between replay (RA), denial-of-service (DoS), and false data injection (FDI) attacks. …”
    Get full text
    Article
  5. 665
  6. 666

    Utilizing of black cumin (Nigella sativa) flour to increase the immunity system of tilapia (Oreochromis niloticus) against Aeromonas hydrophila bacteria attack by Norma Rizki Silviana, Rosidah, Wahyuniar Pamungkas, Roffi Grandiosa

    Published 2022-10-01
    “… ABSTRACT This study aims to determine dose of black cumin flour in fish feed diets which can improve the disease resistance of tilapia against the attack of A. hydrophila. This study was used tilapia juvenile with a size of 7 – 8 cm. …”
    Get full text
    Article
  7. 667

    SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data by Sudesh Kumar, Sunanda Gupta

    Published 2025-04-01
    “…The TCP-SYNC SDN dataset, a collection of labelled network traffic data for investigating DDoS attack detection in Software-Defined Networking (SDN) environments. …”
    Get full text
    Article
  8. 668

    The large and central Caligo martia eyespot may reduce fatal attacks by birds: a case study supports the deflection hypothesis in nature by Iserhard, Cristiano Agra, Malta, Shimene, Penz, Carla, Fraga, Brenda Barbon, Costa, Camila Abel, Schwantz, Taiane, Bordin, Kauane Maiara

    Published 2024-08-01
    “…In both experiments facsimiles were placed in two forest sites, organized in 50 blocks with four facsimiles each, and checked for predator attacks every 24 h for five consecutive days. While WE and UV facsimiles were mostly attacked in non-vital areas (wings), most bird attacks on CM were directed at vital body areas. …”
    Get full text
    Article
  9. 669

    Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley by Alaa Selim, Huadong Mo, Hemanshu Pota

    Published 2025-02-01
    “…These signals serve as a complementary example of adversarial attacks, demonstrating how such noise can destabilize estimation algorithms and lead to critical control errors. …”
    Get full text
    Article
  10. 670

    State of Siege in South Dobrogea. Action plan and instructions against attacks by Bulgarian komitadjis developed by the 9th Romanian Division command by Daniel Silviu NICULAE

    Published 2025-01-01
    “…Like an arch in time, in 1926, in peacetime, after 62 years since the vote on the Siege Law of 1864, the attacks of the Bulgarian comitages threatening the population, territory, and the exercise of state authority at the southern border imposed the extension of the provisions on the state of siege and their application by the War Council of the 9th Division. …”
    Get full text
    Article
  11. 671

    A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems by Fahd A Alhaidari, Alia Mohammed Alrehan

    Published 2021-03-01
    “…It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks. …”
    Get full text
    Article
  12. 672

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
    Get full text
    Article
  13. 673
  14. 674

    A Probabilistic Analysis to Quantify the Effect of March 11, 2004, Attacks in Madrid on the March 14 Elections in Spain: A Dynamic Modelling Approach by Juan-Carlos Cortés, Francisco Sánchez, Francisco-José Santonja, Rafael-Jacinto Villanueva

    Published 2015-01-01
    “…Using this model, we conclude that the probability is very low that the PSOE would have won had the attack not happened. Moreover, after the attack, the PSOE increased an average of 5.6% in voting on March 14 and an average of 11.2% of the Spanish people changed their vote between March 11 and March 14. …”
    Get full text
    Article
  15. 675

    Resolution of Refractory Status Epilepticus With Ketamine Without Intubation in a Patient With Stroke-Like Migraine Attacks After Radiation Therapy (SMART) Syndrome by Kyle N. Kaneko, Pablo Read, John M. Eaton, Yoshie Umemura, Justin L. Hoskin

    Published 2025-01-01
    “…Stroke-like migraine attacks after radiation therapy (SMART) syndrome is an infrequently reported complication arising years after radiation therapy that manifests as a reversible syndrome marked by migraine-like headaches, focal neurologic signs, and/or seizures. …”
    Get full text
    Article
  16. 676
  17. 677

    Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks by Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou

    Published 2012-09-01
    “…Our scheme has the properties of constant storage, lower communication overhead, long lifespan, forward secrecy, backward secrecy, and resistance to collusion attacks.…”
    Get full text
    Article
  18. 678

    GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks by Vahid Babaey, Arun Ravindran

    Published 2024-12-01
    “…The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. …”
    Get full text
    Article
  19. 679
  20. 680