Showing 1,141 - 1,160 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1141

    FATIGUE LIFE ANALYSIS OF WING WITH HIGH ASPECT RATIO BASED ON BIDIRECTIONAL FLUID-STRUCTURE COUPLING by LI Jin Yang, WANG JunLi, LEI Shuai, FENG YuRu, DU TianWei

    Published 2022-01-01
    “…Based on the Miner linear cumulative damage theory and the finite element analysis method, the fatigue life of the wing with high aspect ratio at different angles of attack was calculated.Firstly, based on the N-S equation, the displacement, stress and strain of the wing structure in cruise state are solved by using the bidirectional fluid-structure coupling method.Secondly, the fatigue life of the wing structure is analyzed, and the fatigue life of the wing structure at the weak position and different angles of attack is obtained.The results show that the fatigue weakness of the wing with high aspect ratio tends to occur at the leading edge and the wing root, and the life of the leading edge increases from the wing tip to the wing root along the wing span.The life of the wing is closely related to the change of Angle of attack and airfoil parameters, and there is generally a maximum life Angle of attack under a given flight condition.…”
    Get full text
    Article
  2. 1142

    Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services by Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah

    Published 2019-06-01
    “…Second, we propose simple yet powerful attack frameworks against each of these categories of image captchas. …”
    Get full text
    Article
  3. 1143

    A survey of security threats in federated learning by Yunhao Feng, Yanming Guo, Yinjian Hou, Yulun Wu, Mingrui Lao, Tianyuan Yu, Gang Liu

    Published 2025-01-01
    “…Like traditional machine learning, federated learning is threatened by multiple attacks, such as backdoor attacks, Byzantine attacks, and adversarial attacks. …”
    Get full text
    Article
  4. 1144

    Research on intrusion detection of industrial control system by Ying-xu LAI, Zeng-hui LIU, Xiao-tian CAI, Kai-xiang YANG

    Published 2017-02-01
    “…Industrial control system was an important part of national critical infrastructure,once it was suffered from the cyber attack,it would cause property damage,casualties and other serious disasters.For providing theoretical supports to industrial security researchers,the features of attacks in an industrial control system and the difficulties of detection to these attacks were introduced.Then,a survey of intrusion detection technologies used by the industrial control systems was given.Also,the performance and characteristic were compared for the different types of detection technologies.Fi-nally,an industrial intrusion detection research was generated.…”
    Get full text
    Article
  5. 1145

    Survey of DDoS defense:challenges and directions by Fei CHEN, Xiao-hong BI, Jing-jing WANG, Yuan LIU

    Published 2017-10-01
    “…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
    Get full text
    Article
  6. 1146

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…As Cloud computing is a shared facility and is accessed remotely, it is vulnerable to various attacks including host and network based attacks (Brown 2012, and Grance 2009) and hence requires immediate attention. …”
    Get full text
    Article
  7. 1147

    Cyber Physical Security of Distributed Energy Resources by Luka Strezoski, Zorana Babic, Dejan Milojicic

    Published 2023-12-01
    “…Therefore, they are highly vulnerable to attacks that can compromise uninterrupted data flow, such as denial of service attacks and interruptions due to natural disasters, cataclysmic events, or wars, as well as due to malicious cyber-attacks. …”
    Get full text
    Article
  8. 1148

    ContractGuard:defend Ethereum smart contract with embedded intrusion detection by Gansen ZHAO, Zhijian XIE, Xinming WANG, Jiahao HE, Chengzhi ZHANG, Chengchuang LIN, ZHOU Ziheng, Bingchuan CHEN, RONG Chunming

    Published 2020-04-01
    “…Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes.Smart contracts handle and transfer assets of values,offering strong incentives for malicious attacks.Intrusion attacks are a popular type of malicious attacks.ContractGuard,the first intrusion detection system (IDS) was proposed to defend Ethereum smart contracts against such attacks.Like IDSs for conventional programs,ContractGuard detects intrusion attempts as abnormal control flow.However,existing IDS techniques or tools are inapplicable to Ethereum smart contracts due to Ethereum’s decentralized nature and its highly restrictive execution environment.To address these issues,ContractGuard was designed by embedding it in the contracts.At runtime,ContractGuard protects the smart contract by monitoring the context-tagged acyclic path of the smart contract.As ContractGuard involves deployment overhead and deployment overhead.It was optimized under the Ethereum Gas-oriented performance model to reduce the overheads.The experimental results show that this work can effectively detect 83% of vulnerabilities,ContractGuard only adds to 36.14% of the deployment overhead and 28.27% of the runtime overhead.…”
    Get full text
    Article
  9. 1149

    Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing by Hui LIN, Mengyang YU, Youliang TIAN, Yijie HUANG

    Published 2018-05-01
    “…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
    Get full text
    Article
  10. 1150

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…Most of current en-route filtering schemes could filter false data effectively; however, the compromised nodes could take use of the filtering scheme to launch Fictitious False data Dropping attack, the detection of this attack is extremely difficult since the previous hop node is unable to distinguish whether the forwarding node dropt a false data report with incorrect Message Authentication Codes or a legitimate report. …”
    Get full text
    Article
  11. 1151

    Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN

    Published 2022-03-01
    “…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
    Get full text
    Article
  12. 1152

    Flow consistency in an intensive SDN security architecture with multiple controllers by Ying-ying LV, Yun-fei GUO, Chao QI, Qi WU, Ya-wen WANG

    Published 2017-12-01
    “…As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.…”
    Get full text
    Article
  13. 1153

    Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations by Erwin Alexander Leal Piedrahita

    Published 2019-11-01
    “…The results obtained show that, using a hierarchical algorithm with Euclidean distance proximity criterion and simple link grouping method, a correct classification is achieved in the following operation scenarios: 1) Normal traffic, 2) IED disconnection, 3) Network discovery attack, 4) DoS attack, 5) IED spoofing attack and 6) Failure on the high voltage line. …”
    Get full text
    Article
  14. 1154

    Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach by Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang

    Published 2022-01-01
    “…Attacks on cloud computing (CC) services and infrastructure have raised concerns about the efficacy of data protection mechanisms in this environment. …”
    Get full text
    Article
  15. 1155

    Living body recognition method based on facial feature point motion by Yulong WANG, Kaiyuan LIU

    Published 2018-06-01
    “…A kind of living body recognition method was proposed,which was applied in mobile terminal and based on the deep learning.A facial movements LSTM network was trained using data sets.When users input a random sequence of video,user’s facial feature point data can be gained and whether the video forgery attacks happened will be determined by input user’s facial feature point data into circulation neural network.The test data shows that the proposed method can be protected effectively from photograph attack and video replay attack.…”
    Get full text
    Article
  16. 1156

    Numerical Simulation of Characteristics of Wind Field at Bridge Sites in Flat and Gorge Terrains under the Thunderstorm Downburst by Peng Hu, Yilin Chen, Yan Han, Fei Zhang, Yongjian Tang

    Published 2021-01-01
    “…Later the wind speeds at each point in the gorge terrain are much higher than those in the flat terrain. Most wind attack angles are negative at the monitoring points in the flat terrain, but the farther away they are from the midspan point, the greater the wind attack angles will be. …”
    Get full text
    Article
  17. 1157

    Identifikasi Hama dan Penyakit Pada Tanaman Anggrek Bulan (Phalaenopsis amabilis) by Ari Monawati, Desi Rhomadhoni, Nur Rokhimah Hanik

    Published 2021-05-01
    “…Diseases and pests that attack orchid plants can cause death if allowed to continue. …”
    Get full text
    Article
  18. 1158

    Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks by Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu

    Published 2013-06-01
    “…We also consider on-off attack and bad mouthing attack in our simulation. …”
    Get full text
    Article
  19. 1159

    Blockchain-based cross-data center anonymous and verifiable identity authentication scheme by XU Shujiang, ZHANG Chaoyang, WANG Lianhai, ZHANG Shuhui, SHAO Wei

    Published 2024-04-01
    “…A thorough security analysis and the results of experiments demonstrate that the proposed scheme possesses the following attributes: it does not require users to re-register, it exhibits characteristics of unforgeability and traceability, and it is capable of withstanding various network attacks, including replay attacks, denial of service attacks, tampering attacks, and man-in-the-middle attacks.…”
    Get full text
    Article
  20. 1160

    Saturation cryptanalysis of CLEFIA by WANG Wei1, WANG Xiao-yun2

    Published 2008-01-01
    “…The saturation attack on a novel block cipher CLEFIA,which was proposed in FSE 2007,was reevaluated.The flaws in Shirai et al’s 8 round distinguishers were pointed out and corrected.In order to reduce the number of guessed subkeys,the attack utilized the movement of the whitening key to combine it with subkey,and explored a di-vide-and-conquer strategy.The partial sum technique was adopted to reduce the time complexity.As a result,the satura-tion attack can be extended from 10 round variant without key whitenings to 11 round CLEFIA-128/192/256,and is ap-plicable to 12 round CLEFIA-192/256 and 13 round CLEFIA-256.…”
    Get full text
    Article