Showing 1,221 - 1,240 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 1221

    A Secure RFID Authentication Protocol Adopting Error Correction Code by Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, Hung-Min Sun

    Published 2014-01-01
    “…Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. …”
    Get full text
    Article
  2. 1222

    Prediction of Future Terrorist Activities Using Deep Neural Networks by M. Irfan Uddin, Nazir Zada, Furqan Aziz, Yousaf Saeed, Asim Zeb, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud

    Published 2020-01-01
    “…Or what type of weapon is going to be used in the attack? Or what type of attack is going to be carried out? …”
    Get full text
    Article
  3. 1223

    Risk factors for loss to follow-up in patients with gout: A Korean prospective cohort study. by Hyunsue Do, Chang-Nam Son, Hyo Jin Choi, Ji Hyoun Kim, Min Jung Kim, Kichul Shin, Sang-Hyon Kim, Byoongyong Choi, You-Jung Ha, Joong Kyong Ahn, Hyun-Ok Kim, Sung Won Lee, Chang Hoon Lee, Ran Song, Kyeong Min Son, Seung-Geun Lee, Ki Won Moon

    Published 2025-01-01
    “…Logistic regression identified frequent gout attacks, concerns about attacks, anxiety, impaired mobility, and EQ-5D scores as significant predictors of LTFU.…”
    Get full text
    Article
  4. 1224

    Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks by Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz

    Published 2025-01-01
    “…These connected devices pose a challenge to cybersecurity systems due attacks in network communications. Such attacks have continued to threaten the operation of systems and end-users. …”
    Get full text
    Article
  5. 1225

    Improved integral cryptanalysis of SPNbox in digital rights management systems by Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang

    Published 2023-01-01
    “…On this basis, we propose new competitive 3‐round key recovery attacks with lower complexities. Particularly, the improved attack on 3‐round SPNbox‐32 only requires 232 chosen plaintexts, whereas the current best attack necessitates 262 chosen plaintexts. …”
    Get full text
    Article
  6. 1226

    Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments by Mukund Bhole, Thilo Sauter, Wolfgang Kastner

    Published 2025-01-01
    “…We aim to provide relevant stakeholders (manufacturers, asset owners and system integrators), including Chief Information Security Officers, with information on emerging threat groups, attack victims and their locations, the origins of attacks, the tools and types of tools used, and the motivations behind these attacks. …”
    Get full text
    Article
  7. 1227

    A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map. by Ye Tao, Wenhua Cui, Shanshan Wang, Yayun Wang

    Published 2025-01-01
    “…The algorithm can also resist some common attacks and accidents, such as exhaustion attack, differential attack, noise attack, information loss and so on.…”
    Get full text
    Article
  8. 1228

    ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization by Shaochen Ren, Jianian Jin, Guanchong Niu, Yang Liu

    Published 2025-01-01
    “…The increasing sophistication and frequency of cyber attacks necessitate automated and intelligent response mechanisms that can adapt to evolving threats. …”
    Get full text
    Article
  9. 1229

    Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN by Kuni Inayah, Kalamullah Ramli

    Published 2024-08-01
    “…The model classifies 10 (ten) classifications, namely Benign, Information Leak, Malware, Trojan Activity, Information Gathering, APT, Exploit, Web Application Attack, Denial of Service (DoS), and other types of attacks. …”
    Get full text
    Article
  10. 1230

    The Female Body as a Site of Patriarchal Power Play: by Liton Chakraborty Mithun

    Published 2024-12-01
    “…The victims of sexual attacks undergo psychological trauma during and after the war. …”
    Get full text
    Article
  11. 1231

    Method based on contrastive learning for fine-grained unknown malicious traffic classification by Yifeng WANG, Yuanbo GUO, Qingli CHEN, Chen FANG, Renhao LIN

    Published 2022-10-01
    “…In order to protect against unknown threats and evasion attacks, a new method based on contrastive learning for fine-grained unknown malicious traffic classification was proposed.Specifically, based on variational auto-encoder (CVAE), it included two classification stages, and cross entropy and reconstruction errors were used for known and unknown traffic classification respectively.Different form other methods, contrastive learning was adopted in different classification stages, which significantly improved the classification performance of the few-shot and unknown (zero-shot) classes.Moreover, some techniques (e.g., re-training and re-sample) combined with contrastive learning further improved the classification performance of the few-shot classes and the generalization ability of model.Experimental results indicate that the proposed method has increased the macro recall of few-shot classes by 20.3% and the recall of unknown attacks by 9.1% respectively, and it also has protected against evasion attacks on partial classes to some extent.…”
    Get full text
    Article
  12. 1232

    Channel-space endogenous anti-jamming method based on multi-reconfigurable intelligent surface by Yonggang ZHU, Yifu SUN, Fuqiang YAO, Cheng LI, Wenlong GUO, Kang AN

    Published 2023-10-01
    “…In view of the concern that the traditional anti-jamming method based on jamming recognition is challenging to defend against both the unknown and the intelligent jamming attacks, a dynamic, heterogeneous, and redundant channel-space anti-jamming technique was proposed by adopting multiple reconfigurable intelligent surface (RIS), which facilitated the exploitation of channels’ resources for combating with the unknown jamming attacks.To elaborate, a channel-space endogenous anti-jamming method was proposed by leveraging the optimization of both the RIS’ coefficients and the multiple RIS’ on-off status.Firstly, after decoupling the tightly coupled variables, the optimal closed-form solutions of transmit precoder, RIS’ coefficients, and receive decoder could be derived under the alternative optimization framework.Then, the greedy algorithm was adopted to optimize the multiple RIS’ on-off status for obtaining better anti-jamming communications, and the convergence and the computation complexity of the proposed method was analyzed.Theoretical analysis and simulation results show that the proposed method can effectively defend against the uncertain jamming attacks.…”
    Get full text
    Article
  13. 1233

    Black Turpentine Beetle, Dendroctonus terebrans (Olivier) (Insecta: Coleoptera: Curculionidae: Scolytinae) by Albert E. Mayfield, John L. Foltz

    Published 2005-10-01
    “…Light attacks may kill only localized sections of phloem tissue, but numerous attacks per stem result in tree mortality. …”
    Get full text
    Article
  14. 1234

    Method of constructing an anonymous graph based on information loss estimation by Jie SU, Shuai LIU, Zhi-yong LUO, Guang-lu SUN

    Published 2016-06-01
    “…A potential attack based on degree information by re-identifying target vertexes from a sequence of published graphs was analyzed.To deal with this kind of attack,a k-anonymous graph stream constructing method based on information loss estimation was provided.Information loss caused by re-constructing graph was controlled by using the method of attributes generalization of nodes and the structure generalization of sub-graph.The disturbance in sub-graph was forbidden to prevent the attack.The method of measuring the information loss of nodes and structures during the anonymous process due to re-construction of graph was defined.A k-anonymity cluster algorithm based on greedy clustering algorithm was build,which realized anonymous partition according to the information loss.Finally,a method of constructing anonymous social network for the evolving social network with the least information loss was provided.The experiments on medical diagnostic data set show that the algorithm of constructing anonymous graph based on the information loss estimation can be used to control the loss of information.…”
    Get full text
    Article
  15. 1235

    Secure Multicast Routing Algorithm for Wireless Mesh Networks by Rakesh Matam, Somanath Tripathy

    Published 2016-01-01
    “…Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. …”
    Get full text
    Article
  16. 1236

    Black Turpentine Beetle, Dendroctonus terebrans (Olivier) (Insecta: Coleoptera: Curculionidae: Scolytinae) by Albert E. Mayfield, John L. Foltz

    Published 2005-10-01
    “…Light attacks may kill only localized sections of phloem tissue, but numerous attacks per stem result in tree mortality. …”
    Get full text
    Article
  17. 1237

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
    Get full text
    Article
  18. 1238

    Research on distributed identity authentication mechanism of IoT device based on blockchain by Chen TAN, Meijuan CHEN, Ebenezer ACKAH Amuah

    Published 2020-06-01
    “…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
    Get full text
    Article
  19. 1239

    Exact Recovery for System Identification With More Corrupt Data Than Clean Data by Baturalp Yalcin, Haixiang Zhang, Javad Lavaei, Murat Arcak

    Published 2025-01-01
    “…We emphasize that the attack vectors are allowed to be correlated with each other in this work. …”
    Get full text
    Article
  20. 1240

    Developing an Intelligent System for Efficient Botnet Detection in IoT Environment by Ramesh Singh Rawat, Manoj Diwakar, Umang Garg, Prakash Srivastava

    Published 2025-04-01
    “…Smart technological instruments and Internet of Things (IoT) systems are now targeted by network attacks because of their widespread rising use. Attackers can take over IoT devices via botnets, and pre-configured attack vectors, and use them to do harmful actions. …”
    Get full text
    Article