-
1221
A Secure RFID Authentication Protocol Adopting Error Correction Code
Published 2014-01-01“…Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. …”
Get full text
Article -
1222
Prediction of Future Terrorist Activities Using Deep Neural Networks
Published 2020-01-01“…Or what type of weapon is going to be used in the attack? Or what type of attack is going to be carried out? …”
Get full text
Article -
1223
Risk factors for loss to follow-up in patients with gout: A Korean prospective cohort study.
Published 2025-01-01“…Logistic regression identified frequent gout attacks, concerns about attacks, anxiety, impaired mobility, and EQ-5D scores as significant predictors of LTFU.…”
Get full text
Article -
1224
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01“…These connected devices pose a challenge to cybersecurity systems due attacks in network communications. Such attacks have continued to threaten the operation of systems and end-users. …”
Get full text
Article -
1225
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…On this basis, we propose new competitive 3‐round key recovery attacks with lower complexities. Particularly, the improved attack on 3‐round SPNbox‐32 only requires 232 chosen plaintexts, whereas the current best attack necessitates 262 chosen plaintexts. …”
Get full text
Article -
1226
Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments
Published 2025-01-01“…We aim to provide relevant stakeholders (manufacturers, asset owners and system integrators), including Chief Information Security Officers, with information on emerging threat groups, attack victims and their locations, the origins of attacks, the tools and types of tools used, and the motivations behind these attacks. …”
Get full text
Article -
1227
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.
Published 2025-01-01“…The algorithm can also resist some common attacks and accidents, such as exhaustion attack, differential attack, noise attack, information loss and so on.…”
Get full text
Article -
1228
ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization
Published 2025-01-01“…The increasing sophistication and frequency of cyber attacks necessitate automated and intelligent response mechanisms that can adapt to evolving threats. …”
Get full text
Article -
1229
Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN
Published 2024-08-01“…The model classifies 10 (ten) classifications, namely Benign, Information Leak, Malware, Trojan Activity, Information Gathering, APT, Exploit, Web Application Attack, Denial of Service (DoS), and other types of attacks. …”
Get full text
Article -
1230
The Female Body as a Site of Patriarchal Power Play:
Published 2024-12-01“…The victims of sexual attacks undergo psychological trauma during and after the war. …”
Get full text
Article -
1231
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01“…In order to protect against unknown threats and evasion attacks, a new method based on contrastive learning for fine-grained unknown malicious traffic classification was proposed.Specifically, based on variational auto-encoder (CVAE), it included two classification stages, and cross entropy and reconstruction errors were used for known and unknown traffic classification respectively.Different form other methods, contrastive learning was adopted in different classification stages, which significantly improved the classification performance of the few-shot and unknown (zero-shot) classes.Moreover, some techniques (e.g., re-training and re-sample) combined with contrastive learning further improved the classification performance of the few-shot classes and the generalization ability of model.Experimental results indicate that the proposed method has increased the macro recall of few-shot classes by 20.3% and the recall of unknown attacks by 9.1% respectively, and it also has protected against evasion attacks on partial classes to some extent.…”
Get full text
Article -
1232
Channel-space endogenous anti-jamming method based on multi-reconfigurable intelligent surface
Published 2023-10-01“…In view of the concern that the traditional anti-jamming method based on jamming recognition is challenging to defend against both the unknown and the intelligent jamming attacks, a dynamic, heterogeneous, and redundant channel-space anti-jamming technique was proposed by adopting multiple reconfigurable intelligent surface (RIS), which facilitated the exploitation of channels’ resources for combating with the unknown jamming attacks.To elaborate, a channel-space endogenous anti-jamming method was proposed by leveraging the optimization of both the RIS’ coefficients and the multiple RIS’ on-off status.Firstly, after decoupling the tightly coupled variables, the optimal closed-form solutions of transmit precoder, RIS’ coefficients, and receive decoder could be derived under the alternative optimization framework.Then, the greedy algorithm was adopted to optimize the multiple RIS’ on-off status for obtaining better anti-jamming communications, and the convergence and the computation complexity of the proposed method was analyzed.Theoretical analysis and simulation results show that the proposed method can effectively defend against the uncertain jamming attacks.…”
Get full text
Article -
1233
Black Turpentine Beetle, Dendroctonus terebrans (Olivier) (Insecta: Coleoptera: Curculionidae: Scolytinae)
Published 2005-10-01“…Light attacks may kill only localized sections of phloem tissue, but numerous attacks per stem result in tree mortality. …”
Get full text
Article -
1234
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01“…A potential attack based on degree information by re-identifying target vertexes from a sequence of published graphs was analyzed.To deal with this kind of attack,a k-anonymous graph stream constructing method based on information loss estimation was provided.Information loss caused by re-constructing graph was controlled by using the method of attributes generalization of nodes and the structure generalization of sub-graph.The disturbance in sub-graph was forbidden to prevent the attack.The method of measuring the information loss of nodes and structures during the anonymous process due to re-construction of graph was defined.A k-anonymity cluster algorithm based on greedy clustering algorithm was build,which realized anonymous partition according to the information loss.Finally,a method of constructing anonymous social network for the evolving social network with the least information loss was provided.The experiments on medical diagnostic data set show that the algorithm of constructing anonymous graph based on the information loss estimation can be used to control the loss of information.…”
Get full text
Article -
1235
Secure Multicast Routing Algorithm for Wireless Mesh Networks
Published 2016-01-01“…Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. …”
Get full text
Article -
1236
Black Turpentine Beetle, Dendroctonus terebrans (Olivier) (Insecta: Coleoptera: Curculionidae: Scolytinae)
Published 2005-10-01“…Light attacks may kill only localized sections of phloem tissue, but numerous attacks per stem result in tree mortality. …”
Get full text
Article -
1237
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
Get full text
Article -
1238
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01“…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
Get full text
Article -
1239
Exact Recovery for System Identification With More Corrupt Data Than Clean Data
Published 2025-01-01“…We emphasize that the attack vectors are allowed to be correlated with each other in this work. …”
Get full text
Article -
1240
Developing an Intelligent System for Efficient Botnet Detection in IoT Environment
Published 2025-04-01“…Smart technological instruments and Internet of Things (IoT) systems are now targeted by network attacks because of their widespread rising use. Attackers can take over IoT devices via botnets, and pre-configured attack vectors, and use them to do harmful actions. …”
Get full text
Article