-
1281
Strength Deterioration of Concrete in Sulfate Environment: An Experimental Study and Theoretical Modeling
Published 2015-01-01“…The accelerated corrosion test results indicated that the strength degradation of concrete by sulfate attack had a significant relation with the corrosion depth. …”
Get full text
Article -
1282
Eski Türklerin Savaş Taktikleri ve Savaş Alanındaki Uygulamaları
Published 2021-12-01“…The second phase is the false retreat. The attackers started to withdraw as if they were defeated; the enemy became surprised and was taken to the field where the attackers had planned to wage the war. …”
Get full text
Article -
1283
IoT Network Anomaly Detection in Smart Homes Using Machine Learning
Published 2023-01-01“…Such devices are small, consume relatively less power and resources, and are easily attackable by attackers. It is crucial to protect the integrity and characteristics of the smart home environment from external attacks. …”
Get full text
Article -
1284
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
Published 2022-12-01“…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
Get full text
Article -
1285
Multi-level high utility-itemset hiding.
Published 2025-01-01“…Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.…”
Get full text
Article -
1286
Controllability and Optimization of Complex Networks Based on Bridges
Published 2020-01-01“…A network may be out of control due to failure or attack of some specific edges. Bridges are a kind of key edges whose removal will disconnect a network and increase connected components. …”
Get full text
Article -
1287
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.
Published 2025-01-01“…Existing research in Wi-Fi attack detection focused on obtaining high detection accuracy while neglecting modern traffic and attack scenarios such as key reinstallation or unauthorized decryption attacks. …”
Get full text
Article -
1288
Capturing the Signature of Topological Evolution from the Snapshots of Road Networks
Published 2020-01-01“…This modified Lorenz curve enables calculating the relative impact of intensive attacks to random failures and shows that a more self-organized road network tends to become more vulnerable to selective attacks.…”
Get full text
Article -
1289
Human-Centered UAV–MAV Teaming in Adversarial Scenarios via Target-Aware Intention Prediction and Reinforcement Learning
Published 2024-01-01“…To address this limitation, we propose a tacit collaborative attack method that utilizes the UAVs’ capacity for tacit understanding to infer human intent and select the appropriate targets for collaborative attack missions. …”
Get full text
Article -
1290
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01“…The experimental results show that the chosen plaintext attack can recover the cipher image to the plain image. …”
Get full text
Article -
1291
Discriminative zero-watermarking algorithm based on region XOR and ternary quantization
Published 2022-02-01“…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
Get full text
Article -
1292
Paroxysmal Nonkinesigenic Dyskinesia with Tremor
Published 2013-01-01“…There is complete resolution between attacks except for persistent mild head tremor and action tremor of both extremities. …”
Get full text
Article -
1293
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…Information attacks have increased worldwide as more information is available in digital form. …”
Get full text
Article -
1294
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks
Published 2013-04-01“…In this paper, we show that their scheme is vulnerable to known attacks such as man-in-the-middle attack and reply attack, and it does not provide mutual authentication between gateway node and cell phone. …”
Get full text
Article -
1295
Enhancing the Efficiency of Horizontal Axis Wind Turbines Through Optimization of Blade Parameters
Published 2024-01-01“…Utilizing QBLADE software, we evaluate the lift coefficient, stall angle of attack, and lift-to-drag ratio coefficient efficiency of these airfoils across various thickness-to-camber ratios. …”
Get full text
Article -
1296
Oral Surgery Procedures in a Patient Affected by Hereditary Angioedema Type I
Published 2022-01-01“…The prophylactic intravenous infusion of C1-INH concentrate was successful in preventing acute HAE attacks after oral surgery procedures.…”
Get full text
Article -
1297
Analysis of cyber incidents in Senegal from 2005 to 2023
Published 2024-12-01“…The study found that cyber incidents are increasing in frequency in the country; that the most common incident types are cybercrimes and compromised websites; that the most frequent perpetrators are cybercriminals and hackers; that state/political organisations are slightly more likely than non-state/political entities to be attacked; that the most common incident type experienced by state/political entities is a compromised website; that the most frequent incident type for non-state/political organisations is cybercrime; and that insider attacks are much less common than external attacks, but still occur at a level that is a cause for concern. …”
Get full text
Article -
1298
Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation
Published 2021-01-01“…Several rounds of experiments show that the algorithm has a large scrambling scheme, further expands the key space of Arnold algorithm, and effectively resists the common computer brute force attack cracking and image decryption cracking methods such as exhaustive, differential attack and known plaintext attack. …”
Get full text
Article -
1299
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
1300
TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs
Published 2015-07-01“…Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
Get full text
Article