Showing 1,281 - 1,300 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1281

    Strength Deterioration of Concrete in Sulfate Environment: An Experimental Study and Theoretical Modeling by Yingwu Zhou, Hao Tian, Lili Sui, Feng Xing, Ningxu Han

    Published 2015-01-01
    “…The accelerated corrosion test results indicated that the strength degradation of concrete by sulfate attack had a significant relation with the corrosion depth. …”
    Get full text
    Article
  2. 1282

    Eski Türklerin Savaş Taktikleri ve Savaş Alanındaki Uygulamaları by Eda DURMUŞ

    Published 2021-12-01
    “…The second phase is the false retreat. The attackers started to withdraw as if they were defeated; the enemy became surprised and was taken to the field where the attackers had planned to wage the war. …”
    Get full text
    Article
  3. 1283

    IoT Network Anomaly Detection in Smart Homes Using Machine Learning by Nadeem Sarwar, Imran Sarwar Bajwa, Muhammad Zunnurain Hussain, Muhammad Ibrahim, Khizra Saleem

    Published 2023-01-01
    “…Such devices are small, consume relatively less power and resources, and are easily attackable by attackers. It is crucial to protect the integrity and characteristics of the smart home environment from external attacks. …”
    Get full text
    Article
  4. 1284

    Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 by Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG

    Published 2022-12-01
    “…The certificateless cryptosystem can solve the problems of certificate management and key escrow at the same time, but its security model always assumes that Type II adversary (named malicious KGC) will not launch public key replacement attacks.This security assumption has certain limitations in real-world applications.As an efficient identity-based cryptographic scheme, SM9 signature scheme adopts R-ate bilinear pairing which has good security and high computational efficiency.However, it requires KGC to generate and manage keys for users, so it has the problem of key escrow.In view of the above problems, a certificateless signature scheme against malicious KGC was constructed based on blockchain and SM9 signature algorithm.Based on the properties of decentralization and tamper-proof of blockchain, the proposed scheme used the smart contract to record part of the public key corresponding to the user’s secret value on the blockchain.Then, the verifier can revoke the smart contract to query the user’s public key during the signature verification stage.Therefore, the proposed scheme ensured the authenticity of the user’s public key.The user’s private key consisted of the partial private key generated by KGC and a secret randomly chosen by the user.The user required the partial private key generated by KGC to endorse his identity identifier when the user generates the private key for the first time.Subsequently, the private key can be independently updated by changing the secret and the corresponding partial public key.During this process, the identity remains unchanged, which provided a viable solution for key management in decentralized application scenarios.The blockchain relied on the consensus mechanism to ensure the consistency of the distributed data.Based on the traceability of the blockchain, the change log of user’s partial public key was stored in the blockchain, which can trace the source of malicious public key replacement attacks and thereby prevent malicious KGC from launching public key replacement attacks.According to the experimental simulation and security proof results, the total overhead of signature and verification of the proposed scheme is only 7.4ms.Compared with similar certificateless signature schemes, the proposed scheme can effectively resist public key replacement attacks and has higher computational efficiency.…”
    Get full text
    Article
  5. 1285

    Multi-level high utility-itemset hiding. by Loan T T Nguyen, Hoa Duong, An Mai, Bay Vo

    Published 2025-01-01
    “…Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.…”
    Get full text
    Article
  6. 1286

    Controllability and Optimization of Complex Networks Based on Bridges by Lifu Wang, Guotao Zhao, Zhi Kong, Yunkang Zhao

    Published 2020-01-01
    “…A network may be out of control due to failure or attack of some specific edges. Bridges are a kind of key edges whose removal will disconnect a network and increase connected components. …”
    Get full text
    Article
  7. 1287

    An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks. by Nashmia Khalid, Sadaf Hina, Khurram Shabih Zaidi, Tarek Gaber, Lee Speakman, Zainab Noor

    Published 2025-01-01
    “…Existing research in Wi-Fi attack detection focused on obtaining high detection accuracy while neglecting modern traffic and attack scenarios such as key reinstallation or unauthorized decryption attacks. …”
    Get full text
    Article
  8. 1288

    Capturing the Signature of Topological Evolution from the Snapshots of Road Networks by Gi Ung Jang, Jin Chul Joo, Jeryang Park

    Published 2020-01-01
    “…This modified Lorenz curve enables calculating the relative impact of intensive attacks to random failures and shows that a more self-organized road network tends to become more vulnerable to selective attacks.…”
    Get full text
    Article
  9. 1289

    Human-Centered UAV–MAV Teaming in Adversarial Scenarios via Target-Aware Intention Prediction and Reinforcement Learning by Wei Hao, Huaping Liu, Jia Liu, Wenjie Li, Lijun Chen

    Published 2024-01-01
    “…To address this limitation, we propose a tacit collaborative attack method that utilizes the UAVs’ capacity for tacit understanding to infer human intent and select the appropriate targets for collaborative attack missions. …”
    Get full text
    Article
  10. 1290

    Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos by Yuzhuo Zhao, Qiqin Shi, Qun Ding

    Published 2025-01-01
    “…The experimental results show that the chosen plaintext attack can recover the cipher image to the plain image. …”
    Get full text
    Article
  11. 1291

    Discriminative zero-watermarking algorithm based on region XOR and ternary quantization by Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG

    Published 2022-02-01
    “…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
    Get full text
    Article
  12. 1292

    Paroxysmal Nonkinesigenic Dyskinesia with Tremor by Robert Fekete

    Published 2013-01-01
    “…There is complete resolution between attacks except for persistent mild head tremor and action tremor of both extremities. …”
    Get full text
    Article
  13. 1293

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…Information attacks have increased worldwide as more information is available in digital form. …”
    Get full text
    Article
  14. 1294

    Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks by Ndibanje Bruce, Tae-Yong Kim, Hoon Jae Lee

    Published 2013-04-01
    “…In this paper, we show that their scheme is vulnerable to known attacks such as man-in-the-middle attack and reply attack, and it does not provide mutual authentication between gateway node and cell phone. …”
    Get full text
    Article
  15. 1295

    Enhancing the Efficiency of Horizontal Axis Wind Turbines Through Optimization of Blade Parameters by Hossein Seifi Davari, Ruxandra Mihaela Botez, Mohsen Seify Davari, Harun Chowdhury

    Published 2024-01-01
    “…Utilizing QBLADE software, we evaluate the lift coefficient, stall angle of attack, and lift-to-drag ratio coefficient efficiency of these airfoils across various thickness-to-camber ratios. …”
    Get full text
    Article
  16. 1296

    Oral Surgery Procedures in a Patient Affected by Hereditary Angioedema Type I by Chiara Cinquini, Simonetta Santarelli, Alberto Marianelli, Marco Nisi, Mario Gabriele, Antonio Barone

    Published 2022-01-01
    “…The prophylactic intravenous infusion of C1-INH concentrate was successful in preventing acute HAE attacks after oral surgery procedures.…”
    Get full text
    Article
  17. 1297

    Analysis of cyber incidents in Senegal from 2005 to 2023 by Ciré Sall

    Published 2024-12-01
    “…The study found that cyber incidents are increasing in frequency in the country; that the most common incident types are cybercrimes and compromised websites; that the most frequent perpetrators are cybercriminals and hackers; that state/political organisations are slightly more likely than non-state/political entities to be attacked; that the most common incident type experienced by state/political entities is a compromised website; that the most frequent incident type for non-state/political organisations is cybercrime; and that insider attacks are much less common than external attacks, but still occur at a level that is a cause for concern. …”
    Get full text
    Article
  18. 1298

    Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation by Luoyin Feng

    Published 2021-01-01
    “…Several rounds of experiments show that the algorithm has a large scrambling scheme, further expands the key space of Arnold algorithm, and effectively resists the common computer brute force attack cracking and image decryption cracking methods such as exhaustive, differential attack and known plaintext attack. …”
    Get full text
    Article
  19. 1299

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  20. 1300

    TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs by Zhenjing Zhang, Maode Ma, Zhigang Jin

    Published 2015-07-01
    “…Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
    Get full text
    Article