-
1321
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01“…The security of the verifiable federated aggregation method was demonstrated through formal security analysis, which effectively resists forgery attacks and Sybil attacks, exhibiting good robustness. …”
Get full text
Article -
1322
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01“…Moreover, these techniques collapse, while detecting zero-day attacks. Hence, there is a need to use an intelligent mechanism based on machine learning (ML) and deep learning (DL), to detect attacks. …”
Get full text
Article -
1323
Optimal Adaptive Antijamming in Wireless Sensor Networks
Published 2012-12-01“…Attacked by jamming signals, a sensor network may experience corrupted packets and low network throughput. …”
Get full text
Article -
1324
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01“…In unimodal‐Bio‐GAN, a random permuted version of the human biometric data is implicitly considered as a salting key and required only during the enrolment stage, which increases the system reliability to overcome different security attacks. The experimental results of unimodal‐Bio‐GAN using the CASIA Iris‐V3‐Internal database outperform the previous methods and its security efficiency is analysed using different attack types.…”
Get full text
Article -
1325
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01“…In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. We study both the passive and active attack scenarios, and in each scenario we consider the effect of different data accuracy requirements on the performance of defense measures. …”
Get full text
Article -
1326
Blockchain network layer anomaly traffic detection method based on multiple classifier integration
Published 2023-03-01“…To improve the comprehensive generalized feature perception ability of mixed attack traffic on the blockchain network layer, and enhance the performance of abnormal traffic detection, a blockchain layer traffic anomaly detection method was proposed that supported the comprehensive judgement of data anomaly with a strong generalisation capability.Firstly, to expand the difference of the input feature subset of the base classifier used, a feature subset selection algorithm based on discrimination degree and redundant information was proposed, and the output of high sensitivity subset terms was stimulated during the feature screening process, while the generation of redundant information was suppressed.Then, the stochastic variance reduction gradient algorithm was introduced into the bagging integration algorithm to realize the dynamic adjustment of the voting weights of each base modeland improve thecapability in detecting the generalised hybrid abnormal attack traffic.Finally, LBoF algorithm was proposed to map the low-dimensional numerical vector output by the integrated algorithm to a high-dimensional space.The discrepancy of data point spatial density distribution of various samples were amplified based on the potential difference between data points to increase the recall rate of anomalous data point detection.The experimental results show that in detecting multiple hybrid attack traffic on blockchain layers, the proposed method presents an increase in the anomaly detection accuracy and recall rate, which is 1.57% and 2.71%, respectively, compared with methods based on a single classifier integration.…”
Get full text
Article -
1327
Pestalotiopsis (Pestalotia) Diseases of Palm
Published 2019-05-01“…In other words, unlike the other leaf spot and petiole blight pathogens, which attack either the leaf blade or the leaf petiole, Pestalotiopsis attacks all parts of the leaf from base to tip. …”
Get full text
Article -
1328
Pestalotiopsis (Pestalotia) Diseases of Palm
Published 2019-05-01“…In other words, unlike the other leaf spot and petiole blight pathogens, which attack either the leaf blade or the leaf petiole, Pestalotiopsis attacks all parts of the leaf from base to tip. …”
Get full text
Article -
1329
WGRe:a re-encryption anonymous tunnel
Published 2009-01-01“…The universal re-encryption scheme URE and its extension EURE were reviewed,discovering their vulnerabilities to Pfitzmann attack.Then a novel re-encryption scheme WGRe(WonGoo Re-encryption) was proposed.WGRe could en-sure the correctness of the outputs from a node and protect against replay attack,which was hard in layered encryption sys-tems.The experimental results show WGRe is practical and more efficient than URE and EURE schemes due to the fact that its ciphertext is only double the size of the corresponding plaintext,instead of four times as URE or EURE.…”
Get full text
Article -
1330
Common Risk Factors of Myocardial Infarction and Some Socio Demographic Characteristics in Sulaimani City
Published 2022-01-01“…The study was attentive on exploring the socioeconomic status, lifestyle, family history of heart attack and classical predisposing factors such as (Hypertension, Diabetes Mellitus, smoking cigarette, and dyslipidemia). …”
Get full text
Article -
1331
Altered Macular Vasculature in Migraine Patients without Aura: Is It Associated with Ocular Vasculature and White Matter Hyperintensities?
Published 2020-01-01“…Detailed histories of the patients with migraine were recorded including the disease duration, number of attacks in the last month, and attack durations. Visual evoked potentials (VEP) were recorded in all migraine patients. …”
Get full text
Article -
1332
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01“…Deploying multiple heterogeneous controllers at the control level of a software-defined data center is an effective way to increase security.In view of the deployment strategy of controllers under different security requirements of the network,a game model was presented.Specifically,firstly,the game theory was used to depict the attack and defense game model and solve the Nash equilibrium,and then guided the design of security strategy.Secondly,the impact of the strategy of attack and defense on the security status of the control layer were analyzed.Finally,the simulation results show the effectiveness of the proposed equilibrium strategy,and describe the dynamic interaction strategy.…”
Get full text
Article -
1333
L’Université américaine dans le débat public après le 11 septembre
Published 2004-01-01“…The various reactions to 9/11 in the academic community and the attacks on U.S scholars and campuses are analyzed in this article. …”
Get full text
Article -
1334
Research on cyberspace security situation awareness
Published 2016-10-01“…Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be selved.Facing the polyphyletic,isomeric,disconnected properties in the cyberspace,bases on a credible IaaS,a cyberspace security situation awareness was constructed by ontology,semantic Web and linked data theory.While guarantee the access security of integrating data,the model could make a comprehensive analysis on the properties in the cyberspace,which contributes to cyberspace governance.…”
Get full text
Article -
1335
SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments
Published 2025-01-01“…Results demonstrated that SecEdge outperformed state-of-the-art methods with a detection rate of 98.8% for DoS attacks on NSL-KDD, 98.5% for MitM attacks on UNSW-NB15, and 98.7% for data injection attacks on CICIDS2017.…”
Get full text
Article -
1336
Chemical reactivity of alliin and its molecular interactions with the M proteasepro of SARS-CoV-2
Published 2024-01-01“…The more active sites for nucleophilic attacks are located on the thioether group. In the case of free radical attacks, the more reactive sites are on the carbonyl, thioether and prop-2-ene moieties. …”
Get full text
Article -
1337
An adaptive intrusion detection and prevention system for Internet of Things
Published 2019-11-01“…This led to the increase in security threats and attacks on these devices. Due to the increased number of devices connected to the Internet, the attackers have more opportunities to perform their attacks in such an environment. …”
Get full text
Article -
1338
L2D2: A Novel LSTM Model for Multi-Class Intrusion Detection Systems in the Era of IoMT
Published 2025-01-01“…Due to the growing popularity of Internet of Things (IoT) devices, attackers focus more and more on finding new methods, ways, and vulnerabilities to penetrate IoT networks. …”
Get full text
Article -
1339
Design of Satellite Internet Defense System Based on Mobile Target Defense
Published 2024-12-01“…By changing the IP address, protocol port information of satellite Internet pseudo-randomly, the system's resistance to interception attacks and denial of service attacks was enhanced, thereby achieving active defense. …”
Get full text
Article -
1340
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01“…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
Get full text
Article