Showing 1,321 - 1,340 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 1321

    Verifiable federated aggregation method based on homomorphic proxy re-authentication by YANG Fan, SUN Yi, CHEN Xingyuan, GAO Qi

    Published 2024-06-01
    “…The security of the verifiable federated aggregation method was demonstrated through formal security analysis, which effectively resists forgery attacks and Sybil attacks, exhibiting good robustness. …”
    Get full text
    Article
  2. 1322

    An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems by Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, Pooja Anand, Pradeep Kumar Singh, Tewabe Chekole Workneh

    Published 2022-01-01
    “…Moreover, these techniques collapse, while detecting zero-day attacks. Hence, there is a need to use an intelligent mechanism based on machine learning (ML) and deep learning (DL), to detect attacks. …”
    Get full text
    Article
  3. 1323

    Optimal Adaptive Antijamming in Wireless Sensor Networks by Yanmin Zhu, Xiangpeng Li, Bo Li

    Published 2012-12-01
    “…Attacked by jamming signals, a sensor network may experience corrupted packets and low network throughput. …”
    Get full text
    Article
  4. 1324

    Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network by Mayada Tarek, Eslam Hamouda, Sara El‐Metwally

    Published 2021-11-01
    “…In unimodal‐Bio‐GAN, a random permuted version of the human biometric data is implicitly considered as a salting key and required only during the enrolment stage, which increases the system reliability to overcome different security attacks. The experimental results of unimodal‐Bio‐GAN using the CASIA Iris‐V3‐Internal database outperform the previous methods and its security efficiency is analysed using different attack types.…”
    Get full text
    Article
  5. 1325

    A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks by Yunhua He, Limin Sun, Weidong Yang, Hong Li

    Published 2014-01-01
    “…In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. We study both the passive and active attack scenarios, and in each scenario we consider the effect of different data accuracy requirements on the performance of defense measures. …”
    Get full text
    Article
  6. 1326

    Blockchain network layer anomaly traffic detection method based on multiple classifier integration by Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU

    Published 2023-03-01
    “…To improve the comprehensive generalized feature perception ability of mixed attack traffic on the blockchain network layer, and enhance the performance of abnormal traffic detection, a blockchain layer traffic anomaly detection method was proposed that supported the comprehensive judgement of data anomaly with a strong generalisation capability.Firstly, to expand the difference of the input feature subset of the base classifier used, a feature subset selection algorithm based on discrimination degree and redundant information was proposed, and the output of high sensitivity subset terms was stimulated during the feature screening process, while the generation of redundant information was suppressed.Then, the stochastic variance reduction gradient algorithm was introduced into the bagging integration algorithm to realize the dynamic adjustment of the voting weights of each base modeland improve thecapability in detecting the generalised hybrid abnormal attack traffic.Finally, LBoF algorithm was proposed to map the low-dimensional numerical vector output by the integrated algorithm to a high-dimensional space.The discrepancy of data point spatial density distribution of various samples were amplified based on the potential difference between data points to increase the recall rate of anomalous data point detection.The experimental results show that in detecting multiple hybrid attack traffic on blockchain layers, the proposed method presents an increase in the anomaly detection accuracy and recall rate, which is 1.57% and 2.71%, respectively, compared with methods based on a single classifier integration.…”
    Get full text
    Article
  7. 1327

    Pestalotiopsis (Pestalotia) Diseases of Palm by Monica L. Elliott

    Published 2019-05-01
    “…In other words, unlike the other leaf spot and petiole blight pathogens, which attack either the leaf blade or the leaf petiole, Pestalotiopsis attacks all parts of the leaf from base to tip. …”
    Get full text
    Article
  8. 1328

    Pestalotiopsis (Pestalotia) Diseases of Palm by Monica L. Elliott

    Published 2019-05-01
    “…In other words, unlike the other leaf spot and petiole blight pathogens, which attack either the leaf blade or the leaf petiole, Pestalotiopsis attacks all parts of the leaf from base to tip. …”
    Get full text
    Article
  9. 1329

    WGRe:a re-encryption anonymous tunnel by LU Tian-bo1, QIN Bao-shan2, LI Yang3, DING Li1

    Published 2009-01-01
    “…The universal re-encryption scheme URE and its extension EURE were reviewed,discovering their vulnerabilities to Pfitzmann attack.Then a novel re-encryption scheme WGRe(WonGoo Re-encryption) was proposed.WGRe could en-sure the correctness of the outputs from a node and protect against replay attack,which was hard in layered encryption sys-tems.The experimental results show WGRe is practical and more efficient than URE and EURE schemes due to the fact that its ciphertext is only double the size of the corresponding plaintext,instead of four times as URE or EURE.…”
    Get full text
    Article
  10. 1330

    Common Risk Factors of Myocardial Infarction and Some Socio Demographic Characteristics in Sulaimani City by Bayan Omar Sharif, Samir Y. Lafi

    Published 2022-01-01
    “…The study was attentive on exploring the socioeconomic status, lifestyle, family history of heart attack and classical predisposing factors such as (Hypertension, Diabetes Mellitus, smoking cigarette, and dyslipidemia).   …”
    Get full text
    Article
  11. 1331

    Altered Macular Vasculature in Migraine Patients without Aura: Is It Associated with Ocular Vasculature and White Matter Hyperintensities? by Nurdan Gamze Taşlı, Alevtina Ersoy

    Published 2020-01-01
    “…Detailed histories of the patients with migraine were recorded including the disease duration, number of attacks in the last month, and attack durations. Visual evoked potentials (VEP) were recorded in all migraine patients. …”
    Get full text
    Article
  12. 1332

    Game model based security strategy of heterogeneous controllers in the cloud by Juntai HU, Zhenyu WU, Xiao FU, Yichao WANG

    Published 2018-09-01
    “…Deploying multiple heterogeneous controllers at the control level of a software-defined data center is an effective way to increase security.In view of the deployment strategy of controllers under different security requirements of the network,a game model was presented.Specifically,firstly,the game theory was used to depict the attack and defense game model and solve the Nash equilibrium,and then guided the design of security strategy.Secondly,the impact of the strategy of attack and defense on the security status of the control layer were analyzed.Finally,the simulation results show the effectiveness of the proposed equilibrium strategy,and describe the dynamic interaction strategy.…”
    Get full text
    Article
  13. 1333

    L’Université américaine dans le débat public après le 11 septembre by Pierre Guerlain

    Published 2004-01-01
    “…The various reactions to 9/11 in the academic community and the attacks on U.S scholars and campuses are analyzed in this article. …”
    Get full text
    Article
  14. 1334

    Research on cyberspace security situation awareness by Gan-sen ZHAO, Jie-chao WU, Zi-hao CHEN, Xue-qi REN, Hao-xiang TAN, Zhao-hui MA

    Published 2016-10-01
    “…Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be selved.Facing the polyphyletic,isomeric,disconnected properties in the cyberspace,bases on a credible IaaS,a cyberspace security situation awareness was constructed by ontology,semantic Web and linked data theory.While guarantee the access security of integrating data,the model could make a comprehensive analysis on the properties in the cyberspace,which contributes to cyberspace governance.…”
    Get full text
    Article
  15. 1335

    SecEdge: A novel deep learning framework for real-time cybersecurity in mobile IoT environments by Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Ali Nawaz, Muhammad Yasar Khan, Ayman Altameem

    Published 2025-01-01
    “…Results demonstrated that SecEdge outperformed state-of-the-art methods with a detection rate of 98.8% for DoS attacks on NSL-KDD, 98.5% for MitM attacks on UNSW-NB15, and 98.7% for data injection attacks on CICIDS2017.…”
    Get full text
    Article
  16. 1336

    Chemical reactivity of alliin and its molecular interactions with the M proteasepro of SARS-CoV-2 by López-Orozco Wendolyne, Mendoza-Huizar Humberto Luis, Álvarez-Romero Giaan Arturo, Torres-Valencia Jesús Martín, Sanchez-Zavala Maricruz

    Published 2024-01-01
    “…The more active sites for nucleophilic attacks are located on the thioether group. In the case of free radical attacks, the more reactive sites are on the carbonyl, thioether and prop-2-ene moieties. …”
    Get full text
    Article
  17. 1337

    An adaptive intrusion detection and prevention system for Internet of Things by Sheikh Tahir Bakhsh, Saleh Alghamdi, Rayan A Alsemmeari, Syed Raheel Hassan

    Published 2019-11-01
    “…This led to the increase in security threats and attacks on these devices. Due to the increased number of devices connected to the Internet, the attackers have more opportunities to perform their attacks in such an environment. …”
    Get full text
    Article
  18. 1338

    L2D2: A Novel LSTM Model for Multi-Class Intrusion Detection Systems in the Era of IoMT by Gokhan Akar, Shaaban Sahmoud, Mustafa Onat, Unal Cavusoglu, Emmanuel Malondo

    Published 2025-01-01
    “…Due to the growing popularity of Internet of Things (IoT) devices, attackers focus more and more on finding new methods, ways, and vulnerabilities to penetrate IoT networks. …”
    Get full text
    Article
  19. 1339

    Design of Satellite Internet Defense System Based on Mobile Target Defense by XU Ruirong

    Published 2024-12-01
    “…By changing the IP address, protocol port information of satellite Internet pseudo-randomly, the system's resistance to interception attacks and denial of service attacks was enhanced, thereby achieving active defense. …”
    Get full text
    Article
  20. 1340

    Endogenous security architecture of Ethernet switch based on mimic defense by Ke SONE, Qinrang LIU, Shuai WEI, Wenjian ZHANG, Libo TAN

    Published 2020-05-01
    “…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
    Get full text
    Article