-
121
Virtual Agents-Based Attack-Resilient Distributed Control for Islanded AC Microgrid
Published 2025-01-01Subjects: “…denial-of-service (DoS) attack…”
Get full text
Article -
122
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. …”
Get full text
Article -
123
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. …”
Get full text
Article -
124
Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method
Published 2024-12-01“…Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences. …”
Get full text
Article -
125
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
Published 2021-01-01“…The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. …”
Get full text
Article -
126
An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things
Published 2019-11-01“…Security is a critical challenge for a stable IoT network, for instance, routing attacks, especially sinkhole attack is a severe attack which has the capability to direct network data toward the intruder, and it can also disrupt and disconnect the devices from their network. …”
Get full text
Article -
127
Phenomenon of the “dawn attacks operation” as a money politics practices in Indonesian election
Published 2024-08-01“…The practice of handing out money before voting or dawn raids is still the choice of some legislative candidates to gain votes from citizens. Dawn attacks as a practice of money politics are an act of malpractice that can damage the democratic essence of holding general elections, because dawn attacks use money as a reciprocal tool to buy votes. …”
Get full text
Article -
128
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Subjects: Get full text
Article -
129
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
130
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach
Published 2017-01-01“…This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. …”
Get full text
Article -
131
Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
Published 2020-12-01“…DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. …”
Get full text
Article -
132
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
133
Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid
Published 2021-01-01“…We use the coupled models, both of which have emergent properties, to investigate two situations. First, when an attacker that relies on stealth compromise is hidden until it is either detected during routine maintenance or an attack is initiated. …”
Get full text
Article -
134
RUSSIA'S STRATEGIC DETERRENCE AND DEFENSE AGAINST POTENTIAL MEANS AND METHODS OF STRATEGIC ATTACK
Published 2019-01-01Subjects: “…strategic attack…”
Get full text
Article -
135
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…After then, a new practical key recovery attack on GEA-1 is presented. It has a time complexity of 221.02 GEA-1 encryptions and requires only seven related keys, which is much less than the existing related key attack on GEA-1. …”
Get full text
Article -
136
A Comprehensive Analysis of Robustness in Interdependent Mechatronic Systems under Attack Strategies
Published 2021-01-01“…Then, we also define the robustness metric to quantify the performance of IMECN during the entire attack process. The mass transit vehicle is taken as an example to investigate the impact of attack strategies on the robustness at different δ in a real-world mechatronic system. …”
Get full text
Article -
137
Wild Boar Attacks on Hunting Dogs in Czechia: The Length of the Hunting Season Matters
Published 2025-01-01“…The number of attacks only increased with the length of the hunting season. …”
Get full text
Article -
138
Retracted: Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation
Published 2024-01-01Get full text
Article -
139
-
140
Statistical-based detection of pilot contamination attack for NOMA in 5G networks
Published 2025-01-01Subjects: Get full text
Article