-
121
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01Subjects: Get full text
Article -
122
Survey on model inversion attack and defense in federated learning
Published 2023-11-01Subjects: Get full text
Article -
123
Research on FAHP based Trojan attack effect evaluation
Published 2016-07-01Subjects: Get full text
Article -
124
An exploratory study of interpretability for face presentation attack detection
Published 2021-07-01“…Abstract Biometric recognition and presentation attack detection (PAD) methods strongly rely on deep learning algorithms. …”
Get full text
Article -
125
Attacks on the United States: Index, Icons and Intericonicity in Photojournalism
Published 2015-12-01“…Despite the fact that deadly attacks on the United States involving large numbers of innocent people are quite rare in its history, photographic coverage suggests a general similarity even though each event is unique in its particularity. …”
Get full text
Article -
126
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: Get full text
Article -
127
Vegetative status in patients with transient ischemic attack and stroke
Published 2018-06-01Subjects: “…transient ischemic attack…”
Get full text
Article -
128
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…Slide attack of FESH is exactly a concrete example of SPN structure.…”
Get full text
Article -
129
Prompt injection attacks on vision language models in oncology
Published 2025-02-01“…Using a set of N = 594 attacks, we show that all of these models are susceptible. …”
Get full text
Article -
130
On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas
Published 2013-08-01“…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
Get full text
Article -
131
Analysis of the Fault Attack ECDLP over Prime Field
Published 2011-01-01“…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
Get full text
Article -
132
Host security assessment method based on attack graph
Published 2022-02-01Subjects: Get full text
Article -
133
A New Attack Recovery Approach and <italic>H</italic>∞ Performance Analysis for LFC Systems With FDI Attacks and Uncertainties
Published 2025-01-01Subjects: “…false data injection (FDI) attacks…”
Get full text
Article -
134
Prospective study of factors associated with asthma attack recurrence (ATTACK) in children from three Ecuadorian cities during COVID-19: a study protocol
Published 2022-06-01“…The primary outcome will be rate of asthma attack recurrence during up to 12 months of follow-up. …”
Get full text
Article -
135
Robust deployment strategy for security data collection agent
Published 2019-06-01Subjects: Get full text
Article -
136
A general attack model based on Android system vulnerability
Published 2016-10-01“…The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. Furthermore, the evaluation framework can assess the influence of system vulnerabilities on the security of Android ecosystem.…”
Get full text
Article -
137
Unknown attack detection model based on network behavior analysis
Published 2016-06-01Subjects: Get full text
Article -
138
A Panel of Blood Biomarkers for the Diagnosis of Transient Ischemic Attacks
Published 2025-01-01“…Accurate diagnosis of transient ischemic attacks (TIAs) is challenging. This study was aimed at analyzing blood biomarkers to distinguish TIAs from mimics. …”
Get full text
Article -
139
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01Subjects: Get full text
Article -
140
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
Published 2015-10-01Subjects: “…DNS reflective attack…”
Get full text
Article