Showing 121 - 140 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 121
  2. 122
  3. 123

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. …”
    Get full text
    Article
  4. 124

    Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method by Ting Ma, Xiaofeng Zhang, Zhexin Miao

    Published 2024-12-01
    “…Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences. …”
    Get full text
    Article
  5. 125

    Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading by Xin-Rui Liu, Yuan Meng, Peng Chang

    Published 2021-01-01
    “…The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. …”
    Get full text
    Article
  6. 126

    An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things by Sabeen Tahir, Sheikh Tahir Bakhsh, Rayan A Alsemmeari

    Published 2019-11-01
    “…Security is a critical challenge for a stable IoT network, for instance, routing attacks, especially sinkhole attack is a severe attack which has the capability to direct network data toward the intruder, and it can also disrupt and disconnect the devices from their network. …”
    Get full text
    Article
  7. 127

    Phenomenon of the “dawn attacks operation” as a money politics practices in Indonesian election by Yusa Djuyandi, Diana Mahmuda

    Published 2024-08-01
    “…The practice of handing out money before voting or dawn raids is still the choice of some legislative candidates to gain votes from citizens. Dawn attacks as a practice of money politics are an act of malpractice that can damage the democratic essence of holding general elections, because dawn attacks use money as a reciprocal tool to buy votes. …”
    Get full text
    Article
  8. 128
  9. 129
  10. 130

    Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach by Abdulaziz Aborujilah, Shahrulniza Musa

    Published 2017-01-01
    “…This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. …”
    Get full text
    Article
  11. 131

    Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet by Rebeen Rebwar Hama Amin, Dana Hassan, Masnida Hussin

    Published 2020-12-01
    “…DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. …”
    Get full text
    Article
  12. 132
  13. 133

    Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid by Marc Mangel, Jimmie McEver

    Published 2021-01-01
    “…We use the coupled models, both of which have emergent properties, to investigate two situations. First, when an attacker that relies on stealth compromise is hidden until it is either detected during routine maintenance or an attack is initiated. …”
    Get full text
    Article
  14. 134
  15. 135

    New Practical Attacks on GEA-1 Based on a New-Found Weakness by Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang, Ziyu Guan

    Published 2024-01-01
    “…After then, a new practical key recovery attack on GEA-1 is presented. It has a time complexity of 221.02 GEA-1 encryptions and requires only seven related keys, which is much less than the existing related key attack on GEA-1. …”
    Get full text
    Article
  16. 136

    A Comprehensive Analysis of Robustness in Interdependent Mechatronic Systems under Attack Strategies by Gang Xu, Yanhui Wang, Yucheng Hao, Limin Jia, Zeyun Yang, Zhichao He

    Published 2021-01-01
    “…Then, we also define the robustness metric to quantify the performance of IMECN during the entire attack process. The mass transit vehicle is taken as an example to investigate the impact of attack strategies on the robustness at different δ in a real-world mechatronic system. …”
    Get full text
    Article
  17. 137
  18. 138
  19. 139
  20. 140