-
1541
Design of Intelligent Feature Selection Technique for Phishing Detection
Published 2025-01-01“… Phishing attacks lead to significant threats to individuals and organizations by gaining unauthorized access. …”
Get full text
Article -
1542
Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks
Published 2024-09-01“…In the random oracle model, the scheme was proven to meet indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) and existential unforgeability under adaptive chosen message attacks (EUF-CMA). …”
Get full text
Article -
1543
The latest therapeutic reports on short-term and long-term prophylaxis in the treatment of hereditary angioedema
Published 2024-02-01“…Patients with HAE must be aware of the need to receive medication promptly in the event of an attack, as well as the importance of regular prophylactic therapy, which can significantly reduce the frequency and severity of attacks, allowing them to lead normal lives. …”
Get full text
Article -
1544
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
Published 2013-05-01“…Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.…”
Get full text
Article -
1545
Unsupervised intrusion detection model based on temporal convolutional network
Published 2025-01-01“…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. In addition, UDMT can adopt different privacy layer modes, and the configuration was flexible to meet the requirements of different detection rates and detection delays. …”
Get full text
Article -
1546
Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression
Published 2014-01-01“…In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
Get full text
Article -
1547
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01“…At the same time, adversarial attacks on models had also gained widespread attention. …”
Get full text
Article -
1548
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…Network coding can solve this problem, but it also incurs another drawback called pollution attack. Pollution attack can be prevented by using homomorphic network coding signature schemes to check whether a corrupted packet is injected. …”
Get full text
Article -
1549
Investigation of Corrosion Behaviour of Aluminium Alloy Subjected to Laser Shock Peening without a Protective Coating
Published 2015-01-01“…Through SEM, reduction of pitting attack at the LSPwC specimen surface was confirmed, despite its increased roughness.…”
Get full text
Article -
1550
Blockchain-enabled digital twin system for brain stroke prediction
Published 2025-01-01“…The application can be extended to monitor other pathologies such as heart attacks, cancers, osteoporosis, and epilepsy with minimal configuration changes.…”
Get full text
Article -
1551
Effect of Induced Plant Expression on Ants and Extrafloral Nectaries Number in Cotton and Castor
Published 2021-12-01“… Plant response to the attack of herbivores is a usual phenomenon, but the number of extrafloral nectaries (EFNs) in response to herbivore attack is least studied and recorded. …”
Get full text
Article -
1552
Retour à la page blanche après le choc du 11 Septembre
Published 2020-05-01“…In the days that followed the attacks on the World Trade Center on September 11, 2001, a certain number of US cartoonists published their works about the event in a collection untitled 9-11: Emergency Relief. …”
Get full text
Article -
1553
PENGARUH PENGIMBASAN ASAM SALISILAT TERHADAP TANAMAN SINGKONG (Manihot esculenta Crantz) SEBAGAI AGEN KETAHANAN JAMUR Fusarium oxysporum
Published 2023-05-01“…When planting cassava, there are disease attacks caused by fungi, one of which is the Fusarium oxysporum fungus. …”
Get full text
Article -
1554
Multiple Sclerosis Presenting with Facial Twitching (Myokymia and Hemifacial Spasms)
Published 2017-01-01“…Current medical treatment helps to prevent new attacks and improve function after an attack. MS is diagnosed by physical examination, diagnostic imaging, and examination of cerebral spinal fluid. …”
Get full text
Article -
1555
Blockchain-based payment channel network: challenges and recent advances
Published 2024-10-01“…This thesis systematizes the research work on payment channel networks represented by the Lightning Network, organize and analyze the potential attacks and improvement directions of the Lightning Network. …”
Get full text
Article -
1556
Differential privacy budget optimization based on deep learning in IoT
Published 2022-06-01“…In order to effectively process the massive data brought by the large-scale application of the internet of things (IoT), deep learning is widely used in IoT environment.However, in the training process of deep learning, there are security threats such as reasoning attacks and model reverse attacks, which can lead to the leakage of the original data input to the model.Applying differential privacy to protect the training process parameters of the deep model is an effective way to solve this problem.A differential privacy budget optimization method was proposed based on deep learning in IoT, which adaptively allocates different budgets according to the iterative change of parameters.In order to avoid the excessive noise, a regularization term was introduced to constrain the disturbance term.Preventing the neural network from over fitting also helps to learn the salient features of the model.Experiments show that this method can effectively enhance the generalization ability of the model.As the number of iterations increases, the accuracy of the model trained after adding noise is almost the same as that obtained by training using the original data, which not only achieves privacy protection, but also guarantees the availability, which means balance the privacy and availability.…”
Get full text
Article -
1557
Secure and collaborative spectrum sensing scheme based on audit game
Published 2023-12-01“…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
Get full text
Article -
1558
A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection
Published 2012-01-01“…The setting of honeypots, which emulate vulnerable applications, is one method to collect attack code. We have proposed a dedicated hardware architecture for honeypots which allows both high-speed operation at 10 Gb/s and beyond and offers a high resilience against attacks on the honeypot infrastructure itself. …”
Get full text
Article -
1559
The impact of the Hamas-Israel conflict on the U.S. defense industry stock market return.
Published 2025-01-01“…On October 7th, 2023, Hamas carried out a terrorist attack on Israel. The Israeli government promptly retaliated the attack with massive bombing and a major military operation in the Gaza Strip. …”
Get full text
Article -
1560
Ligustrum Weevil (suggested common name), Ochyromera ligustri Warner (Insecta: Coleoptera: Curculionidae: Tychiinae: Tychiini: Endaeina)
Published 2005-06-01“… A seed-attacking weevil was recently found attacking Chinese privet in Tallahassee, Leon County, Florida (Cuda and Zeller 1998). …”
Get full text
Article