Showing 1,541 - 1,560 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1541

    Design of Intelligent Feature Selection Technique for Phishing Detection by Sharvari Sagar Patil, Narendra M. Shekokar, Sridhar Chandramohan Iyer

    Published 2025-01-01
    “… Phishing attacks lead to significant threats to individuals and organizations by gaining unauthorized access. …”
    Get full text
    Article
  2. 1542

    Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks by LIU Jie, FAN Xinyue, HE Jiahui

    Published 2024-09-01
    “…In the random oracle model, the scheme was proven to meet indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) and existential unforgeability under adaptive chosen message attacks (EUF-CMA). …”
    Get full text
    Article
  3. 1543

    The latest therapeutic reports on short-term and long-term prophylaxis in the treatment of hereditary angioedema by Maciej Kozłowski, Karolina Żurawska, Iwona Poziomkowska-Gęsicka

    Published 2024-02-01
    “…Patients with HAE must be aware of the need to receive medication promptly in the event of an attack, as well as the importance of regular prophylactic therapy, which can significantly reduce the frequency and severity of attacks, allowing them to lead normal lives. …”
    Get full text
    Article
  4. 1544

    A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks by Sang Guun Yoo, Hyukjun Lee, Juho Kim

    Published 2013-05-01
    “…Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation.…”
    Get full text
    Article
  5. 1545

    Unsupervised intrusion detection model based on temporal convolutional network by LIAO Jinju, DING Jiawei, FENG Guanghui

    Published 2025-01-01
    “…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. In addition, UDMT can adopt different privacy layer modes, and the configuration was flexible to meet the requirements of different detection rates and detection delays. …”
    Get full text
    Article
  6. 1546

    Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression by Divya Selvaraj, Padmavathi Ganapathi

    Published 2014-01-01
    “…In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
    Get full text
    Article
  7. 1547

    Adversarial method for malicious ELF file detection based on deep reinforcement learning by SUN He, ZHANG Bocheng, GENG Jiaxuan, WU Di, WANG Junfeng, FANG Zhiyang

    Published 2024-10-01
    “…At the same time, adversarial attacks on models had also gained widespread attention. …”
    Get full text
    Article
  8. 1548

    Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system by Yumei Li, Futai Zhang, Yinxia Sun

    Published 2021-01-01
    “…Network coding can solve this problem, but it also incurs another drawback called pollution attack. Pollution attack can be prevented by using homomorphic network coding signature schemes to check whether a corrupted packet is injected. …”
    Get full text
    Article
  9. 1549

    Investigation of Corrosion Behaviour of Aluminium Alloy Subjected to Laser Shock Peening without a Protective Coating by U. Trdan, J. Grum

    Published 2015-01-01
    “…Through SEM, reduction of pitting attack at the LSPwC specimen surface was confirmed, despite its increased roughness.…”
    Get full text
    Article
  10. 1550

    Blockchain-enabled digital twin system for brain stroke prediction by Venkatesh Upadrista, Sajid Nazir, Huaglory Tianfield

    Published 2025-01-01
    “…The application can be extended to monitor other pathologies such as heart attacks, cancers, osteoporosis, and epilepsy with minimal configuration changes.…”
    Get full text
    Article
  11. 1551

    Effect of Induced Plant Expression on Ants and Extrafloral Nectaries Number in Cotton and Castor by Nalini Thiyagarajan, Revathi Mani

    Published 2021-12-01
    “… Plant response to the attack of herbivores is a usual phenomenon, but the number of extrafloral nectaries (EFNs) in response to herbivore attack is least studied and recorded. …”
    Get full text
    Article
  12. 1552

    Retour à la page blanche après le choc du 11 Septembre by Yves Davo

    Published 2020-05-01
    “…In the days that followed the attacks on the World Trade Center on September 11, 2001, a certain number of US cartoonists published their works about the event in a collection untitled 9-11: Emergency Relief. …”
    Get full text
    Article
  13. 1553

    PENGARUH PENGIMBASAN ASAM SALISILAT TERHADAP TANAMAN SINGKONG (Manihot esculenta Crantz) SEBAGAI AGEN KETAHANAN JAMUR Fusarium oxysporum by Lutfiah Yuniar

    Published 2023-05-01
    “…When planting cassava, there are disease attacks caused by fungi, one of which is the Fusarium oxysporum fungus. …”
    Get full text
    Article
  14. 1554

    Multiple Sclerosis Presenting with Facial Twitching (Myokymia and Hemifacial Spasms) by Risha Hertz, James Espinosa, Alan Lucerna, Doug Stranges

    Published 2017-01-01
    “…Current medical treatment helps to prevent new attacks and improve function after an attack. MS is diagnosed by physical examination, diagnostic imaging, and examination of cerebral spinal fluid. …”
    Get full text
    Article
  15. 1555

    Blockchain-based payment channel network: challenges and recent advances by XU Xiu, TIAN Anqi, HE Ruiwen

    Published 2024-10-01
    “…This thesis systematizes the research work on payment channel networks represented by the Lightning Network, organize and analyze the potential attacks and improvement directions of the Lightning Network. …”
    Get full text
    Article
  16. 1556

    Differential privacy budget optimization based on deep learning in IoT by Dan LUO, Ruzhi XU, Zhitao GUAN

    Published 2022-06-01
    “…In order to effectively process the massive data brought by the large-scale application of the internet of things (IoT), deep learning is widely used in IoT environment.However, in the training process of deep learning, there are security threats such as reasoning attacks and model reverse attacks, which can lead to the leakage of the original data input to the model.Applying differential privacy to protect the training process parameters of the deep model is an effective way to solve this problem.A differential privacy budget optimization method was proposed based on deep learning in IoT, which adaptively allocates different budgets according to the iterative change of parameters.In order to avoid the excessive noise, a regularization term was introduced to constrain the disturbance term.Preventing the neural network from over fitting also helps to learn the salient features of the model.Experiments show that this method can effectively enhance the generalization ability of the model.As the number of iterations increases, the accuracy of the model trained after adding noise is almost the same as that obtained by training using the original data, which not only achieves privacy protection, but also guarantees the availability, which means balance the privacy and availability.…”
    Get full text
    Article
  17. 1557

    Secure and collaborative spectrum sensing scheme based on audit game by Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN

    Published 2023-12-01
    “…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
    Get full text
    Article
  18. 1558

    A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection by Sascha Mühlbach, Andreas Koch

    Published 2012-01-01
    “…The setting of honeypots, which emulate vulnerable applications, is one method to collect attack code. We have proposed a dedicated hardware architecture for honeypots which allows both high-speed operation at 10 Gb/s and beyond and offers a high resilience against attacks on the honeypot infrastructure itself. …”
    Get full text
    Article
  19. 1559

    The impact of the Hamas-Israel conflict on the U.S. defense industry stock market return. by Jeroen Klomp

    Published 2025-01-01
    “…On October 7th, 2023, Hamas carried out a terrorist attack on Israel. The Israeli government promptly retaliated the attack with massive bombing and a major military operation in the Gaza Strip. …”
    Get full text
    Article
  20. 1560

    Ligustrum Weevil (suggested common name), Ochyromera ligustri Warner (Insecta: Coleoptera: Curculionidae: Tychiinae: Tychiini: Endaeina) by James P. Cuda, M. C. Zellar, Michael C. Thomas

    Published 2005-06-01
    “… A seed-attacking weevil was recently found attacking Chinese privet in Tallahassee, Leon County, Florida (Cuda and Zeller 1998). …”
    Get full text
    Article