-
1561
Cyber ranges: survey and perspective
Published 2024-10-01“…Various cyber attacks occurred frequently. Increasing attention has been being paid to cyber security by many countries. …”
Get full text
Article -
1562
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
Published 2015-01-01“…The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. …”
Get full text
Article -
1563
Réponse à certaines critiques sur l’approche neurolinguistique (ANL)
Published 2024-12-01“…In 2022 appeared the first in a series of articles (Antier, 2022a, 2022b, 2023) indiscriminately criticizing in a scathing manner the authors of the neurolinguistic approach (NLA) as well as their promoters, in particular attacking my work on NLA (Germain, 2017). This article is intended as a personal reaction to these attacks. …”
Get full text
Article -
1564
Postfire Burnt-Wood Management Affects Plant Damage by Ungulate Herbivores
Published 2013-01-01“…I analyze the effect of post-fire burnt wood management on herbivore attack on a woody plant species (Ulex parviflorus). …”
Get full text
Article -
1565
Building an African Counter-Terrorism Architecture
Published 2022-06-01“… Following September 11, 2001, terrorist attacks in the world trade centre in the United States of America, the phenomenon of terrorism has attracted increasing global attention. …”
Get full text
Article -
1566
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
1567
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. …”
Get full text
Article -
1568
Household transmission of SARS-CoV-2 in five US jurisdictions: Comparison of Delta and Omicron variants.
Published 2025-01-01“…Overall transmission risk was similar in households with Omicron (attack rate = 47.0%) compared to Delta variant (attack rate = 48.0%) circulation. …”
Get full text
Article -
1569
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01“…The increasing reliance on mobile devices significantly raises the risk of malware attacks, especially for non-technical users who often grant permissions without thorough evaluation, leading to potentially devastating effects. …”
Get full text
Article -
1570
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids.
Published 2025-01-01“…The dataset used for evaluation, the Industrial Control System (ICS) Cyber Attack Dataset (Power System Dataset) consists of various FDIA scenarios simulated in a smart grid environment. …”
Get full text
Article -
1571
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…Cyberattack detection employing deep learning (DL) contains training neural networks to identify patterns indicative of malicious actions within system logs or network traffic, allowing positive classification and mitigation of cyber-attacks. By leveraging the integral ability of DL methods to learn complex representations, this technique enhances the accuracy and efficiency of detecting diverse and growing cyber-attacks. …”
Get full text
Article -
1572
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…In this study, we propose a novel temporal convolutional network (TCN) to enhance EVCS security by rapidly detecting Open Charge Point Protocol (OCPP) attacks. Our model was trained and tested on the latest CICEVSE2024 dataset, which encompasses attacks targeting EVCS communication protocols, including OCPP and ISO15118, during charging and idle states. …”
Get full text
Article -
1573
The hidden cost of digital learning: a cross-sectional study assessing the prevalence of computer vision syndrome (CVS) among medical students in Jordan
Published 2025-01-01“…Moderate positive correlations were found between the number of symptoms and the frequency of monthly symptom attacks and between the duration and frequency of symptom attacks (p<0.001).Conclusion Our study found a 56.3% prevalence of CVS among Jordanian medical students, with over 80% having ocular and extraocular symptoms. …”
Get full text
Article -
1574
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01“…The robustness against key sensitivity, noise, cropping attacks, and adversarial attacks are shown in Figs. 15–18, 22–23, and 24. …”
Get full text
Article -
1575
Ketahanan dan Kualitas Visual Watermarked Image Menggunakan Integer Wavelet Transform (IWT) dan Chinese Remainder Theorem (CRT)
Published 2023-04-01“…This paper proposes a digital watermarking method using a combination of Integer Wavelet Transform (IWT) and Chinese Remainder Theorem (CRT) to produce watermarking with good visual quality and resistance from several attacks. The results obtained that Peak Signal-to-Noise Ratio (PSNR) values are close to 1 and Normalized Correlation Coefficient (NCC) equal to 0.71337. shows the IWT and CRT methods are able to produce watermarked images with good visual quality or imperceptibility and are able to provide image resistance to several attacks such as gaussian, salt & pepper and JPEG2000 compression but are not resistant to rotation and contrast attacks because the NCC value is below 0.5 …”
Get full text
Article -
1576
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge
Published 2013-04-01“…We analyze the ability of our proposed scheme to withstand different attacks and demonstrate its efficiency in terms of overhead and functionality when compared to existing works.…”
Get full text
Article -
1577
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications
Published 2013-11-01“…Detailed security analysis has shown that the proposed EG-AKA protocol is secure in terms of user and group identity protection and resistance to several attacks. Furthermore, formal verification implemented in AVISPA proves that the proposed protocol is secure against various malicious attacks. …”
Get full text
Article -
1578
DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK
Published 2020-09-01“…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. Whatever approach is used, the evolution of the botnet's nature and the set of defined rules for detecting botnets can affect the performance of botnet detection systems. …”
Get full text
Article -
1579
Tophaceous Gout and Renal Insufficiency: A New Solution for an Old Therapeutic Dilemma
Published 2011-01-01“…Monthly polyarthritis attacks were accompanied by subcutaneous tophi. Serum uric acid levels were constantly above 600 μmol/L (10 mg/dL). …”
Get full text
Article -
1580
A fuzzy logic-based risk evaluation and precaution level estimation of explosive, flammable, and toxic chemicals for preventing damages
Published 2025-01-01“…Chemical industries are highly vulnerable to accidental events or terrorist attacks due to their processing, storage, and transportation of explosive, flammable, and toxic materials. …”
Get full text
Article