Showing 1,601 - 1,620 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1601

    Metrics for code obfuscation based on symbolic execution and N-scope complexity by Yuqiang XIAO, Yunfei GUO, Yawen WANG

    Published 2022-12-01
    “…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
    Get full text
    Article
  2. 1602

    Creep Properties of Axially Compressed Fly Ash Concrete under Sulfate Corrosion by Jian Cao, Ziyang Han, Zhifeng Du

    Published 2022-01-01
    “…However, the concrete creep under both sustained compression load and sulfate attack conditions has rarely been reported. To obtain the creep characteristics of fly ash concrete in a sulfate environment, this paper first finishes the creep experiments of fly ash concrete under sustained compression load and sulfate attack. …”
    Get full text
    Article
  3. 1603

    Stochastic Dynamic Model of Sulfate Corrosion Reactions in Concrete Materials considering the Effects of Colored Gaussian Noises by Tao Li, Bin Zhang

    Published 2019-01-01
    “…The corrosion reactions in concrete materials subjected to external environment attack can lead to the deterioration of concrete. …”
    Get full text
    Article
  4. 1604

    A Survey on Frameworks Used for Robustness Analysis on Interdependent Networks by Ivana Bachmann, Javier Bustos-Jiménez, Benjamin Bustos

    Published 2020-01-01
    “…The analysis of network robustness tackles the problem of studying how a complex network behaves under adverse scenarios, such as failures or attacks. In particular, the analysis of interdependent networks’ robustness focuses on the specific case of the robustness of interacting networks and their emerging behaviors. …”
    Get full text
    Article
  5. 1605

    Insect Pest occurrence on Cultivated Amaranthus Spp in Benin City, Edo State, Nigeria by AE Ezeh, ABO Ogedegbe, SA Ogedegbe

    Published 2015-07-01
    “…Unfortunately, one of the major factors limiting the productivity of Amaranthus is the incidence of insect pests attack. The aim of this study was to determine the insect pest occurrence on cultivated Amaranths in Benin City, Nigeria. …”
    Get full text
    Article
  6. 1606

    New-Onset Panic, Depression with Suicidal Thoughts, and Somatic Symptoms in a Patient with a History of Lyme Disease by Amir Garakani, Andrew G. Mitton

    Published 2015-01-01
    “…We present a case of a 37-year-old man with no known psychiatric history who developed panic attacks, severe depressive symptoms and suicidal ideation, and neuromuscular complaints including back spasms, joint pain, myalgias, and neuropathic pain. …”
    Get full text
    Article
  7. 1607

    Vulnerability Evaluation and Improvement Method of Civil Aviation Navigation Network by Tingyu Gong, Songchen Han, Kunshan Yang

    Published 2022-01-01
    “…Vulnerability evaluation shows that the navigation network is more vulnerable when subject to the intentional attack of nodes with higher comprehensive node importance than an intentional attack of nodes with a larger value of indicators used in previous literature. …”
    Get full text
    Article
  8. 1608

    A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments by Aneetha Avalappampatty Sivasamy, Bose Sundan

    Published 2015-01-01
    “…Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling’s T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. …”
    Get full text
    Article
  9. 1609

    Dorsal hippocampus represents locations to avoid as well as locations to approach during approach-avoidance conflict. by Olivia L Calvin, Matthew T Erickson, Cody J Walters, A David Redish

    Published 2025-01-01
    “…We found decoding of the pseudo-predator's location during HSEs when hesitating in the nest and during theta prior to retreating as the rats approached the pseudo-predator. After the first attack, we observed new place fields appearing at the location of the robot (not the location the rat was when attacked). …”
    Get full text
    Article
  10. 1610

    Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks by Yang Yang, Xiaoyu Jin, Su Yao, Xuesong Qiu, Liu Liu

    Published 2017-06-01
    “…How to protect sensors from attacks of malicious mobile agents becomes an important issue in the field. …”
    Get full text
    Article
  11. 1611

    Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility by Roland Stenger, Steffen Busse, Jonas Sander, Thomas Eisenbarth, Sebastian Fudickar

    Published 2025-01-01
    “…Furthermore, a re-identification attack scenario is applied. The study findings indicate a clear trade-off between increased privacy and decreased CV performance. …”
    Get full text
    Article
  12. 1612
  13. 1613

    Robust medical zero‐watermarking algorithm based on Residual‐DenseNet by Cheng Gong, Jing Liu, Ming Gong, Jingbing Li, Uzair Aslam Bhatti, Jixin Ma

    Published 2022-11-01
    “…Abstract To solve the problem of poor robustness of existing traditional DCT‐based medical image watermarking algorithms under geometric attacks, a novel deep learning‐based robust zero‐watermarking algorithm for medical images is proposed. …”
    Get full text
    Article
  14. 1614

    Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition by Ze Li, Duoyong Sun, Bo Li, Zhanfeng Li, Aobo Li

    Published 2018-01-01
    “…Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. …”
    Get full text
    Article
  15. 1615

    Resilient robust model predictive load frequency control for smart grids with air conditioning loads by Shiluo Jike, Guobao Liu, Feng Li, Changyu Zhang, Qi Wang, Mengxia Zhou, Haiya Qian

    Published 2024-10-01
    “…The results also show that the proposed model predictive control strategy has some resistance to cyber attacks and external disturbances.…”
    Get full text
    Article
  16. 1616

    The big challenge for livestock genomics is to make sequence data pay by Johnsson, Martin

    Published 2023-08-01
    “…It discusses potential explanations for why it is so difficult to consistently improve the accuracy of genomic prediction by means of whole-genome sequence data, and three potential attacks on the problem. …”
    Get full text
    Article
  17. 1617

    Integrated Strategies for Controlling Flower Thrips in Southern Highbush Blueberries by Oscar E. Liburd, H. Alejandro Arevalo

    Published 2019-05-01
    “…Flower thrips are among the most important insect pests that attack early-season blueberries. This document is IPM-140, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
    Get full text
    Article
  18. 1618

    Integrated Strategies for Controlling Flower Thrips in Southern Highbush Blueberries by Oscar E. Liburd, H. Alejandro Arevalo

    Published 2019-05-01
    “…Flower thrips are among the most important insect pests that attack early-season blueberries. This document is IPM-140, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
    Get full text
    Article
  19. 1619

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…While flow records provide valuable information for detecting network-level anomalies and attacks, they do not consider packet-level information and payload content. …”
    Get full text
    Article
  20. 1620

    Short-term outcome of endovascular stenting for symptomatic vertebrobasilar stenosis by Mohamed Abdel moneim Abdo Tolba, Mohammed Alaswad, Mohamed Mohamed Tawfik, Ahmed Zaki Akl, Mona Ali Eissa, Hala El-khawas, Hani Mahmoud Zaki Eldin, Mohamed Khaled Ahmed Elewa

    Published 2025-01-01
    “…Vertebrobasilar stenosis (VBS) is the main concern, causing stroke or ischemic attacks. Treatment includes antithrombotic therapy and lifestyle modifications, but invasive intervention like endovascular angioplasty is needed in indicated patients. …”
    Get full text
    Article