-
1681
A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
Published 2022-03-01“…In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. …”
Get full text
Article -
1682
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Published 2025-01-01“…However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks. …”
Get full text
Article -
1683
A Large-Scale Network Data Analysis via Sparse and Low Rank Reconstruction
Published 2014-01-01“…Finally, we design a prototype system for network anomalies detection such as Probe and R2L attacks. The experiments have shown that our approach is effective in revealing the patterns of network traffic data and detecting attacks from large-scale network traffic. …”
Get full text
Article -
1684
Study on the Vortex-Induced Vibration Performance of the LSOB Girder of a Valley-Crossing Suspensions Bridge
Published 2024-01-01“…Conventional aerodynamic vibration suppression measures, such as the lower central stabilizing plate and the guide vane at the gantry rail, demonstrate that the lower central stabilizing plate can reduce the VIV response at all wind angles of attack, decreasing vertical amplitude by 40%–50% and torsional amplitude by 10%–25%. …”
Get full text
Article -
1685
Meta's Challenge with Olives and Watermelon: The Case of Blocking Posts About Gaza
Published 2024-12-01“…Social media offers a socio-political ground for participatory democracy and an alternative to traditional media in a globalizing world. Recently, Israel's attack on Gaza and the massive genocide in the region have caused a great resonance on the internet and social media. …”
Get full text
Article -
1686
Information security of the region: Approaches to consideration and economic essence
Published 2023-05-01“…Modern information technologies can protect information, protect citizens from information attacks and preserve the integral information space of the country. …”
Get full text
Article -
1687
IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing
Published 2015-01-01“…However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. …”
Get full text
Article -
1688
Discrete resource allocation problems and military applications
Published 2002-12-01“… The paper deals with the discrete resource allocation problem and its application in the attack steering systems. The non-linear models of multiple target prioritisation are presented in the case of multiple different weapons. …”
Get full text
Article -
1689
Migraine consultation and treatment in the era of COVID-19
Published 2020-06-01“…This article reviews teleconsultation options, patient preparation for counselling, safe use of acute and preventive medications, and treatment strategies for typical and severe migraine attacks. The literature review also provides information on the headache associated with personal protective equipment. …”
Get full text
Article -
1690
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
Published 2018-01-01“…However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. …”
Get full text
Article -
1691
Les traditions de la violence : le terrorisme d’extrême droite en République fédérale d’Allemagne
Published 2022-04-01“…Starting with the recent attacks perpetrated by the extreme right in Germany, this article focuses on the continuities of political violence after 1945. …”
Get full text
Article -
1692
Annosum Root Rot of Southern Pines
Published 2010-08-01“…FOR269, a 3-page illustrated fact sheet by Tyler Dreaden and Jason Smith, describes this damaging forest pathogen that infects a wide range of species, including southern pine, and can cause tree mortality, reduced growth rates, susceptibility to attack by bark beetles, and regeneration failure. …”
Get full text
Article -
1693
Les fêtes civiques toulousaines, lieu d’affirmation républicaine face au danger royaliste de l’an V
Published 2016-11-01“…In Year V, the municipal administration of Toulouse of Jacobin tendency, and her mayor Desbarreaux were facing the attacks of the royalists and of some moderate republicans. …”
Get full text
Article -
1694
An obfuscate implementation for Android resources index table
Published 2016-10-01“…Obfuscate Android resources index table will increase the difficulty of reverse analysis attack. Resources index table records the strings information in Android App. …”
Get full text
Article -
1695
Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism
Published 2017-02-01“…With the prosperous development of information technologies and mobile internet popularity of information-based on a global basis,it is necessary to analyze and research the security problems for Android,which is one of the most important technologies in the emerging field of mobile internet and intelligent terminals.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.…”
Get full text
Article -
1696
Multi-Clock control shift register sequences
Published 2008-01-01“…A new clock-control-model called multi-clock control model was presented.The sequence produced by this model has a long period and large linear complexity,and it can be simple put into practice.When the sequences are used as encipher sequences in secret communication,it can greatly strengthen the anti-attack ability of the ciphertext.Further more,this model is improved and the better sequences could be obtained.…”
Get full text
Article -
1697
Africa in the Year of Geopolitics
Published 2024-02-01“…The war in Gaza, a disproportionate Israeli military response to Hamas attack on a festival in Israel, is among the deadliest in decades. …”
Get full text
Article -
1698
Research on secure routing algorithm in satellite networks
Published 2006-01-01“…The key technologies in satellite networks security were researched.A security routing algorithm was proposed.By static configuration combining together with dynamic adjustment,the algorithm realized dynamic routing.Based on the credence model,the security mechanism was added.When it found there was malicious behavior in the network,it would react actively.It effectively guaranteed the security of satellite networks and protectd the network from kinds of attacks.…”
Get full text
Article -
1699
Tonsillitis Caused by Vomiting in a Patient with Bulimia Nervosa: A Case Report and Literature Review
Published 2013-01-01“…This was one of multiple attacks; all of which had all followed periods of self-induced vomiting due to the patient suffering with bulimia nervosa. …”
Get full text
Article -
1700
Construction of the content extraction signature scheme based on the thought of the batch scheme
Published 2018-12-01“…The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.…”
Get full text
Article