-
1761
EScope: Effective Event Validation for IoT Systems Based on State Correlation
Published 2023-06-01“…Sensing fake event notifications injected by attackers (called event spoofing attack) can trigger sensitive actions through automation rules without involving authorized users. …”
Get full text
Article -
1762
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01“…This paper addresses key limitations of traditional steganographic methods, such as limited payload capacity, susceptibility to detection, and lack of robustness against attacks. A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder–decoder to enhance imperceptibility, robustness, and security. …”
Get full text
Article -
1763
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01“…As reliance on digital services grows, traditional password-based authentication methods have been increasingly scrutinized due to their susceptibility to cyber-attacks, including phishing and brute force attacks. …”
Get full text
Article -
1764
Effect of Sodium Sulfate Solution Coupled with Wetting–Drying Cycles on the Properties of Nano-Alumina-Modified Concrete
Published 2025-01-01“…The degradation of concrete caused by sulfate attack poses a significant challenge to its durability. …”
Get full text
Article -
1765
Prevalence of Provocative Seizures in Persons with Epilepsy: A Longitudinal Study at Khon Kaen University Hospital, Thailand
Published 2015-01-01“…Provocative factors are one causative factor of seizure attacks in persons with epilepsy (PWE). There are limited data of prevalence and major provocative factors in Asian populations. …”
Get full text
Article -
1766
EPN:encryption padding for NTRU with provable security
Published 2008-01-01“…Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved indistinguishable from adaptive chosen ciphertext attack by using the Game-Hopping technology in the random oracle model.Compared with present NAEP available,implement efficiency of EPN improves by 25%.…”
Get full text
Article -
1767
On the linear complexity of a new generalized cyclotomic sequence with length <sup>m</sup>over GF(h)
Published 2017-09-01“…Based on the Ding-generalized cyclotomy,a new class of generalized cyclotomic sequences with length p<sup>m</sup> over the finite field of power of odd prime order was constructed,and the sequence was balanced.The linear complexity of the sequences was determined using the relationship between h and p and the theory of polynomial over finite field.It is shown that the sequence has good linear complexity,and it can resist attacks from the application of the Berlekamp-Massey algorithm.…”
Get full text
Article -
1768
Application of security threat intelligence based on big data analysis in telecom operators
Published 2020-11-01“…As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.…”
Get full text
Article -
1769
Research status and outlook of Android security
Published 2016-10-01“…The following topics: the development course of Android version updates, the features of Android system, Android security mechanism, analysis of Android security risks, Android malware and attack, and the analysis and defense measures were covered. …”
Get full text
Article -
1770
IPv6 Dynamic Address Tunnel Model Based on the Sliding Address Window
Published 2015-10-01“…IPv6 network address hopping transmission technology can effectively prevent network attacks through traffic analysis.On the basis of the study of some related technologies,the concept of dynamic address chain was applied to the IPv6 network address hopping transmission technology and an IPv6 dynamic address tunnel model based on the sliding address window was proposed.The testing result and analysis show that the model can achieve the design goals.…”
Get full text
Article -
1771
Moya Moya Disease in a Child: A Case Report
Published 2011-01-01“…We report a case of 8-year-old female child who was admitted at our hospital with complaints of transient ischemic attacks and left-sided hemiparesis. On MR angiography, the child was diagnosed to have Moya Moya disease. …”
Get full text
Article -
1772
Improved integral distinguisher of Grøstl-512
Published 2012-07-01“…Firstly,the distinguisher of Grøstl-512 proposed by Minier in CANS 2010 was corrected.Then,the integral distinguisher of Grøstl-512 compression function was improved.By using the saturation technique new 11-round integral distinguishers of P function and Q function were proposed.Whereas the SHA-3 competition focuses the attacks of hash functions,the proposed analysis on integral distinguish reflect the randomness of the compression function,which is of great significance to design new hash function.…”
Get full text
Article -
1773
Trusted routing based on D-S evidence theory in wireless mesh network
Published 2011-01-01“…Combined with Dempster-Shafer(D-S) evidence theory,a trust evaluation model was given,meanwhile,a trusted routing——T-AODV was also proposed which built trusted routings according to the trustworthiness of nodes calculated by the proposed trust evaluation model.Simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks to some extent and improve the reliability,robustness and security of the over all network effectively.…”
Get full text
Article -
1774
Las coaliciones de izquierdas en Francia y España (1899-1939)
Published 2015-03-01“…Lefts Coalitions created by the Republicans, Radicals, Socialists and Communists in France and Spain, during the first four decades of the twentieth century, constituted an example of political action in defense of modernization and democratization against authoritarian attacks from conservative and totalitarian parties. …”
Get full text
Article -
1775
Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP)
Published 2025-02-01“…Furthermore, under a de-authentication attack, the model achieved an AUC score of 0.955 and a CA of 0.996. …”
Get full text
Article -
1776
CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism
Published 2024-12-01“…Additionally, the credibility incentive mechanism penalizes nodes that bypass probe mechanism and engage in malicious behaviors, effectively mitigating the impact of deceptive attacks. Experimental results show that CS-FL significantly improves the defense performance of FL, reducing attack success rates from 75–85% to below 5–20% when facing different types of threats, and effectively maintaining the training accuracy of the FL model. …”
Get full text
Article -
1777
Quand des pesticides empoisonnent la recherche, la réglementation et la démocratie :
Published 2021-05-01“…Gilles-Éric Seralini, a molecular biologist and university professor, subject of these persecutions which led him to file seven defamation lawsuits - all won - could have never suspected the scope and severity of these attacks whose main strings are revealed in this exceptional investigative account. …”
Get full text
Article -
1778
Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss
Published 2025-01-01“…Recent studies have revealed that even small-scale activities, like keyboard typing, can be sensed by attackers using Wi-Fi Channel State Information (CSI) as these devices become more common in commercial spaces. …”
Get full text
Article -
1779
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01“…The initial seed for inter-pixel diffusion is obtained from the hash of intra-pixel diffused images to resist chosen plain text and cipher text attacks. The efficiency of the developed medical image encryption algorithm is tested against various attack analyses. …”
Get full text
Article -
1780
Characteristics of public health emergencies in Jinhua City from 2014 to 2023
Published 2025-01-01“…There were 10 324 reported cases and 7 deaths, with an attack rate of 0.32%. There were 53 Ⅳ-level (19.20%) and 223 unclassified public health emergencies (80.80%). …”
Get full text
Article