Showing 1,761 - 1,780 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1761

    EScope: Effective Event Validation for IoT Systems Based on State Correlation by Jian Mao, Xiaohe Xu, Qixiao Lin, Liran Ma, Jianwei Liu

    Published 2023-06-01
    “…Sensing fake event notifications injected by attackers (called event spoofing attack) can trigger sensitive actions through automation rules without involving authorized users. …”
    Get full text
    Article
  2. 1762

    A deep learning-driven multi-layered steganographic approach for enhanced data security by Yousef Sanjalawe, Salam Al-E’mari, Salam Fraihat, Mosleh Abualhaj, Emran Alzubi

    Published 2025-02-01
    “…This paper addresses key limitations of traditional steganographic methods, such as limited payload capacity, susceptibility to detection, and lack of robustness against attacks. A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder–decoder to enhance imperceptibility, robustness, and security. …”
    Get full text
    Article
  3. 1763

    Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity by Mohd Imran Md Yusop, Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Mohammad Kamrul Hasan

    Published 2025-01-01
    “…As reliance on digital services grows, traditional password-based authentication methods have been increasingly scrutinized due to their susceptibility to cyber-attacks, including phishing and brute force attacks. …”
    Get full text
    Article
  4. 1764

    Effect of Sodium Sulfate Solution Coupled with Wetting–Drying Cycles on the Properties of Nano-Alumina-Modified Concrete by Kai Gao, Dun Chen, Chunqing Li, Guoyu Li, Yuncheng Mao, Xuyang Wu, Anshuang Su, Hang Zhang, Xu Wang

    Published 2025-01-01
    “…The degradation of concrete caused by sulfate attack poses a significant challenge to its durability. …”
    Get full text
    Article
  5. 1765

    Prevalence of Provocative Seizures in Persons with Epilepsy: A Longitudinal Study at Khon Kaen University Hospital, Thailand by Nutthaya Vongkasamchai, Sunee Lertsinudom, Acharawan Topark-Ngarm, Udomlack Peansukwech, Kittisak Sawanyawisuth, Somsak Tiamkao, Integrated Epilepsy Research Group

    Published 2015-01-01
    “…Provocative factors are one causative factor of seizure attacks in persons with epilepsy (PWE). There are limited data of prevalence and major provocative factors in Asian populations. …”
    Get full text
    Article
  6. 1766

    EPN:encryption padding for NTRU with provable security by MU Ning-bo, HU Yu-pu, WANG Bao-cang

    Published 2008-01-01
    “…Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved indistinguishable from adaptive chosen ciphertext attack by using the Game-Hopping technology in the random oracle model.Compared with present NAEP available,implement efficiency of EPN improves by 25%.…”
    Get full text
    Article
  7. 1767

    On the linear complexity of a new generalized cyclotomic sequence with length <sup>m</sup>over GF(h) by Long-fei LIU, Kai YANG, Xiao-yuan YANG

    Published 2017-09-01
    “…Based on the Ding-generalized cyclotomy,a new class of generalized cyclotomic sequences with length p<sup>m</sup> over the finite field of power of odd prime order was constructed,and the sequence was balanced.The linear complexity of the sequences was determined using the relationship between h and p and the theory of polynomial over finite field.It is shown that the sequence has good linear complexity,and it can resist attacks from the application of the Berlekamp-Massey algorithm.…”
    Get full text
    Article
  8. 1768

    Application of security threat intelligence based on big data analysis in telecom operators by Mingxia BO, Hongyu TANG, Chen MA, Jian ZHANG

    Published 2020-11-01
    “…As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.…”
    Get full text
    Article
  9. 1769

    Research status and outlook of Android security by Sihan QING

    Published 2016-10-01
    “…The following topics: the development course of Android version updates, the features of Android system, Android security mechanism, analysis of Android security risks, Android malware and attack, and the analysis and defense measures were covered. …”
    Get full text
    Article
  10. 1770

    IPv6 Dynamic Address Tunnel Model Based on the Sliding Address Window by Zichuan Ma, Xiaohong Huang, Shen Yan, Pei Zhang

    Published 2015-10-01
    “…IPv6 network address hopping transmission technology can effectively prevent network attacks through traffic analysis.On the basis of the study of some related technologies,the concept of dynamic address chain was applied to the IPv6 network address hopping transmission technology and an IPv6 dynamic address tunnel model based on the sliding address window was proposed.The testing result and analysis show that the model can achieve the design goals.…”
    Get full text
    Article
  11. 1771

    Moya Moya Disease in a Child: A Case Report by Jagdish P. Goyal, Sanjeev S. Rao, Sangita Trivedi

    Published 2011-01-01
    “…We report a case of 8-year-old female child who was admitted at our hospital with complaints of transient ischemic attacks and left-sided hemiparesis. On MR angiography, the child was diagnosed to have Moya Moya disease. …”
    Get full text
    Article
  12. 1772

    Improved integral distinguisher of Grøstl-512 by Ming MAO, Zhi-guang QIN, Yan-jun LI

    Published 2012-07-01
    “…Firstly,the distinguisher of Grøstl-512 proposed by Minier in CANS 2010 was corrected.Then,the integral distinguisher of Grøstl-512 compression function was improved.By using the saturation technique new 11-round integral distinguishers of P function and Q function were proposed.Whereas the SHA-3 competition focuses the attacks of hash functions,the proposed analysis on integral distinguish reflect the randomness of the compression function,which is of great significance to design new hash function.…”
    Get full text
    Article
  13. 1773

    Trusted routing based on D-S evidence theory in wireless mesh network by YANG Kai, MA Jian-feng, YANG Chao

    Published 2011-01-01
    “…Combined with Dempster-Shafer(D-S) evidence theory,a trust evaluation model was given,meanwhile,a trusted routing——T-AODV was also proposed which built trusted routings according to the trustworthiness of nodes calculated by the proposed trust evaluation model.Simulation results show that the proposed scheme can detect and isolate malicious nodes efficiently and resist attacks to some extent and improve the reliability,robustness and security of the over all network effectively.…”
    Get full text
    Article
  14. 1774

    Las coaliciones de izquierdas en Francia y España (1899-1939) by Antonio Robles Egea

    Published 2015-03-01
    “…Lefts Coalitions created by the Republicans, Radicals, Socialists and Communists in France and Spain, during the first four decades of the twentieth century, constituted an example of political action in defense of modernization and democratization against authoritarian attacks from conservative and totalitarian parties. …”
    Get full text
    Article
  15. 1775

    Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP) by Diki Arisandi, Nazrul M. Ahmad, Subarmaniam Kannan

    Published 2025-02-01
    “…Furthermore, under a de-authentication attack, the model achieved an AUC score of 0.955 and a CA of 0.996. …”
    Get full text
    Article
  16. 1776

    CS-FL: Cross-Zone Secure Federated Learning with Blockchain and a Credibility Mechanism by Chongzhen Zhang, Hongye Sun, Zhaoyu Shen, Dongyu Wang

    Published 2024-12-01
    “…Additionally, the credibility incentive mechanism penalizes nodes that bypass probe mechanism and engage in malicious behaviors, effectively mitigating the impact of deceptive attacks. Experimental results show that CS-FL significantly improves the defense performance of FL, reducing attack success rates from 75–85% to below 5–20% when facing different types of threats, and effectively maintaining the training accuracy of the FL model. …”
    Get full text
    Article
  17. 1777

    Quand des pesticides empoisonnent la recherche, la réglementation et la démocratie : by Louise Vandelac

    Published 2021-05-01
    “…Gilles-Éric Seralini, a molecular biologist and university professor, subject of these persecutions which led him to file seven defamation lawsuits - all won - could have never suspected the scope and severity of these attacks whose main strings are revealed in this exceptional investigative account. …”
    Get full text
    Article
  18. 1778

    Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss by Aryan Sharma, Haoming Wang, Deepak Mishra, Aruna Seneviratne

    Published 2025-01-01
    “…Recent studies have revealed that even small-scale activities, like keyboard typing, can be sensed by attackers using Wi-Fi Channel State Information (CSI) as these devices become more common in commercial spaces. …”
    Get full text
    Article
  19. 1779

    An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework by Dhivya Ravichandran, W. Sylvia Lilly Jebarani, Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, Padmapriya Pravinkumar, Rengarajan Amirtharajan

    Published 2025-02-01
    “…The initial seed for inter-pixel diffusion is obtained from the hash of intra-pixel diffused images to resist chosen plain text and cipher text attacks. The efficiency of the developed medical image encryption algorithm is tested against various attack analyses. …”
    Get full text
    Article
  20. 1780

    Characteristics of public health emergencies in Jinhua City from 2014 to 2023 by ZHANG Tao, DU Zhiping, WANG Zuoyi, JIN Lühua

    Published 2025-01-01
    “…There were 10 324 reported cases and 7 deaths, with an attack rate of 0.32%. There were 53 Ⅳ-level (19.20%) and 223 unclassified public health emergencies (80.80%). …”
    Get full text
    Article