Showing 161 - 180 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 161

    A Defense Approach of DAD Attack in Stateless Auto Configuration by Guangjia Song, Zhenzhou Ji, Hui Wang

    Published 2014-04-01
    “…WAY mechanism uses reverse address confirmation, self-declaration and WAY-table inspection to filter the spoofing packets, which make attackers' cost increase and cannot carry out secondary attack. …”
    Get full text
    Article
  2. 162
  3. 163

    Generalized Grad-CAM attacking method based on adversarial patch by Nianwen SI, Wenlin ZHANG, Dan QU, Heyu CHANG, Shengxiang LI, Tong NIU

    Published 2021-03-01
    “…To verify the fragility of the Grad-CAM, a Grad-CAM attack method based on adversarial patch was proposed.By adding a constraint to the Grad-CAM in the classification loss function, an adversarial patch could be optimized and the adversarial image could be synthesized.The adversarial image guided the Grad-CAM interpretation result towards the patch area while the classification result remains unchanged, so as to attack the interpretations.Meanwhile, through batch-training on the dataset and increasing perturbation norm constraint, the generalization and the multi-scene usability of the adversarial patch were improved.Experimental results on the ILSVRC2012 dataset show that compared with the existing methods, the proposed method can attack the interpretation results of the Grad-CAM more simply and effectively while maintaining the classification accuracy.…”
    Get full text
    Article
  4. 164

    Dental Trauma following Animal Attack: A Case Report by Meetkumar Dedania, Nimisha Shah, Sankalp Mahajan, Riddhi Thakkar

    Published 2025-01-01
    “…Animal attacks are a common cause of human injuries worldwide, with human-leopard encounters frequently reported in India. …”
    Get full text
    Article
  5. 165

    Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks by Wassim Znaidi, Marine Minier, Stéphane Ubéda

    Published 2013-04-01
    “…If no specific detection mechanisms are established, the attacker could lead many insidious attacks. In this work, we first introduce a new hierarchical distributed algorithm for detecting node replication attacks using a Bloom filter mechanism and a cluster head selection (see also Znaidi et al. (2009)). …”
    Get full text
    Article
  6. 166

    My Pine Is Under Attack—What Should I Do? by Jiri Hulcr

    Published 2016-05-01
    “… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
    Get full text
    Article
  7. 167

    Gender differentiation in tactical options in defense and attack on beach handball by Konstantinos Gkagkanas, Dimitris Hatzimanouil, Vasilis Skandalis

    Published 2018-12-01
    “…The aim of the study was to investigate and compare tactical options in both defense and attack between men and women. In 16 games from 2017 European Beach Handball Championship, 1074 attacks and defense situations were analyzed, in order to examine different attack and defense tactics. …”
    Get full text
    Article
  8. 168
  9. 169

    CAN bus flood attack detection based on communication characteristics by Yimu JI, Zhipeng JIAO, Shangdong LIU, Fei WU, Jing SUN, Na WANG, Zhiyu CHEN, Qiang BI, Penghao TIAN

    Published 2020-02-01
    “…CAN has become the most extensive fieldbus for contemporary automotive applications due to its outstanding reliability and flexibility.However,the standard CAN protocol does not provide sufficient security measures and is vulnerable to eavesdropping,replay,flooding,and denial of service attacks.In order to effectively detect whether the CAN bus is attacked,and to filter malicious messages when subjected to flooding attacks.The characteristics of vehicle CAN bus message communication were analyzed,and an intrusion detection method was proposed,which could effectively perform intrusion detection and malicious message filtering.Through experimental verification,the method can detect whether the CAN bus is attacked by 100%,and the accuracy of malicious packet filtering can reach over 99%.…”
    Get full text
    Article
  10. 170

    An Unusual Cause of Transient Ischemic Attack in a Patient with Pacemaker by Jagadeesh Kumar Kalavakunta, Vishal Gupta, Basil Paulus, William Lapenna

    Published 2014-01-01
    “…We present a 77-year-old man with history of atrial fibrillation and pacemaker placement who was admitted for transient ischemic attack. He was on aspirin, beta blocker, and warfarin with subtherapeutic international normalized ratio. …”
    Get full text
    Article
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176

    Real-time DDoS attack detection based on deep learning by Chuanhuang LI, Zhengjun SUN, Xiaoyong YUAN, Xiaolin LI, Liang GONG, Weiming WANG

    Published 2017-07-01
    “…Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method included two stages:feature processing and model detection:feature extraction,format conversion and dimension reconstruction of the input data packet was performed in feature processing stage;in the model detection stage,the processed features were input to the depth learning network model to detect whether the input data packets was DDoS attack packet.The model was trained by the ISCX2012 dataset,and the model was validated by real-time DDoS attack.The experimental results show that DDoS attack detection method based on deep learning has high detection precision,little dependency on hardware and software equipment,and the model of depth learning network is easy to update.…”
    Get full text
    Article
  17. 177
  18. 178

    Importance of Video-EEG Monitoring in the Diagnosis of Refractory Panic Attacks by Batool F. Kirmani, Diana Mungall

    Published 2013-01-01
    “…Partial seizures can be misdiagnosed as panic attacks. There is considerable overlap of symptoms between temporal lobe seizures and panic attacks making the diagnosis extremely challenging. …”
    Get full text
    Article
  19. 179
  20. 180

    Exploiting statistical effective fault attack in a blind setting by Navid Vafaei, Hadi Soleimany, Nasour Bagheri

    Published 2023-07-01
    “…A combination of fault and power attacks can circumvent typical countermeasures in this setting, for example, Fault Template Attack (FTA). …”
    Get full text
    Article