Showing 1,781 - 1,800 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1781

    Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems by Warren Grice, Mohammed Olama, Annabelle Lee, Philip G. Evans

    Published 2025-01-01
    “…Unfortunately, the increased information flow will increase the potential attack surface and introduce new vulnerabilities. …”
    Get full text
    Article
  2. 1782

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…It is also shown to withstand typical smart city threats such as side‐channeling, offline guessing, session key disclosure, eavesdropping, session hijacking, privileged insider, and impersonation attacks. Moreover, comparative performance shows that it incurs the lowest energy and computation costs at relatively low communication overheads.…”
    Get full text
    Article
  3. 1783

    Design and Aerodynamic Analysis of a Flapping Mechanism for Foldable Biomimetic Aircraft by Shuai Yan, Yongjun Zhou, Shuxia Jiang, Hao Xue, Pengcheng Guo

    Published 2025-01-01
    “…Using 3D simulations and CFD analysis, key parameters—including initial angle of attack, aspect ratio, flapping frequency, and flapping speed—were optimized. …”
    Get full text
    Article
  4. 1784

    Modeling predicts facile release of nitrite but not nitric oxide from the thionitrate CH3SNO2 with relevance to nitroglycerin bioactivation by Vinod Parmar, Esam A. Orabi, Ann M. English, Gilles H. Peslherbe

    Published 2024-12-01
    “…Dramatically lower barriers (ΔH ‡ calc ~ 17–21 kcal/mol) control NO2 − release from CH3SNO2 by gas-phase hydrolysis or nucleophilic attack by OH− or CH3S− on the sulfur atom within the C–S–NO2 molecular plane. …”
    Get full text
    Article
  5. 1785

    Computational aerodynamic studies of the MIBC “Moscow-City” complex during sequential construction of buildings by S. G. Saiyan, A. M. Efimova

    Published 2024-06-01
    “…It draws conclusions on the mutual influence of high-rise buildings and identifies the wind attack angles that contribute to the maximum values of the average and pulsation components of the wind action.Materials and methods. …”
    Get full text
    Article
  6. 1786

    New optical coherence tomography biomarker for diagnosis of acute optic neuritis in multiple sclerosis by Hend Mohammed Safwat, Sanaa Ahmed Mohamed, Ahmed Hassan Elsheshiny

    Published 2025-02-01
    “…Objectives: Is imaging of retrolaminar optic nerve, during attack of acute optic neuritis in multiple sclerosis valuable? …”
    Get full text
    Article
  7. 1787

    THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE by Vladyslav Horulko

    Published 2024-05-01
    “…In the vast majority of countries, there is a constant trend towards a significant increase in the number and expansion of the spectrum of cyber-attacks with the aim of violating the confidentiality, integrity and availability of state information resources, in particular those distributed on the Internet and objects of critical information infrastructure. …”
    Get full text
    Article
  8. 1788

    Contaminated Pond Water Favors Cholera Outbreak at Haibatpur Village, Purba Medinipur District, West Bengal, India by Dilip Kumar Biswas, Rama Bhunia, Dipankar Maji, Palash Das

    Published 2014-01-01
    “…Forty-one cases of patients were identified with overall attack rate (AR) was 5% (41/780). AR among men was higher 6% (25/404) than women. …”
    Get full text
    Article
  9. 1789

    Modern air defense methods and countermeasures for use in operational-tactical missiles by Mykola Bondarenko, Mykhailo Vorobei

    Published 2024-06-01
    “…Analysis extends to hypothetical attack scenarios on strategically vital installations, considering the deployment of military units equipped with radar systems, air defense forces, and aviation resources. …”
    Get full text
    Article
  10. 1790

    Post-quantum encryption technology based on BRLWE for internet of things by Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN

    Published 2022-10-01
    “…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
    Get full text
    Article
  11. 1791

    Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles by Zulqarnain H. Khattak, Brian L. Smith, Michael D. Fontaine

    Published 2024-01-01
    “…This is comparable to the base case without attacks. The findings have implications for the design of future resilient systems.…”
    Get full text
    Article
  12. 1792

    High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function by Medien Zeghid, Hassan Yousif Ahmed, Akhtar Nawaz Khan

    Published 2025-01-01
    “…Thereafter, by applying chaos theory to address the limitations of default cipher parameters, and operating modes and to control S-boxes, permutation functions, key schedules, data masking, we introduce nonlinearity and diffusion, making the block ciphers more resistant to attacks. Through extensive simulations and evaluations, we demonstrate the effectiveness of our approach in strengthening the security of the enhanced ciphers against pattern, statistical, differential, key sensitivity, Linear, and Padding Oracle attacks. …”
    Get full text
    Article
  13. 1793

    A Longitudinal Comparison of the Recovery Patterns of Optic Neuritis with MOG Antibody-Seropositive and AQP4 Antibody-Seropositive or -Seronegative for Both Antibodies by Lin Zhou, Xiao Tan, Ling Wang, Xiujuan Zhao, Wei Qiu, Hui Yang

    Published 2022-01-01
    “…In this study, the aim is to compare the recovery pattern among patients with acute myelin oligodendrocyte glycoprotein antibody-seropositive optic neuritis (MOG-Ab + ON) attacks and aquaporin-4 antibody-seropositive ON (AQP4-Ab + ON) or -seronegative ON. …”
    Get full text
    Article
  14. 1794

    The Most Important Risk Factors Among Angina Patients in Thi-Qar Governorate in Iraq by Amel Mustafa Kamil, Mohammed Munis Dakheel, Tehsen Ali Kadhem

    Published 2021-06-01
    “…It may occur as an angina attack that typically lasts from 1 to 15 minutes; however, angina is not only a disorder, but is also a symptom of heart disease.  …”
    Get full text
    Article
  15. 1795

    Dual medical image watermarking using SRU-enhanced network and EICC chaotic map by Fei Yan, Zeqian Wang, Kaoru Hirota

    Published 2024-12-01
    “…Moreover, it displays strong resilience against various attacks, particularly high-strength common and geometric attacks, maintaining an NC value above 0.84, which confirms its robustness. …”
    Get full text
    Article
  16. 1796

    GuardianMPC: Backdoor-Resilient Neural Network Computation by Mohammad Hashemi, Domenic Forte, Fatemeh Ganji

    Published 2025-01-01
    “…To ensure resilience against such backdoor attacks, this work presents GuardianMPC, a novel framework leveraging secure multiparty computation (MPC). …”
    Get full text
    Article
  17. 1797

    Survey on RDMA protocol applications and security protection technologies by LIU Yumeng, TANG Zhengliang, LU Songfeng, ZHU Jianxin, LIU Yunqu

    Published 2024-04-01
    “…Finally, improvement plans and prospects for technological optimization in the RDMA attack and defense field were proposed.…”
    Get full text
    Article
  18. 1798

    A novel method for developing post-quantum cryptoschemes and a practical signature algorithm by Nikolay Andreevich Moldovyan, Dmitriy Nikolaevich Moldovyan

    Published 2025-01-01
    “…Due to such design, the said generators are kept in secret, providing resistance to quantum attacks. Two new finite commutative associative algebras, multiplicative group of which possesses four-dimensional cyclicity, have been proposed as a suitable algebraic support. …”
    Get full text
    Article
  19. 1799

    GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT by Oleksii Dotsenko, Marko Zelenskyi

    Published 2023-12-01
    “…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
    Get full text
    Article
  20. 1800

    Coda: Reading Duncan Reading Stein by Steve McCaffery

    Published 2020-12-01
    “…Most significantly we note emerging a germinal Poetics of Incoherence and Disintegration, and a wholesale attack on grammatical order that aligns both Stein and Duncan himself with the avant-garde trajectories of Hugo Ball’s “poetry without words” and Marinetti’s “words in freedom.”…”
    Get full text
    Article