-
1821
Fuzzy trust model for wireless sensor networks with intrusion tolerance
Published 2010-01-01“…To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.…”
Get full text
Article -
1822
Location privacy preservation approach towards to content sharing on mobile online social network
Published 2016-11-01“…A k-anonymity privacy algorithm for privacy settings was given to protect against inference attack on a content sharing service provider server. …”
Get full text
Article -
1823
RAP detection method based on AP fingerprint
Published 2018-05-01“…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
Get full text
Article -
1824
Attribute-based encryption schema with group signatures
Published 2019-02-01“…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
Get full text
Article -
1825
Les risques du journalisme dans les conflits armés
Published 2006-11-01“…The resurgence of attacks on the security of journalists during the recent conflict in Iraq opened a debate on the conditions under which the profession can be exercised in situations of armed conflict. …”
Get full text
Article -
1826
Southern Green Stink Bug, Nezara viridula (Linnaeus) (Insecta: Hemiptera: Pentatomidae)
Published 2011-01-01“…It describes this shield-shaped polyphagous feeder that attacks many important food crops — distribution, description, life cycle, damage action threshold, and management. …”
Get full text
Article -
1827
Research on location privacy in mobile internet
Published 2015-09-01“…The related researches on location privacy in mobile internet were surveyed comprehensively,dissertate sepa-rately from the perspective of LBS(location-based services) and location service.First the privacy protection approaches for LBS were detailed,their features in the view of privacy attacks and LBS applicability were researched.Then the es-sence and research boundary of location privacy in location service were demonstrated,its related research progress and policies were introduced.The future research directions are provided in the end.…”
Get full text
Article -
1828
Numerical investigation on heat transfer and flow mechanism in microchannel heat sink having V shape ribs
Published 2025-01-01“…This research comprehensively examines the influence of the V-shaped rib angle of attack on the thermal and hydraulic efficacy of microchannel heat sinks (MCHS), employing Computational Fluid Dynamics (CFD) simulations over Reynolds numbers ranging from 100 to 900. …”
Get full text
Article -
1829
Diagnostics of chronic small intestinal obstruction in patient with ectopic pancreas in the Meckel's diverticulum (case report)
Published 2016-08-01“…Episodes of intussusception manifested clinically by attacks of severe right iliac pain that made patient to take «embryonic posture». …”
Get full text
Article -
1830
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems
Published 2025-01-01“…This RL component assesses optimal attack strategies based on previously learned data and dynamically explores additional attack vectors. …”
Get full text
Article -
1831
Multi-stakeholder identification and prioritization of human–tiger conflict reduction measures in Chitwan National Park, Nepal
Published 2024-09-01“…The identification and implementation of conflict reduction measures are necessary to reduce predator attacks on people and livestock and to minimize human encroachment into predator habitats. …”
Get full text
Article -
1832
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. …”
Get full text
Article -
1833
SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things
Published 2024-12-01“…These datasets encompassed the behaviours of contemporary IIoT communication protocols, the operations of state‐of‐the‐art devices, various attack types, and diverse attack scenarios.…”
Get full text
Article -
1834
Phytochemical and Antioxidant Dynamics of the Soursop Fruit (Annona muricata L.) in response to Colletotrichum spp.
Published 2020-01-01“…Even so, soursop fruits showed higher susceptibility to C. gloeosporioides and higher sensitivity to the attack of C. siamense.…”
Get full text
Article -
1835
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024-01-01“…This survey paper offers an in-depth examination of advanced machine learning (ML) and deep learning (DL) approaches employed in developing sophisticated IDS for safeguarding IVNs against potential cyber-attacks. Specifically, we focus on the Controller Area Network (CAN) protocol, which is prevalent in in-vehicle communication systems, yet exhibits inherent security vulnerabilities. …”
Get full text
Article -
1836
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01“…Furthermore, physical attacks can be prevented with the use of Physical Unclonable Function (PUF) chips. …”
Get full text
Article -
1837
(Pyridin-2-ylmethyl)porphyrins: synthesis, characterization and C–N oxidative fusion attempts
Published 2024-06-01“…A new route for the synthesis of meso-(pyridin-2-ylmethyl)porphyrins was developed, based on the nucleophilic attack of (pyridin-2-ylmethyl)lithium reagent on a porphyrin bearing one free meso position. …”
Get full text
Article -
1838
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01“…Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme.While achieving message privacy features of the proxy signature conversion.Based on the difficulty of NGBH and Many-NGBH problem,It proves that the new scheme can resist forgery attack characteristics.The scheme satisfies security properties:correctness and message blindness.…”
Get full text
Article -
1839
تشریعات الملکیة الفکریة فى حمایة البرمجیات فى الجمهوریة الیمنیة :دراسة میدانیة
Published 2016-07-01“…This study deals with the legislation on intellectual property rights inthe Republic of Yemen, with a focus on the development of legislation toprotect software, and the position of the Republic of Yemen of internationalconventions relating to the protection of intellectual property rights .This,as well as to identify the types of software that guaranteed by the Yemenilaw protection, And pictures of the attack on the Rights of the author insoftware, And what are the penalties, In addition the paper try todetermining the bodies responsible for the protection of copyright . …”
Get full text
Article -
1840
Redbay Ambrosia Beetle-Laurel Wilt Pathogen: A Potential Major Problem for the Florida Avocado Industry
Published 2008-02-01“…Osborne, describes this insect-fungal pest attacking woody plants in the laurel family, including avocado. …”
Get full text
Article