Showing 1,821 - 1,840 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1821

    Fuzzy trust model for wireless sensor networks with intrusion tolerance by WANG Liang-min1, GUO Yuan-bo2, ZHAN Yong-zhao1

    Published 2010-01-01
    “…To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.…”
    Get full text
    Article
  2. 1822

    Location privacy preservation approach towards to content sharing on mobile online social network by Chao LI, Li-hua YIN, Kui GENG, Bin-xing FANG

    Published 2016-11-01
    “…A k-anonymity privacy algorithm for privacy settings was given to protect against inference attack on a content sharing service provider server. …”
    Get full text
    Article
  3. 1823

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  4. 1824

    Attribute-based encryption schema with group signatures by Xinglan ZHANG, Yao CUI

    Published 2019-02-01
    “…Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.…”
    Get full text
    Article
  5. 1825

    Les risques du journalisme dans les conflits armés by Aimé-Jules Bizimana

    Published 2006-11-01
    “…The resurgence of attacks on the security of journalists during the recent conflict in Iraq opened a debate on the conditions under which the profession can be exercised in situations of armed conflict. …”
    Get full text
    Article
  6. 1826

    Southern Green Stink Bug, Nezara viridula (Linnaeus) (Insecta: Hemiptera: Pentatomidae) by Jason M. Squitier

    Published 2011-01-01
    “…It describes this shield-shaped polyphagous feeder that attacks many important food crops — distribution, description, life cycle, damage action threshold, and management. …”
    Get full text
    Article
  7. 1827

    Research on location privacy in mobile internet by Yu-hang WANG, Hong-li ZHANG, Xiang-zhan YU

    Published 2015-09-01
    “…The related researches on location privacy in mobile internet were surveyed comprehensively,dissertate sepa-rately from the perspective of LBS(location-based services) and location service.First the privacy protection approaches for LBS were detailed,their features in the view of privacy attacks and LBS applicability were researched.Then the es-sence and research boundary of location privacy in location service were demonstrated,its related research progress and policies were introduced.The future research directions are provided in the end.…”
    Get full text
    Article
  8. 1828

    Numerical investigation on heat transfer and flow mechanism in microchannel heat sink having V shape ribs by Naushad Ali, Injamamul Haque, Tabish Alam, Tauseef Uddin Siddiqui, Mushtaq Ahmad Ansari, Jagmohan Yadav, Shivam Srivastava, Erdem Cuce, Intesaaf Ashraf, Dan Dobrotă

    Published 2025-01-01
    “…This research comprehensively examines the influence of the V-shaped rib angle of attack on the thermal and hydraulic efficacy of microchannel heat sinks (MCHS), employing Computational Fluid Dynamics (CFD) simulations over Reynolds numbers ranging from 100 to 900. …”
    Get full text
    Article
  9. 1829

    Diagnostics of chronic small intestinal obstruction in patient with ectopic pancreas in the Meckel's diverticulum (case report) by Zinaida A. Lemeshko, O. S. Shifrin, A. V. Korolev, T. L. Lemina, I. A. Sokolina, A. Ye. Leonovich, K. A. Lesko, A. S. Tertychny, V. T. Ivashkin

    Published 2016-08-01
    “…Episodes of intussusception manifested clinically by attacks of severe right iliac pain that made patient to take «embryonic posture». …”
    Get full text
    Article
  10. 1830
  11. 1831

    Multi-stakeholder identification and prioritization of human–tiger conflict reduction measures in Chitwan National Park, Nepal by Rajendra Dhungana, Tek Maraseni, Benjamin L. Allen, Ram Chandra Kandel, Pashupati Nath Koirala, Ganesh Pant, Rishi Ranabhat

    Published 2024-09-01
    “…The identification and implementation of conflict reduction measures are necessary to reduce predator attacks on people and livestock and to minimize human encroachment into predator habitats. …”
    Get full text
    Article
  12. 1832

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. …”
    Get full text
    Article
  13. 1833

    SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things by Mimonah Al Qathrady, Safi Ullah, Mohammed S. Alshehri, Jawad Ahmad, Sultan Almakdi, Samar M. Alqhtani, Muazzam A. Khan, Baraq Ghaleb

    Published 2024-12-01
    “…These datasets encompassed the behaviours of contemporary IIoT communication protocols, the operations of state‐of‐the‐art devices, various attack types, and diverse attack scenarios.…”
    Get full text
    Article
  14. 1834
  15. 1835

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, Mohamed Abdallah, Hamid Menouar, Saif Al-Kuwari, Ala Al-Fuqaha

    Published 2024-01-01
    “…This survey paper offers an in-depth examination of advanced machine learning (ML) and deep learning (DL) approaches employed in developing sophisticated IDS for safeguarding IVNs against potential cyber-attacks. Specifically, we focus on the Controller Area Network (CAN) protocol, which is prevalent in in-vehicle communication systems, yet exhibits inherent security vulnerabilities. …”
    Get full text
    Article
  16. 1836

    Smart Home Security: An Efficient Multi-Factor Authentication Protocol by Ghazaleh Sarbishaei, Amir Masoud Aminian Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari

    Published 2024-01-01
    “…Furthermore, physical attacks can be prevented with the use of Physical Unclonable Function (PUF) chips. …”
    Get full text
    Article
  17. 1837

    (Pyridin-2-ylmethyl)porphyrins: synthesis, characterization and C–N oxidative fusion attempts by Berthelot, Mathieu, Echaubard, Julie, Bousfiha, Asmae, Devillers, Charles H.

    Published 2024-06-01
    “…A new route for the synthesis of meso-(pyridin-2-ylmethyl)porphyrins was developed, based on the nucleophilic attack of (pyridin-2-ylmethyl)lithium reagent on a porphyrin bearing one free meso position. …”
    Get full text
    Article
  18. 1838

    Provably secure certificate less blind proxy re-signatures by Tao FENG, Yi-xin LIANG

    Published 2012-09-01
    “…Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme.While achieving message privacy features of the proxy signature conversion.Based on the difficulty of NGBH and Many-NGBH problem,It proves that the new scheme can resist forgery attack characteristics.The scheme satisfies security properties:correctness and message blindness.…”
    Get full text
    Article
  19. 1839

    تشریعات الملکیة الفکریة فى حمایة البرمجیات فى الجمهوریة الیمنیة :دراسة میدانیة by د. فاطمة ابراهیم خمیس

    Published 2016-07-01
    “…This study deals with the legislation on intellectual property rights inthe Republic of Yemen, with a focus on the development of legislation toprotect software, and the position of the Republic of Yemen of internationalconventions relating to the protection of intellectual property rights .This,as well as to identify the types of software that guaranteed by the Yemenilaw protection, And pictures of the attack on the Rights of the author insoftware, And what are the penalties, In addition the paper try todetermining the bodies responsible for the protection of copyright . …”
    Get full text
    Article
  20. 1840

    Redbay Ambrosia Beetle-Laurel Wilt Pathogen: A Potential Major Problem for the Florida Avocado Industry by Jonathan H. Crane, Jorge E. Peña, J. L. Osborne

    Published 2008-02-01
    “…Osborne, describes this insect-fungal pest attacking woody plants in the laurel family, including avocado. …”
    Get full text
    Article