Showing 1,861 - 1,880 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 1861

    BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System by Giovanni Battista Gaggero, Alessandro Armellin, Giulio Ferro, Michela Robba, Paola Girdinio, Mario Marchese

    Published 2024-01-01
    “…In this context, there is a need to develop datasets of attacks on these systems to evaluate the risks and allow researchers to develop proper monitoring algorithms. …”
    Get full text
    Article
  2. 1862

    Influence of the Chemical Composition in the Electrochemical Response of Permanent Magnets by S. Godavarthi, J. Porcayo-Calderon, E. Vazquez-Velez, M. Casales-Diaz, D. M. Ortega-Toledo, L. Martinez-Gomez

    Published 2015-01-01
    “…Analysis by scanning electron microscopy has shown that pitting attack is the main mode of degradation of the magnets, while Co addition reduces it and Pr addition increases it.…”
    Get full text
    Article
  3. 1863

    Trustworthy identity system based on IPv6 source address validation by Duan-qi ZHOU, Jun BI, Guang YAO

    Published 2014-10-01
    “…In the Internet,there are no mechanisms to verify the identity of a message sender,resulting in a large number of forged identity attacks,such as phishing websites.By mapping the user identity into the rightmost 64 bit of the IPv6 address,this paper tries to make every message embedded with an identity,which lay a credible foundation for communications on the Internet.We design and realize a true identity communication system based on source address validation improvement,which can protect the privacy of the users,and ensure the verifiability and authenticity of the user identities.…”
    Get full text
    Article
  4. 1864

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    “…Methodological advances in combinatorics and mathematics play a vital role in artificial intelligence and machine learning for data analysis and artificial intelligence-based cybersecurity for protection of the computing systems, devices, networks, programs and data from cyber-attacks. In connection with these ideas, this article is prepared for applications in computing science and cybersecurity. …”
    Get full text
    Article
  5. 1865

    Adaptive security architecture defense platform based on software defined security by Mengyao LU, Hongyu TANG, Wei TANG, Jian ZHANG

    Published 2020-12-01
    “…Based on continuous monitoring and retrospective analysis,adaptive security architecture was constructed to be security defense system integrating prevention,detection,response and prediction,which possesses intelligent and elastic defense ability concerning about advanced directive attacks.An essential implementable adaptive security defense platform was therefore introduced and applied correspondingly according to a thorough research of adaptive security architecture and software defined security,combined with internet security environment.Besides,website application security issues were also analyzed.…”
    Get full text
    Article
  6. 1866

    Research of survivability enhancement algorithm based on autonomous configuration by ZHANG Le-jun1, ZHOU Yuan2, GUO Lin1, WANG Wei1, YANG Yong-tian1

    Published 2007-01-01
    “…Based on redundancy and diversity,the method of enhancing system survivability was proposed by dynami-cally configuring atomic modules.According to the history average response time,survivability curves were drawn.The autonomous configuration algorithm was designed based on the survivability of atomic modules,system efficiency and quality of service.The contrast experiment validated the algorithm’s correctness and validity in the condition of atomic modules have different failure rate.The simulation confirmed that this algorithm can enhance the service survivability when atomic module under attack or be ageing…”
    Get full text
    Article
  7. 1867
  8. 1868

    Security Analysis in Wireless Sensor Networks by Murat Dener

    Published 2014-10-01
    “…The paper also presents characteristics, security requirements, attacks, encryption algorithms, and operation modes. …”
    Get full text
    Article
  9. 1869

    Inflation Outlook — The Costs of War drive prices up to new heights by Johannes Mayr

    Published 2022-03-01
    “…Abstract The Russian government’s attack on Ukraine and the spiral of sanctions that has been set in motion have heightened inflationary pressure — especially in Europe. …”
    Get full text
    Article
  10. 1870

    Whiteflies on Landscape Ornamentals by Eileen A. Buss

    Published 2013-04-01
    “…The most frequently attacked plants include allamanda, avocado, chinaberry, citrus, fig, fringe tree, gardenia, gumbo limbo, ligustrum, mango, various palms, persimmon, viburnum, and many annuals. …”
    Get full text
    Article
  11. 1871

    POSTMODERNISM AND POSITIVISM by Evaldas Nekrašas

    Published 1998-01-01
    “… Positivism is a favorite object of postmodernist attacks. With an interesting exception, namely Hume, it is regarded by postmodernists as an embodiment of everything what is the worst in the Spirit of Enlightenment: its emphasis on wholeness, unity, and unequivocalness of knowledge. …”
    Get full text
    Article
  12. 1872

    Gambaran Faktor yang Berhubungan dengan Timbulnya Kejang Demam Berulang pada Pasien yang Berobat di Poliklinik Anak RS. DR. M. Djamil Padang Periode Januari 2010 – Desember 2012 by Vivit Erdina Yunita, Afdal Afdal, Iskandar Syarif

    Published 2016-09-01
    “…It was found that most patients who develop recurrent febrile seizures had their first attack in age of 11 – 20 months old (47.5%), female sex (62.5%), had febrile seizure family history (72.5%), had no epilepsy family history (97.5%), and had simple febrile seizure on their first attack (60%). …”
    Get full text
    Article
  13. 1873

    Identifikasi Dan Pengendalian Hama Tanaman Jambu Air Dengan Pendekatan Case Based Reasoning Berbasiskan Sistem Pakar by Dasril Aldo

    Published 2023-07-01
    “…Several pests can attack water guava plants, including Pests Bactrocera spp, Pests Pagodiella hekmeyeri, Pests Attacus atlas L, Pests Phenacoccus manihoti, Pests Liriomyza sp, Pests Leptocorisa oratorius, and Pests Mites. …”
    Get full text
    Article
  14. 1874

    Novel Derivatives of Phenylisoxazole-3/5-Carbaldehyde Semicarbazone: Synthesis, Characterization, and Computational Studies by Fernando Carrasco, Wilfredo Hernández, Oscar Chupayo, Rodolfo Pumachagua, Evgenia Spodine, Jackeline Mosquera, Olivio N. Castro, Jesus M. Rodilla, Celedonio M. Álvarez, Juan Z. Dávalos

    Published 2024-01-01
    “…The MEP descriptors indicate that the oxygen atom of the carbonyl group C=O is susceptible to electrophilic attack, while the hydrogen atoms of the amide and hydrazone fragments are sensitive to nucleophilic attack. …”
    Get full text
    Article
  15. 1875

    Intrusion detection in metaverse environment internet of things systems by metaheuristics tuned two level framework by Milos Antonijevic, Miodrag Zivkovic, Milica Djuric Jovicic, Bosko Nikolic, Jasmina Perisic, Marina Milovanovic, Luka Jovanovic, Mahmoud Abdel-Salam, Nebojsa Bacanin

    Published 2025-01-01
    “…A two-leveled architecture was designed to manage intricate data, enabling the detection and classification of attacks within IoT networks. A thorough analysis utilizing a real-world IoT network attacks dataset validates the proposed architecture’s efficacy in identification of the specific variants of malevolent assaults, that is a classic multi-class classification challenge. …”
    Get full text
    Article
  16. 1876

    Causal Analysis and Prevention Strategies for Safety Risks in Prefabricated Building Construction Based on Accident Data and Complex Network Theory by Wei Liu, Xiao Luo, Baojun Liang, Junhao Xie

    Published 2025-01-01
    “…Research shows that the attack strategies of betweenness centrality and degree centrality can significantly affect the stability of the network structure, and the EffG attack strategy performs better in identifying key nodes. …”
    Get full text
    Article
  17. 1877

    Novel Node Centrality-Based Efficient Empirical Robustness Assessment for Directed Network by Xiaolong Deng, Hao Ding, Yong Chen, Cai Chen, Tiejun Lv

    Published 2020-01-01
    “…Some further research studies have indicated that the online social network has high robustness to random removals of nodes but fails to the intentional attacks, particularly to those attacks based on node betweenness or node directed coefficient. …”
    Get full text
    Article
  18. 1878

    Methods Used in Urban Search and Rescue in Disasters and Evaluation of Current Approaches by Gürkan Yılmaz, Sevda Demiröz Yıldırım

    Published 2020-01-01
    “…Disaster is an event that results in serious physical and death of large number of people, because of earthquake, tsunami, flood, landslide, volcano eruption, hurricane, hose, airplane accidents, train accidents, nuclear power plant accidents, explosions and terrorist attacks. Urban search and rescue works are important for finding people and animals trapped under the collapsed structure after the collapse of buildings as a result of earthquakes, terrorist attacks and landslides. …”
    Get full text
    Article
  19. 1879

    Neuromyelitis optica spectrum disorder: epidemiology, pathogenesis, diagnosis, treatment, and prognosis by J. Čemerkaitė, I. Kaukėnaitė, R. Liutkevičienė

    Published 2021-03-01
    “…Factors leading to a worse prognosis include the severity of the first attack, higher number of relapses in the first two years, older age at the disease onset, and association with other autoimmune disorders. …”
    Get full text
    Article
  20. 1880

    ReMAV: Reward Modeling of Autonomous Vehicles for Finding Likely Failure Events by Aizaz Sharif, Dusica Marijan

    Published 2024-01-01
    “…Autonomous vehicles are advanced driving systems that revolutionize transportation, but their vulnerability to adversarial attacks poses significant safety risks. Consider a scenario in which a slight perturbation in sensor data causes an autonomous vehicle to fail unexpectedly, potentially leading to accidents. …”
    Get full text
    Article