Showing 1,881 - 1,900 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1881

    A Novel Authentication Management for the Data Security of Smart Grid by Imtiaz Parvez, Maryamossadat Aghili, Hugo Riggs, Aditya Sundararajan, Arif I. Sarwat, Anurag K. Srivastava

    Published 2024-01-01
    “…In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. …”
    Get full text
    Article
  2. 1882

    Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks by Shengwei Wang, Hongquan Chen, Yulin Guo, Wenjing Su, Yurong Xu, Shuohao Cui, Zhiqiang Zhou

    Published 2025-01-01
    “…The GDEO-ALNS optimized interaction structure slows down the ECV drop rate in topological attacks by 0.03 and 0.02, respectively, compared to the original interaction structure, which provides better immunity to interference compared to the optimized structure of ALNS. …”
    Get full text
    Article
  3. 1883

    Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix by Annabelle Lee, Sri Nikhil Gupta Gourisetti, David Jonathan Sebastian-Cardenas, Kent Lambert, Vicente Navarro, Marco Pasetti, Umit Cali, Kateryna Isirova, Ramesh Reddi, Puica Nitu, Md. Touhiduzzaman, Michael Mylrea, Philip Huff, Farrokh Rahimi, Shammya Shananda Saha

    Published 2023-01-01
    “…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
    Get full text
    Article
  4. 1884

    Oxidation Degradation of Rhodamine B in Aqueous by UV/S2O8 2− Treatment System by Xiaoyang Chen, Zhiyong Xue, Yanlai Yao, Weiping Wang, Fengxiang Zhu, Chunlai Hong

    Published 2012-01-01
    “…With the increase of oxidant S2O8 2−, more SO4 •− produced to attack RhB molecules and result in the increase of RhB degradation. …”
    Get full text
    Article
  5. 1885

    Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies by Salman Ahmed, Nabihah Ahmad, Nasir Ali Shah, Ghulam E. Mustafa Abro, Ardhi Wijayanto, Abdinasir Hirsi, Abdul Rehman Altaf

    Published 2025-01-01
    “…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
    Get full text
    Article
  6. 1886

    Synthesis, Characterization, Semiempirical and Biological Activities of Organotin(IV) Carboxylates with 4-Piperidinecarboxylic Acid by Shabbir Hussain, Saqib Ali, Saira Shahzadi, Saroj K. Sharma, Kushal Qanungo, Muhammad Shahid

    Published 2014-01-01
    “…HOMO-LUMO calculations show that chlorodiorganotin complexes are more susceptible to nucleophilic attack as compared to triorganotin complexes. Computed negative heat of formation indicates that complexes 1–4 are thermodynamically stable. …”
    Get full text
    Article
  7. 1887

    VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks by Juli Yin, Linfeng Wei, Zhiquan Liu, Xi Yang, Hongliang Sun, Yudan Cheng, Jianbin Mai

    Published 2023-12-01
    “…When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly accessible to all attackers, which increases the risk of vehicle exposure. …”
    Get full text
    Article
  8. 1888

    Evaluation of Risk Factors for Antibiotic Resistance in Patients with Nosocomial Infections Caused by Pseudomonas aeruginosa by Meliha Cagla Sonmezer, Gunay Ertem, Fatma Sebnem Erdinc, Esra Kaya Kilic, Necla Tulek, Ali Adiloglu, Cigdem Hatipoglu

    Published 2016-01-01
    “…In the multivariate analysis, previous cefazolin use was found as an independent risk factor for the development of imipenem resistance (OR = 3.33; CI 95% [1.11–10.0]; p = 0.03), whereas previous cerebrovascular attack (OR = 3.57; CI 95% [1.31–9.76]; p = 0.01) and previous meropenem use (OR = 4.13; CI 95% [1.21–14.07]; p = 0.02) were independent factors for the development of meropenem resistance. …”
    Get full text
    Article
  9. 1889

    Effects of Coach’s Verbal Encouragement During Small-Sided Volleyball Games on Specific Physical Fitness and Technical-Tactical Behavior of Youth Athletes by Taufiq Hidayat, Irma Febriyanti, Advendi Kristiyandaru, Suroto, Hari Wisnu, Ahmet Kurtoğlu, Amayra Tannoubi, Joseph Lobo, Baglan Yermakhanov, Jarosław Muracki, Edi Setiawan

    Published 2025-01-01
    “…Physical performance including agility t-test (ATT), 10-m sprint test (10-mST), countermovement jump test (CMJT), medicine ball throw test (MBTT), multistage 20-meter shuttle run test (M20-MSRT), and technical-tactical behavior (serve, reception, sets, attack, defense) were measured in pre-test and post-test. …”
    Get full text
    Article
  10. 1890

    Molecular complexity of quantitative immunity in plants: from QTL mapping to functional and systems biology by Chauveau, Carine, Roby, Dominique

    Published 2024-05-01
    “…In nature, plants defend themselves against pathogen attack by activating an arsenal of defense mechanisms. …”
    Get full text
    Article
  11. 1891

    Resveratrol Inhibits Hepatic Stellate Cell Activation via the Hippo Pathway by Chunxue Li, Rongrong Zhang, Yating Zhan, Jianjian Zheng

    Published 2021-01-01
    “…Liver fibrosis, which results from chronic liver injury due to factors such as chronic alcohol consumption, hepatitis virus infections, and immune attacks, is marked by excessive deposition of extracellular matrix (ECM). …”
    Get full text
    Article
  12. 1892

    THE TOTAL LEUKOCYTE COUNT OF ELDERLY PATIENTS CONFIRMED COVID-19 WITH/WITHOUT A VENTILATOR IN A SURABAYA GENERAL HOSPITAL IN 2021 by Safira Indah Fitriani, Nur Septia Handayani, Erlinda Widyastuti, Anita Kurniati

    Published 2023-07-01
    “…Background: Coronavirus is a virus that attacks the immune system, especially the human respiratory system. …”
    Get full text
    Article
  13. 1893

    Deep learning technology: enabling safe communication via the internet of things by Ramiz Salama, Hitesh Mohapatra, Tuğşad Tülbentçi, Fadi Al-Turjman

    Published 2025-02-01
    “…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
    Get full text
    Article
  14. 1894

    Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications by Mohammad Aldossary, Ibrahim Alzamil, Jaber Almutairi

    Published 2025-01-01
    “…Distributed Denial of Service (DDoS) attacks, malware infections, and communication abnormalities increase cybersecurity dangers to these networks, threatening operational safety and efficiency. …”
    Get full text
    Article
  15. 1895

    Comparison of Saddle-Shaped Region of Head-Flow Curve between Axial-Flow Pump and Its Corresponding Axial-Flow Pump Device by Dongtao Ji, Weigang Lu, Linguang Lu, Lei Xu, Jun Liu, Wei Shi, Ye Zhu

    Published 2021-01-01
    “…The results show that when the flow rate decreases, the first saddle-shaped region of the axial-flow pump and the saddle-shaped region of the pump device are caused by the decrease of the lift coefficient due to the increase of the attack angle between flow and blade. When the flow rate is less than 0.32Qd, the influence range of backflow in the inlet pipe is large, which leads to the high-pressure zone near the wall of the inlet pressure measurement section during the pump performance test, and hence the second saddle-shaped region of the axial-flow pump is essentially a measurement illusion. …”
    Get full text
    Article
  16. 1896

    Gamification Application for Promoting and Encouraging Physical Activity in the Elderly by Narmin Mohammed Noori, Awaz Naaman Saleem, Muhammed Anwar

    Published 2024-06-01
    “…However, when an application crashes or is infected with a virus, it can provide patients with false information, exposing users to attacks from hackers when they are using it. Incorrect diagnosis poses a risk to a patient's life as risks and ethical considerations due to using gamification applications in physical activity. …”
    Get full text
    Article
  17. 1897

    Clinico¬pathological features and phylogenetic analysis of rabies infection in local Iraqi breed cattle by M. H. Hussain, Kh. A. Mansour, S. A. A. Al-Redah, A. J. Abid

    Published 2025-03-01
    “…Eighty-one cattle were suspected to have rabies after a history of being attacked and having signs of rabies: rest-lessness, aggression, drooling saliva, hitting head to fences, inappetence, recurrent failed trials of defecation with an opened anus, and fever. …”
    Article
  18. 1898

    Psychiatric Symptoms in Acute Intermittent Porphyria - Case Report and Course of Treatment Using Placebo by Waldemar Kosiba, Dominika Prystacka-Szar, Jakub Siemko, Wojciech Kupczak

    Published 2025-02-01
    “…Aim:  The aim of this paper is to highlight the difficulties in diagnosing psychiatric symptoms during an acute attack of porphyria, which significantly complicate its treatment, and to consider the possibility of using placebo as one of the elements in the diagnostic and therapeutic plan in order to optimize treatment and avoid complications by using smaller doses of narcotic drugs. …”
    Get full text
    Article
  19. 1899

    Secure and energy-efficient inter- and intra-cluster optimization scheme for smart cities using UAV-assisted wireless sensor networks by Niayesh Gharaei, Aliaa M. Alabdali

    Published 2025-02-01
    “…Security issues, such as insufficient data encryption, further exacerbate these challenges, leaving WSNs vulnerable to attacks. To address these gaps, we propose the secure and energy-efficient inter- and intra-cluster optimization scheme (SEI2), a novel WMET-based framework that ensures balanced energy utilization among cluster heads (CHs) and member nodes (MNs) while securing data transmission. …”
    Get full text
    Article
  20. 1900

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. As compared to other existing schemes, our proposed scheme consumes fewer resources and efficient in terms of processing cost, transmission overhead, and energy consumption.…”
    Get full text
    Article