Suggested Topics within your search.
Suggested Topics within your search.
- Quality of life 2
- Social conditions 2
- Social problems 2
- COMPUTERS / Security / General 1
- Civil rights 1
- Crime prevention 1
- Data encryption 1
- Economic assistance 1
- Economic development projects 1
- Information technology 1
- Internal security 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Poverty 1
- Prevention 1
- Security, International 1
- Technology 1
- Violence 1
-
1
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: Get full text
Article -
2
“Attack!” Cellular Therapies to Attack Pathogens and Tumors
Published 2025-01-01Get full text
Article -
3
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Published 2024-11-01Subjects: Get full text
Article -
4
Decoding Phishing Evasion: Analyzing Attacker Strategies to Circumvent Detection Systems
Published 2025-01-01“…Despite existing detection systems, sophisticated attackers have developed advanced evasion techniques that undermine these defenses. …”
Get full text
Article -
5
Detection of attacker and location in wireless sensor network as an application for border surveillance
Published 2017-11-01“…This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. …”
Get full text
Article -
6
-
7
Cyber security based on mean field game model of the defender: Attacker strategies
Published 2017-10-01“…In this article, we present a mean field game model for the binary interactive behaviors between the malicious attackers and the defenders. We first discuss the evolution of the states of the malicious attackers and the defenders using the susceptiable-infective-Removal epidemic model in which we take into account the stochastic process of the propagation of the infected computers and the attack intensity. …”
Get full text
Article -
8
Improved integral attack——random linear distinguish and key recovery attack
Published 2023-04-01Subjects: “…integral attack;distinguish attack;block cipher analysis;AES;LED…”
Get full text
Article -
9
Improved integral attack——random linear distinguish and key recovery attack
Published 2023-04-01Subjects: “…integral attack…”
Get full text
Article -
10
Evaluation method of network attack effect based on attack tree and CVSS
Published 2022-04-01Subjects: “…attack tree…”
Get full text
Article -
11
-
12
-
13
-
14
-
15
-
16
-
17
Mites That Attack Humans
Published 1999-05-01“… This document provides an overview of mites that attack humans, including household, bird, insect, rodent, scabies, and house dust mites. …”
Get full text
Article -
18
Refractory Gout Attack
Published 2012-01-01“…Refractory gout attack is an uncommon problem, since gout flares are usually self-limited. …”
Get full text
Article -
19
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01Subjects: Get full text
Article -
20
G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
Published 2025-01-01“…Current methods suffer from issues such as generated point outliers and poor attack generalization. Consequently, it is not feasible to rely solely on overall or geometry-aware attacks to generate adversarial samples. …”
Get full text
Article