Showing 1 - 20 results of 10,897 for search '"Attacker"', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Decoding Phishing Evasion: Analyzing Attacker Strategies to Circumvent Detection Systems by A. Ghafoor, M. A. Shah, M. A. Al-Naeem, C. Maple

    Published 2025-01-01
    “…Despite existing detection systems, sophisticated attackers have developed advanced evasion techniques that undermine these defenses. …”
    Get full text
    Article
  5. 5

    Detection of attacker and location in wireless sensor network as an application for border surveillance by Mohammed Aseeri, Muhammad Ahmed, Mohammed Shakib, Oussama Ghorbel, Hussian Shaman

    Published 2017-11-01
    “…This article focuses on the detection of attacks by unknown trespassers (perpetrators) on border surveillance sensor networks. …”
    Get full text
    Article
  6. 6

    Attack or reform by Peter Curos

    Published 2023-04-01
    Subjects:
    Get full text
    Article
  7. 7

    Cyber security based on mean field game model of the defender: Attacker strategies by Li Miao, Shuai Li

    Published 2017-10-01
    “…In this article, we present a mean field game model for the binary interactive behaviors between the malicious attackers and the defenders. We first discuss the evolution of the states of the malicious attackers and the defenders using the susceptiable-infective-Removal epidemic model in which we take into account the stochastic process of the propagation of the infected computers and the attack intensity. …”
    Get full text
    Article
  8. 8

    Improved integral attack——random linear distinguish and key recovery attack by Shaoyu DU

    Published 2023-04-01
    Subjects: “…integral attack;distinguish attack;block cipher analysis;AES;LED…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Attacking Africa's poverty : experience from the ground /

    Published 2006
    View in OPAC
    Book
  12. 12

    Encrypt, sign, attack : a compact introduction to cryptography / by Manz, Olaf

    Published 2022
    View in OPAC
    Book
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Mites That Attack Humans by P.G. Koehler

    Published 1999-05-01
    “… This document provides an overview of mites that attack humans, including household, bird, insect, rodent, scabies, and house dust mites. …”
    Get full text
    Article
  18. 18

    Refractory Gout Attack by Simone Fargetti, Claudia Goldenstein-Schainberg, Andressa Silva Abreu, Ricardo Fuller

    Published 2012-01-01
    “…Refractory gout attack is an uncommon problem, since gout flares are usually self-limited. …”
    Get full text
    Article
  19. 19
  20. 20

    G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud by Geng Chen, Zhiwen Zhang, Yuanxi Peng, Chunchao Li, Teng Li

    Published 2025-01-01
    “…Current methods suffer from issues such as generated point outliers and poor attack generalization. Consequently, it is not feasible to rely solely on overall or geometry-aware attacks to generate adversarial samples. …”
    Get full text
    Article