Showing 1 - 20 results of 2,165 for search 'aiming attacks', query time: 0.10s Refine Results
  1. 1

    Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes by Eugene Levner, Dmitry Tsadikovich

    Published 2024-11-01
    “…This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. …”
    Get full text
    Article
  2. 2

    Attack or reform by Peter Curos

    Published 2023-04-01
    “…Is it possible to distinguish whether a government is willing to eliminate its accountability or aims for public trust or efficacy growth? Moreover, which elements in the government’s actions differentiate valid criticism from an attack on the independence of the judiciary? …”
    Get full text
    Article
  3. 3

    Risk assessment method for network attack surface based on Bayesian attack graph by Yuyang ZHOU, Guang CHENG, Chunsheng GUO

    Published 2018-06-01
    “…Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network attack surface based on Bayesian attack graph was proposed.The network system resources,vulnerability and dependencies between them were used to establish Bayesian attack graph.Considering dependencies between nodes,the correlation between the resource and the influence of attacks on the attack path,the probability of each state that attackers can reach and the maximum probability attack path can be inferred.The experimental results prove the feasibility and effectiveness of the proposed network attack surface risk assessment method,which can provide a good support for the selection of dynamic defensive measures of attack surface.…”
    Get full text
    Article
  4. 4

    Survey of Load-Altering Attacks Against Power Grids: Attack Impact, Detection, and Mitigation by Sajjad Maleki, Shijie Pan, Subhash Lakshminarayana, Charalambos Konstantinou

    Published 2025-01-01
    “…Additionally, mitigation techniques are examined, focusing on both preventive measures, designed to thwart attack execution, and reactive methods, which aim to optimize responses to ongoing attacks. …”
    Get full text
    Article
  5. 5

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article
  6. 6

    Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach by Romina Torres, Ana García

    Published 2025-07-01
    “…In this study, we address the problem of attacker attribution in complex, multi-step network attack (MSNA) environments, aiming to identify the responsible attacker (e.g., IP address) for each sequence of security alerts, rather than merely detecting the presence or type of attack. …”
    Get full text
    Article
  7. 7

    Abuses and attacks on blockchain systems by Radojević Aleksandra, Stanković Predrag

    Published 2025-01-01
    “…Blockchain systems are ever more ubiquitous in all business sectors, but the primary user of these technologies is the financial industry. This paper aims to explore attacks on blockchain systems, specifically determining the intensity of these attacks in the past and the extent of their consequences. …”
    Get full text
    Article
  8. 8

    An approach for classifying sociotechnical attacks by Oleksandr Korchenko, Anna Korchenko, Serhii Zybin, Kyrylo Davydenko

    Published 2025-05-01
    “…The research is aimed at solving the following tasks: toconstruct a model for classifying sociotechnical attacks in which it is possible to develop a generalized hierarchical model; to form a generalized set of features, criteria, and sub-criteria, which allows us to select and develop appropriate means of countering sociotechnical attacks from a systemic perspective; and to carry out the modelling of a corresponding cyberattack for a systematic understanding of actions and countermeasures. …”
    Get full text
    Article
  9. 9

    Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses by Muhammad Usman Rana, Munam Ali Shah, Mohammad Abdulaziz Al-Naeem, Carsten Maple

    Published 2024-01-01
    “…Secondly, we present a novel automated web defence to countermeasure these malware attacks. The proposed research aims to provide a better understanding of the new computer virus-spreading techniques that intruders can use in the future. …”
    Get full text
    Article
  10. 10

    Attacks on Telex Internet anticensorship system by Long-hai LI, Cheng-qiang HUANG, Wan-xing WANG, Jian-jun MU

    Published 2014-09-01
    “…As a typical router-redirecting based anticensorship system,Telex poses new challenges for Internet censors.To help common users evade Internet censorship,Telex employs network routers,rather than end-hosts,to relay network traffics to blocked destinations.The security of Telex from the censors' perspective is analyzed,and two kinds of active attacks aiming to break users' privacy are presented.The first is a kind of DoS attack,which exploits a security flaw of Telex handshake protocol.It can probabilistically identify the users who are using Telex,as well as break the availability of Telex.An improved handshake protocol to remedy the flaw is also proposed.The second is called TCP packets by-passing attack.Under that attacking scenario,censors make a small fraction of TCP packets from clients bypass the router and reach the cover site directly through asymmetric routing paths or IP tunnels,then determine whether a user is utiliz-ing Telex by observing the reaction of upstream traffic.The feasibility of bypassing attack has been testified by a series of experiments in a prototype environment.The bypassing attack is also applicable to other router-redirecting based anti-censorship systems.…”
    Get full text
    Article
  11. 11

    Damage modelling in concrete subject to sulfate attack by N. Cefis, C. Comi

    Published 2014-07-01
    “…In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.…”
    Get full text
    Article
  12. 12

    Leaking Network Devices with Rubber Ducky Attack by Zeynep Rana Donmez, Şeyma Atmaca, Yıldıray YALMAN

    Published 2024-12-01
    “…Social engineering is a psychological attack targeting individuals' vulnerabilities, often aimed at employees of targeted organizations. …”
    Get full text
    Article
  13. 13

    Automated crowdturfing attack in Chinese user reviews by Li’na WANG, Xiaodong GUO, Run WANG

    Published 2019-06-01
    “…The text-oriented automated crowdturfing attack has a series of features such as low attack cost and strong concealment.This kind of attack can automatically generate a large number of fake reviews,with harmful effect on the healthy development of the user review community.In recent years,researchers have found that text-oriented crowdturfing attacks for the English review community,but there was few research work on automated crowdsourcing attacks in the Chinese review community.A Chinese character embedding LSTM model was proposed to automatically generate Chinese reviews with the aim of antomated crowdturfing attacks,which model trained by a combination with Chinese character embedding network,LSTM network and softmax dense network,and a temperature parameter T was designed to construct the attack model.In the experiment,more than 50 000 real user reviews were crawled from Taobao's online review platform to verify the effectiveness of the attack method.Experimental results show that the generated fake reviews can effectively fool linguistics-based classification detection approach and texts plagiarism detection approach.Besides,the massive manually evaluation experiments also demonstrate that the generated reviews with the proposed attack approach perform well in reality and diversity.…”
    Get full text
    Article
  14. 14

    DOG: An Object Detection Adversarial Attack Method by Jinpeng Li, Xiaoyu Ji, Wenyuan Xu, Yushi Cheng

    Published 2025-01-01
    “…This study presents an object detection adversarial attack method (DOG) based on the dynamic optimization of a multi-scale feature grid cluster, aimed at addressing the challenges of poor transferability in white-box attacks and long generation cycles in black-box attacks within the current adversarial example generation techniques. …”
    Get full text
    Article
  15. 15

    Key committing attack on Tiaoxin-346 algorithm by Nan Liu, Chenhui Jin, Junwei Yu

    Published 2025-04-01
    “…Notably, the computational complexity of our attack is O(1), significantly lower than the generic attack complexity of $$O\left( 2^{64}\right)$$ O 2 64 , which effectively violates the key commitment security of Tiaoxin-346. …”
    Get full text
    Article
  16. 16

    Threat Modeling AI/ML With the Attack Tree by Seied Veria Hoseini, Jaakko Suutala, Juha Partala, Kimmo Halunen

    Published 2024-01-01
    “…This article aims to bridge this gap by proposing a simple, efficient, and time-saving approach to evaluate potential attacks and their security risks by utilizing the attack tree and a risk analysis method in the Adversarial Machine Learning (AML) field. …”
    Get full text
    Article
  17. 17

    A Survey on Adversarial Attacks for Malware Analysis by Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Pradip Kunwar, Bhavani Thuraisingham

    Published 2025-01-01
    “…However, minor perturbations or ineffectual byte insertions can easily ‘fool’ these trained ML classifiers, making them ineffective against these crafted and smart malicious software. This survey aims to provide an encyclopedic overview of adversarial evasion attacks specifically targeting malware detection and classification systems, standing apart from previous surveys by focusing exclusively and comprehensively on this unique application domain. …”
    Get full text
    Article
  18. 18

    Approaches to panic attack symptoms in cardiology outpatients by Dilek Örüm, Sabri Abuş, Yaşar Kapıcı

    Published 2025-05-01
    “…Abstract Cardiologists’ attitudes towards the patients with panic attack (PA) symptoms can be affected by many variables. …”
    Get full text
    Article
  19. 19
  20. 20