-
1
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Published 2024-11-01“…This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. …”
Get full text
Article -
2
Attack or reform
Published 2023-04-01“…Is it possible to distinguish whether a government is willing to eliminate its accountability or aims for public trust or efficacy growth? Moreover, which elements in the government’s actions differentiate valid criticism from an attack on the independence of the judiciary? …”
Get full text
Article -
3
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01“…Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network attack surface based on Bayesian attack graph was proposed.The network system resources,vulnerability and dependencies between them were used to establish Bayesian attack graph.Considering dependencies between nodes,the correlation between the resource and the influence of attacks on the attack path,the probability of each state that attackers can reach and the maximum probability attack path can be inferred.The experimental results prove the feasibility and effectiveness of the proposed network attack surface risk assessment method,which can provide a good support for the selection of dynamic defensive measures of attack surface.…”
Get full text
Article -
4
Survey of Load-Altering Attacks Against Power Grids: Attack Impact, Detection, and Mitigation
Published 2025-01-01“…Additionally, mitigation techniques are examined, focusing on both preventive measures, designed to thwart attack execution, and reactive methods, which aim to optimize responses to ongoing attacks. …”
Get full text
Article -
5
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article -
6
Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach
Published 2025-07-01“…In this study, we address the problem of attacker attribution in complex, multi-step network attack (MSNA) environments, aiming to identify the responsible attacker (e.g., IP address) for each sequence of security alerts, rather than merely detecting the presence or type of attack. …”
Get full text
Article -
7
Abuses and attacks on blockchain systems
Published 2025-01-01“…Blockchain systems are ever more ubiquitous in all business sectors, but the primary user of these technologies is the financial industry. This paper aims to explore attacks on blockchain systems, specifically determining the intensity of these attacks in the past and the extent of their consequences. …”
Get full text
Article -
8
An approach for classifying sociotechnical attacks
Published 2025-05-01“…The research is aimed at solving the following tasks: toconstruct a model for classifying sociotechnical attacks in which it is possible to develop a generalized hierarchical model; to form a generalized set of features, criteria, and sub-criteria, which allows us to select and develop appropriate means of countering sociotechnical attacks from a systemic perspective; and to carry out the modelling of a corresponding cyberattack for a systematic understanding of actions and countermeasures. …”
Get full text
Article -
9
Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses
Published 2024-01-01“…Secondly, we present a novel automated web defence to countermeasure these malware attacks. The proposed research aims to provide a better understanding of the new computer virus-spreading techniques that intruders can use in the future. …”
Get full text
Article -
10
Attacks on Telex Internet anticensorship system
Published 2014-09-01“…As a typical router-redirecting based anticensorship system,Telex poses new challenges for Internet censors.To help common users evade Internet censorship,Telex employs network routers,rather than end-hosts,to relay network traffics to blocked destinations.The security of Telex from the censors' perspective is analyzed,and two kinds of active attacks aiming to break users' privacy are presented.The first is a kind of DoS attack,which exploits a security flaw of Telex handshake protocol.It can probabilistically identify the users who are using Telex,as well as break the availability of Telex.An improved handshake protocol to remedy the flaw is also proposed.The second is called TCP packets by-passing attack.Under that attacking scenario,censors make a small fraction of TCP packets from clients bypass the router and reach the cover site directly through asymmetric routing paths or IP tunnels,then determine whether a user is utiliz-ing Telex by observing the reaction of upstream traffic.The feasibility of bypassing attack has been testified by a series of experiments in a prototype environment.The bypassing attack is also applicable to other router-redirecting based anti-censorship systems.…”
Get full text
Article -
11
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01“…In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.…”
Get full text
Article -
12
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01“…Social engineering is a psychological attack targeting individuals' vulnerabilities, often aimed at employees of targeted organizations. …”
Get full text
Article -
13
Automated crowdturfing attack in Chinese user reviews
Published 2019-06-01“…The text-oriented automated crowdturfing attack has a series of features such as low attack cost and strong concealment.This kind of attack can automatically generate a large number of fake reviews,with harmful effect on the healthy development of the user review community.In recent years,researchers have found that text-oriented crowdturfing attacks for the English review community,but there was few research work on automated crowdsourcing attacks in the Chinese review community.A Chinese character embedding LSTM model was proposed to automatically generate Chinese reviews with the aim of antomated crowdturfing attacks,which model trained by a combination with Chinese character embedding network,LSTM network and softmax dense network,and a temperature parameter T was designed to construct the attack model.In the experiment,more than 50 000 real user reviews were crawled from Taobao's online review platform to verify the effectiveness of the attack method.Experimental results show that the generated fake reviews can effectively fool linguistics-based classification detection approach and texts plagiarism detection approach.Besides,the massive manually evaluation experiments also demonstrate that the generated reviews with the proposed attack approach perform well in reality and diversity.…”
Get full text
Article -
14
DOG: An Object Detection Adversarial Attack Method
Published 2025-01-01“…This study presents an object detection adversarial attack method (DOG) based on the dynamic optimization of a multi-scale feature grid cluster, aimed at addressing the challenges of poor transferability in white-box attacks and long generation cycles in black-box attacks within the current adversarial example generation techniques. …”
Get full text
Article -
15
Key committing attack on Tiaoxin-346 algorithm
Published 2025-04-01“…Notably, the computational complexity of our attack is O(1), significantly lower than the generic attack complexity of $$O\left( 2^{64}\right)$$ O 2 64 , which effectively violates the key commitment security of Tiaoxin-346. …”
Get full text
Article -
16
Threat Modeling AI/ML With the Attack Tree
Published 2024-01-01“…This article aims to bridge this gap by proposing a simple, efficient, and time-saving approach to evaluate potential attacks and their security risks by utilizing the attack tree and a risk analysis method in the Adversarial Machine Learning (AML) field. …”
Get full text
Article -
17
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01“…However, minor perturbations or ineffectual byte insertions can easily ‘fool’ these trained ML classifiers, making them ineffective against these crafted and smart malicious software. This survey aims to provide an encyclopedic overview of adversarial evasion attacks specifically targeting malware detection and classification systems, standing apart from previous surveys by focusing exclusively and comprehensively on this unique application domain. …”
Get full text
Article -
18
Approaches to panic attack symptoms in cardiology outpatients
Published 2025-05-01“…Abstract Cardiologists’ attitudes towards the patients with panic attack (PA) symptoms can be affected by many variables. …”
Get full text
Article -
19
Point-of-care ultrasound for transient ischemic attack assessment in transient ischemic attack clinics: Consensus document of the Spanish Society of Neurosonology
Published 2025-06-01“…In recent years, there has been increasing recognition of the benefits offered by rapid-access transient ischemic attack (TIA) clinics for the early assessment of patients with suspected TIA. …”
Get full text
Article -
20
FUSELAGE SHAPE OPTIMIZATION AIMED AT WING-FUSELAGE CONFIGURATION DRAG REDUCTION AT SUPERSONIC SPEEDS
Published 2017-01-01Get full text
Article