-
421
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01Subjects: Get full text
Article -
422
Observer-based event triggering security load frequency control for power systems involving air conditioning loads
Published 2024-11-01Subjects: Get full text
Article -
423
The influence of blade profile shape of inlet guide vane on performance map of centrifugal compressor stage
Published 2020-12-01Subjects: Get full text
Article -
424
-
425
THE FEATURES OF STATISTICAL CHARACTERISTICS TERRORISM ON TRANSPORT
Published 2018-02-01Subjects: Get full text
Article -
426
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article -
427
A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function
Published 2025-01-01Subjects: Get full text
Article -
428
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01Subjects: Get full text
Article -
429
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01Subjects: Get full text
Article -
430
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: Get full text
Article -
431
A systematic review of AI-enhanced techniques in credit card fraud detection
Published 2025-01-01Subjects: “…Fraud attacks…”
Get full text
Article -
432
-
433
Defending Against Advanced Persistent Threats Using Game-Theory.
Published 2017-01-01“…Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. …”
Get full text
Article -
434
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01“…Existing anonymous communication systems that resisted traffic analysis could hide the identities of the communicating parties from the attacker. However, the identities of the communicating parties couldn’t be hidden from each other, and thus these systems did not apply to the scenario of anonymous whistleblowing and replying, where it was necessary to protect the identity of the whistleblower. …”
Get full text
Article -
435
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01“…Abstract Defensive deception is emerging to reveal stealthy attackers by presenting intentionally falsified information. …”
Get full text
Article -
436
Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing
Published 2023-02-01“…The opening of several ports that are still open and causes intruders to easily enter the system to carry out Brute Force attacks or others. The results of the simulation trial of the attack on the server were successfully carried out by obtaining a username and password, this is of course dangerous that the system can be taken over by intruders. …”
Get full text
Article -
437
Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora
Published 2022-12-01“…In the known-plaintext-attack attack test, the attacker failed to find the original key used in the 128-bit Clefia algorithm, so the attacker failed to attack the system. …”
Get full text
Article -
438
Vulnerability Analysis of CSP Based on Stochastic Game Theory
Published 2016-01-01“…The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. …”
Get full text
Article -
439
Framework for Secure Wireless Communication in Wireless Sensor Networks
Published 2013-12-01“…The restricted and constrained nature of sensors along with potentially dynamic behavior of WSNs demands the proper implementation of framework for secure communication in order to prevent attacker from illegally accessing or altering the transmission. …”
Get full text
Article -
440
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
Published 2016-05-01“…The existing CP-ABPRE schemes were proven secure only in the selective security model, a limited model, which is an unnatural constraint on the attacker. The scheme proved in this model can only be called selectively secure one. …”
Get full text
Article