-
181
Higher accumulation of mitragynine in Mitragyna speciosa (kratom) leaves affected by insect attack.
Published 2025-01-01“…Despite this, there remains considerable uncertainty regarding how herbivory attack affects the chemical composition of kratom's leaf metabolome. …”
Get full text
Article -
182
The Problem of Choosing a Steganographic Container in Conditions of Attacks against an Embedded Message
Published 2022-11-01“…The goal was achieved using a theoretical study of perturbations of the formal parameters of the container ma-trix, as a result of steganographic transformation and active attacks, which made it possible to introduce a new formal representation for information protected from perturbing influence E, as the difference of low-rank approximations of container matrices and steganographic messages. …”
Get full text
Article -
183
The influence of set speed on the attack efficacy of the outside hitter in elite male volleyball
Published 2024-09-01“… The purpose of this study was twofold: a) to analyze if the set speed can predict the attack efficacy of the outside hitter; and b) if the team level is a predictor of set speed and attack efficacy. …”
Get full text
Article -
184
Acute Migraine Attack in Students while taking Online Classes during Pandemic
Published 2022-07-01Get full text
Article -
185
Evaluation of PPG Feature Values Toward Biometric Authentication Against Presentation Attacks
Published 2022-01-01“…Several approaches have been proposed to apply PPG to biometric authentication using a wearable device; however, there may be several attacks against PPG-based authentication. One of the attacks is a “presentation attack” (PA), which utilizes the information leakage originating from the various PPG measurement sites on a body. …”
Get full text
Article -
186
Metaheuristic Optimization of Wind Turbine Airfoils with Maximum-Thickness and Angle-of-Attack Constraints
Published 2024-12-01“…Specifically, the glide ratio is maximized to capture maximum energy while ensuring specific design parameters, such as maximum thickness or optimal angle of attack. This methodology can obtain results more quickly and with lower computational cost, in addition to integrating these two design parameters into the optimization process, aspects that have been largely neglected in previous works. …”
Get full text
Article -
187
Risk of Stroke or Heart Attack in Mild Cognitive Impairment and Subjective Cognitive Impairment
Published 2024-11-01“…A statistically significant difference in the progression to dementia was shown (SCI 3.75%; aMCI-SD 10.43%; aMCI-MD 37%; <i>p</i>-value < 0.001). …”
Get full text
Article -
188
Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models
Published 2025-06-01“…Initially, we utilize a pre-trained model based on the transformer architecture and fine-tune it on various tasks to serve as a surrogate model. Subsequently, different levels of adversarial attack algorithms are utilized, and the generated adversarial samples are used as transfer samples. …”
Get full text
Article -
189
Cross-representation transferable adversarial examples generation for audio classification
Published 2025-04-01“…The unique property of transferability enables them to deceive black-box deep neural network models. Transfer-based attack methods for audio classification have recently attracted extensive discussion. …”
Get full text
Article -
190
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01“…Attack surface is an important index to measure security of software system.The general attack surface model is based on the I/O automata model to model the software system, which generally uses a non-redundant architecture and it is difficult to apply to heterogeneous redundant system architectures such as multi variant systems.Manadhatad et al.proposed a method to measure the attack surface in a dissimilar redundancy system.However, the voting granularity and voting method of the system architecture adopted by Manadhatad are different from those of the multi-variant system, which cannot accurately measure the attack surface of the multi variant system.Therefore, based on the traditional attack surface model, combined with the characteristics of heterogeneous redundant architecture of multi variant systems, the traditional attack surface model was extended and the attack surface model of multivariant systems was constructed.The attack surface of the multi variant system was represented in a formal way, and the traditional attack surface model was improved according to the voting mechanism of the multi variant system at the exit point of the system, so that it can explain the phenomenon that the attack surface of the multi variant system shrinks.Through this modeling method, the change of the attack surface of the multi variant system adopting the multi variant architecture can be explained in the running process.Then, two groups of software systems with multi variant execution architecture were used as analyzing examples.The attack surface of the software systems with the same functions as those without multi variant architecture were compared and analyzed in two situations of being attacked and not being attacked, reflecting the changes of the multi variant system in the attack surface.Combining the attack surface theory and the characteristics of the multi variant execution system, an attack surface modeling method for the multi variant execution system was proposed.At present, the changes of the attack surface of the multi variant execution system can be qualitatively analyzed.In-depth research in the quantitative analysis of the attack surface of the multi variant execution system will be continually conducted.…”
Get full text
Article -
191
Attack and Protection Technology of Intelligent Terminals for New Energy Internet Transmission, Transformation, and Distribution
Published 2022-01-01“…In order to improve the ability of the new energy Internet to defend against external attacks, the author proposes a dual Markov chain-based FDIA detection method suitable for the new energy Internet. …”
Get full text
Article -
192
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01“…However, RPL is susceptible to routing attacks such as rank attacks, DIS-flooding, etc. In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. …”
Get full text
Article -
193
Deep Fusion Intelligence: Enhancing 5G Security Against Over-the-Air Attacks
Published 2025-01-01“…With the increasing deployment of 5G networks, the vulnerability to malicious interference, such as jamming attacks, has become a significant concern. Detecting such attacks is crucial to ensuring the reliability and security of 5G communication systems Specifically in CAVs. …”
Get full text
Article -
194
Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks
Published 2024-11-01“…Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites. …”
Get full text
Article -
195
Distillation-Based Cross-Model Transferable Adversarial Attack for Remote Sensing Image Classification
Published 2025-05-01“…The DMFAA framework enables the surrogate model to learn knowledge from Mamba, achieving enhanced black-box attack performance across different model architectures. …”
Get full text
Article -
196
Enhancing Adversarial Transferability With Intermediate Layer Feature Attack on Synthetic Aperture Radar Images
Published 2025-01-01“…Existing SAR adversarial attack algorithms require access to the network structure, parameters, and training data, which are often inaccessible in real-world scenarios. …”
Get full text
Article -
197
IoTShield: Defending IoT Systems Against Prevalent Attacks Using Programmable Networks
Published 2025-01-01“…This paper presents <monospace>IoTShield</monospace>, a Software Defined Network (SDN) based dual-stage defensive framework, designed to mitigate different flow-based attacks targeting IoT systems. …”
Get full text
Article -
198
-
199
Using Reinforcement Learning to Handle the Unintended Lateral Attack in the Intelligent Connected Vehicle Environment
Published 2023-01-01“…It is widely accepted that an unintended lateral attack is inevitable in the intelligent connected vehicle environment. …”
Get full text
Article -
200
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article