Showing 2,081 - 2,100 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 2081

    Modified Lipid Particle Recognition: A Link Between Atherosclerosis and Cancer? by Amy E. Hall, Dhananjay Jade, Faheem Shaik, Shervanthi Homer-Vanniasinkam, Stephen P. Muench, Michael A. Harrison, Sreenivasan Ponnambalam

    Published 2025-06-01
    “…Dysfunctional lipid metabolism causes atherosclerosis, a driving force in arterial disease leading to heart attacks and strokes. In this review, we focus on emerging evidence for links between atherosclerosis and cancer. …”
    Get full text
    Article
  2. 2082

    Image Compression-Encryption Scheme via Fiber Specklegram-Based Compressive Sensing and Double Random Phase Encoding by Yan Liu, Yaohua Hu, Yang Li, Qi Qin, Guangde Li, ZhongWei Tan, Muguang Wang, FengPing Yan

    Published 2020-01-01
    “…Since fiber specklegrams have strong dependence on configuration, such measurement matrix can be constructed either by one specklegram or by specklegrams from different launched wavelengths. The double-encrypted image demonstrated good safety and reliability in several common attacks and presented high key sensitivity, which indicates good performance of the proposed scheme.…”
    Get full text
    Article
  3. 2083

    IOT-MDEDTL: IoT Malware Detection based on Ensemble Deep Transfer Learning by Qasim Kadhim, Ahmed Qassem Ali Sharhan Al-Sudani, Inas Amjed Almani, Tawfeeq Alghazali, Hasan Khalid Dabis, Atheer Taha Mohammed, Saad Ghazi Talib, Rawnaq Adnan Mahmood, Zahraa Tariq Sahi, Yaqeen Mezaal

    Published 2022-09-01
    “…As a result, monitoring and detecting various attacks on these devices becomes feasible. As the statistics prove, in the Mirai and Brickerbot botnets, Distributed Denial-of-Service (DDoS) attacks have become increasingly ubiquitous. …”
    Get full text
    Article
  4. 2084

    COMISET: Dataset for the analysis of malicious events in Windows systemsZenodo by Antonio Pérez-Sánchez, Rafael Palacios, Gregorio López López

    Published 2025-08-01
    “…In the laboratory environment, real attacks were executed involving a variety of techniques and tactics commonly used by the adversaries. …”
    Get full text
    Article
  5. 2085

    Acousto-optic cryptosystem based on dynamic DNA encoding and hyperchaotic system in gyrator domains by Gege Sun, Wenbo Song, Miao Tian, Zhengjun Liu, Hang Chen

    Published 2025-05-01
    “…The proposed remote sensing image encryption system exhibits high security performance and robustness against various attacks.…”
    Get full text
    Article
  6. 2086

    The role of sleep quality on mental toughness among football players by Masoud Esmaeilnejad, Hassan GHarayagh Zandi, Saman Esmaeilnejad, Sirus Qeisari

    Published 2023-07-01
    “…Moreover, defenders and attackers exhibited the highest levels of MT compared to other playing positions. …”
    Get full text
    Article
  7. 2087

    Investigating the Barriers of Using Blockchain Technology in Iran's Automobile Industry by Mohsen Zabihi Jamkhaneh, Mojtaba Farrokh, Hamed Hashemi Nezhad Mikal, Milad Sheikh Reza Zadeh Tehrani

    Published 2022-07-01
    “…Based on the findings, among the seven factors of the leading technical and technological component, three sub-components, including the lack of necessary safety against cyber attacks, the storing information problem, and the lack of standardization in different blockchain systems were ranked first to third, respectively, which shows the significance of the technical and technological factors.…”
    Get full text
    Article
  8. 2088

    Survey on Effective Disposal of E-Waste to Prevent Data Leakage by Akila Victor, Gurunathan Arunkumar, Rajendran Kannadasan, Soundrapandiyan Rajkumar, Ramani Selvanambi

    Published 2024-04-01
    “…Even after deleting data, it can still be prone to social engineering attacks by malicious individuals. Data leakage is the unauthorized transmission of data from within an organization to an external destination or recipient, and it can be transferred electronically or physically. …”
    Get full text
    Article
  9. 2089

    Copyright Verification and Traceability for Remote Sensing Object Detection Models via Dual Model Watermarking by Weitong Chen, Xin Xu, Na Ren, Changqing Zhu, Jie Cai

    Published 2025-01-01
    “…The watermark shows good robustness against fine-tuning and pruning attacks.…”
    Get full text
    Article
  10. 2090

    THE EFFECTS OF MARKETING MIX ON PESTICIDE PURCHASING DECISIONS THROUGH BRAND IMAGE AMONG RICE FARMERS IN KANOR SUB-DISTRICT, BOJONEGORO DISTRICT by Betty Nur Indah Sari, Budi Setiawan, Fitria Dina Riana

    Published 2024-07-01
    “…Because it is located on the banks of the Bengawan Solo river, the land in the sub-district is often threatened by pest attacks and affected by flooding. In an effort to prevent and treat pests, rice farmers in Kanor Sub-district choose to use pesticides because it is easier. …”
    Get full text
    Article
  11. 2091

    Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences by Christoph Lange, Andreas Ahrens, Yadu Krishnan Krishnakumar, Olaf Grote

    Published 2025-06-01
    “…Cryptographic outputs should look more random than deterministic in order to provide an attacker with as little information as possible. Therefore, the investigation of randomness, especially in cybersecurity, has attracted a lot of attention and research activities. …”
    Get full text
    Article
  12. 2092
  13. 2093

    A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis by Salman Muneer, Umer Farooq, Atifa Athar, Muhammad Ahsan Raza, Taher M. Ghazal, Shadman Sakib

    Published 2024-01-01
    “…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for ID. …”
    Get full text
    Article
  14. 2094

    A compact public key encryption with equality test for lattice in cloud computing by Junfei He, Qing Ye, Zhichao Yang, Shixiong Wang, Jiasheng Wang

    Published 2025-07-01
    “…With those efforts, our scheme can withstand the chosen ciphertext attacks as long as the learning with errors (LWE) assumption holds. …”
    Get full text
    Article
  15. 2095

    A Comparative Study of Coverage Hole Detection Techniques in Wireless Sensor Networks by Anitha Christy Angelin, Salaja Silas

    Published 2023-12-01
    “…A network with holes in coverage is more susceptible to node failures or malicious attacks. According to the total number of hops used to transport data, nodes may calculate their distance from the sink node. …”
    Get full text
    Article
  16. 2096

    Factors Responsible for Wheel - Rail Interaction in Curves by Y. S. Romen

    Published 2015-02-01
    “…And this is the reason for the gauge outward pressure rate to be different in the steep and smooth curves at the within-one-order frame forces’ values. …”
    Get full text
    Article
  17. 2097

    Chaotic Image Encryption System as a Proactive Scheme for Image Transmission in FSO High-Altitude Platform by Ping Zhang, Jingfeng Jie, Zhi Liu, Keyan Dong

    Published 2025-06-01
    “…Finally, the effect of malicious interception attacks, caused by noise interference from different levels of atmospheric turbulence, is examined. …”
    Get full text
    Article
  18. 2098

    Host use patterns by the European woodwasp, Sirex noctilio, in its native and invaded range. by Matthew P Ayres, Rebeca Pena, Jeffrey A Lombardo, Maria J Lombardero

    Published 2014-01-01
    “…However, S. noctilio populations could behave differently when they reach forests of the southeastern U.S., where tree species, soils, climate, ecology, management, and landscape configurations of pine stands are different.…”
    Get full text
    Article
  19. 2099

    Highly-Efficient Hardware Architecture for ML-KEM PQC Standard by Haesung Jung, Quang Dang Truong, Hanho Lee

    Published 2025-01-01
    “…Furthermore, the implementation incorporates several methods to effectively mitigate side-channel attacks, a common concern in hardware-based cryptosystem deployments. …”
    Get full text
    Article
  20. 2100

    Phishing suspiciousness in older and younger adults: The role of executive functioning. by Brandon E Gavett, Rui Zhao, Samantha E John, Cara A Bussell, Jennifer R Roberts, Chuan Yue

    Published 2017-01-01
    “…Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. …”
    Get full text
    Article