-
201
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services
Published 2022-12-01“…Using these scenarios, we evaluate the risk of cascading attacks, by applying a targeted risk assessment methodology for identifying and assessing IoT-enabled attacks.…”
Get full text
Article -
202
On the generalisation capabilities of fingerprint presentation attack detection methods in the short wave infrared domain
Published 2021-07-01“…This fact motivates research on generalisation capabilities in order to find PAD methods that are resilient to new attacks. In this context, the authors evaluate the generalisability of multiple PAD algorithms on a dataset of 19,711 bona fide and 4339 PA samples, including 45 different PAI species. …”
Get full text
Article -
203
Detection of IPv6 routing attacks using ANN and a novel IoT dataset
Published 2025-04-01“…Using artificial intelligence and machine-learning techniques, a performance evaluation was performed on four different artificial neural network models (convolutional neural network, deep neural network, multilayer perceptron structure, and routing attack detection-fed forward neural network [RaD-FFNN]). …”
Get full text
Article -
204
Improving Transferability of Physical Adversarial Attacks on Object Detectors Through Multi-Model Optimization
Published 2024-12-01“…Physical adversarial attacks face significant challenges in achieving transferability across different object detection models, especially in real-world conditions. …”
Get full text
Article -
205
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01“…Despite the significant differences of different countries in this area, their positions on ensuring protection against cyber attacks peaceful nuclear infrastructure are the closest to a consensus, creating a window of opportunity for practical progress on this issue in 2013-2014.…”
Get full text
Article -
206
Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
Published 2013-01-01“…In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. …”
Get full text
Article -
207
A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS
Published 2025-02-01“…This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. …”
Get full text
Article -
208
Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment
Published 2019-02-01“…In terms of semi-supervised support vector machine, we establish a detection model using spatio-temporal trajectories of different identities as input samples, which include features of both conspiracy and non-conspiracy attack scenarios. …”
Get full text
Article -
209
Research on adversarial attacks and defense performance of image classification models for automated driving systems
Published 2025-01-01“…Then, sensitivity analyses were carried out across different regions and examples to identify attack mechanisms using three adversarial interpretation algorithms: LRP, Grad-CAM, and LIME. …”
Get full text
Article -
210
Evolution and Influence of Multivortex Structure on the Head of Canard-Controlled Missile at High Angle of Attack
Published 2024-01-01“…In this study, canard-controlled missiles are employed to study the influence of multivortex structure present in the head under different roll angles at high angles of attack. The turbulence model was verified and used for simulation. …”
Get full text
Article -
211
DDoS-MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer
Published 2024-01-01“…Distributed denial-of-service (DDoS) attacks pose a significant threat to network security due to their widespread impact and detrimental consequences. …”
Get full text
Article -
212
Secondary attack rates of COVID-19 in diverse contact settings, a meta-analysis
Published 2020-12-01“… Introduction: The secondary attack rate (SAR) measures the transmissibility of an infectious agent. …”
Get full text
Article -
213
Where does the panic attack come from... – characteristics and forms of therapy for anxiety disorders
Published 2025-01-01Get full text
Article -
214
Facial recognition targeted attack algorithm based on multiscale frequency decomposition and meta-learning
Published 2025-02-01“…The results of experimental analysis of different attack strategies demonstrate that the combination of multiscale frequency decomposition and meta-learning significantly enhances the success rate and robustness of attacks on facial recognition systems.…”
Get full text
Article -
215
An edge sensitivity based gradient attack on graph isomorphic networks for graph classification problems
Published 2025-04-01“…Such attacks, classified as white box attacks, tamper with latent space representation of graphs without creating any noticeable difference in the overall distribution. …”
Get full text
Article -
216
Mobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks
Published 2025-05-01“…Through digital experiments with various DNN architectures trained on a publicly available skin lesion dataset, we first demonstrate that camera-based adversarial patterns can achieve high transferability across different models. Using these findings, we implement physical attacks by attaching optimized transparent stickers to mobile device cameras. …”
Get full text
Article -
217
A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Published 2025-05-01“…This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. …”
Get full text
Article -
218
Natural Occlusion-Based Backdoor Attacks: A Novel Approach to Compromising Pedestrian Detectors
Published 2025-07-01“…We design a dynamically optimized heuristic-based strategy to adaptively adjust the trigger’s position and size for diverse occlusion scenarios, and develop three model-independent trigger embedding mechanisms for attack implementation. We conduct extensive experiments on two different pedestrian detection models using publicly available datasets. …”
Get full text
Article -
219
Transfer learning for securing electric vehicle charging infrastructure from cyber-physical attacks
Published 2025-03-01“…So many common signs of attacks are ignored. This paper proposes a Transfer learning (TL) framework for cyber-physical attack detection in EVCS in order to overcome these difficulties and improve both accuracy and scalability. …”
Get full text
Article -
220
Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology
Published 2024-01-01“…Building on the analysis of similarities between different aspects of cyber-power security and infectious diseases, this work aims to develop a bio-inspired, resilient cyber defense system that can identify, protect, detect, respond to, and recover from complex, well-targeted cyber attacks in power systems. …”
Get full text
Article