Showing 201 - 220 results of 2,541 for search 'different attack', query time: 0.14s Refine Results
  1. 201

    Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services by Ioannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou

    Published 2022-12-01
    “…Using these scenarios, we evaluate the risk of cascading attacks, by applying a targeted risk assessment methodology for identifying and assessing IoT-enabled attacks.…”
    Get full text
    Article
  2. 202

    On the generalisation capabilities of fingerprint presentation attack detection methods in the short wave infrared domain by Jascha Kolberg, Marta Gomez‐Barrero, Christoph Busch

    Published 2021-07-01
    “…This fact motivates research on generalisation capabilities in order to find PAD methods that are resilient to new attacks. In this context, the authors evaluate the generalisability of multiple PAD algorithms on a dataset of 19,711 bona fide and 4339 PA samples, including 45 different PAI species. …”
    Get full text
    Article
  3. 203

    Detection of IPv6 routing attacks using ANN and a novel IoT dataset by Murat Emec

    Published 2025-04-01
    “…Using artificial intelligence and machine-learning techniques, a performance evaluation was performed on four different artificial neural network models (convolutional neural network, deep neural network, multilayer perceptron structure, and routing attack detection-fed forward neural network [RaD-FFNN]). …”
    Get full text
    Article
  4. 204

    Improving Transferability of Physical Adversarial Attacks on Object Detectors Through Multi-Model Optimization by Adonisz Dimitriu, Tamás Vilmos Michaletzky, Viktor Remeli

    Published 2024-12-01
    “…Physical adversarial attacks face significant challenges in achieving transferability across different object detection models, especially in real-world conditions. …”
    Get full text
    Article
  5. 205

    PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY? by O. V. Demidov

    Published 2013-10-01
    “…Despite the significant differences of different countries in this area, their positions on ensuring protection against cyber attacks peaceful nuclear infrastructure are the closest to a consensus, creating a window of opportunity for practical progress on this issue in 2013-2014.…”
    Get full text
    Article
  6. 206

    Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet by Frank Yeong-Sung Lin, Yu-Shun Wang, Ming-Yang Huang

    Published 2013-01-01
    “…In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. …”
    Get full text
    Article
  7. 207

    A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS by Yuri A. Korotaev

    Published 2025-02-01
    “…This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. …”
    Get full text
    Article
  8. 208

    Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment by Yan Xin, Xia Feng

    Published 2019-02-01
    “…In terms of semi-supervised support vector machine, we establish a detection model using spatio-temporal trajectories of different identities as input samples, which include features of both conspiracy and non-conspiracy attack scenarios. …”
    Get full text
    Article
  9. 209

    Research on adversarial attacks and defense performance of image classification models for automated driving systems by TANG Jun, HUANG Wenjing, LI Shuang, WU Zili

    Published 2025-01-01
    “…Then, sensitivity analyses were carried out across different regions and examples to identify attack mechanisms using three adversarial interpretation algorithms: LRP, Grad-CAM, and LIME. …”
    Get full text
    Article
  10. 210

    Evolution and Influence of Multivortex Structure on the Head of Canard-Controlled Missile at High Angle of Attack by Kai Wei, Shaosong Chen, Dongdong Tang, Yihang Xu, Xujian Lyu, Qing Chen

    Published 2024-01-01
    “…In this study, canard-controlled missiles are employed to study the influence of multivortex structure present in the head under different roll angles at high angles of attack. The turbulence model was verified and used for simulation. …”
    Get full text
    Article
  11. 211

    DDoS-MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer by Bangli Wang, Yuxuan Jiang, You Liao, Zhen Li

    Published 2024-01-01
    “…Distributed denial-of-service (DDoS) attacks pose a significant threat to network security due to their widespread impact and detrimental consequences. …”
    Get full text
    Article
  12. 212

    Secondary attack rates of COVID-19 in diverse contact settings, a meta-analysis by Ting Tian, Xiang Huo

    Published 2020-12-01
    “… Introduction: The secondary attack rate (SAR) measures the transmissibility of an infectious agent. …”
    Get full text
    Article
  13. 213
  14. 214

    Facial recognition targeted attack algorithm based on multiscale frequency decomposition and meta-learning by CAI Jun, HUANG Tianqiang, ZHENG Aokun, YE Feng, XU Chao

    Published 2025-02-01
    “…The results of experimental analysis of different attack strategies demonstrate that the combination of multiscale frequency decomposition and meta-learning significantly enhances the success rate and robustness of attacks on facial recognition systems.…”
    Get full text
    Article
  15. 215

    An edge sensitivity based gradient attack on graph isomorphic networks for graph classification problems by Srinitish Srinivasan, Chandraumakantham OmKumar

    Published 2025-04-01
    “…Such attacks, classified as white box attacks, tamper with latent space representation of graphs without creating any noticeable difference in the overall distribution. …”
    Get full text
    Article
  16. 216

    Mobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks by Junsei Oda, Kazuhiro Takemoto

    Published 2025-05-01
    “…Through digital experiments with various DNN architectures trained on a publicly available skin lesion dataset, we first demonstrate that camera-based adversarial patterns can achieve high transferability across different models. Using these findings, we implement physical attacks by attaching optimized transparent stickers to mobile device cameras. …”
    Get full text
    Article
  17. 217

    A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects by Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, Jacques Bou Abdo, Mohammed Aledhari, Junaid Qadir, Kathleen Carley, Ala Al-Fuqaha

    Published 2025-05-01
    “…This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. …”
    Get full text
    Article
  18. 218

    Natural Occlusion-Based Backdoor Attacks: A Novel Approach to Compromising Pedestrian Detectors by Qiong Li, Yalun Wu, Qihuan Li, Xiaoshu Cui, Yuanwan Chen, Xiaolin Chang, Jiqiang Liu, Wenjia Niu

    Published 2025-07-01
    “…We design a dynamically optimized heuristic-based strategy to adaptively adjust the trigger’s position and size for diverse occlusion scenarios, and develop three model-independent trigger embedding mechanisms for attack implementation. We conduct extensive experiments on two different pedestrian detection models using publicly available datasets. …”
    Get full text
    Article
  19. 219

    Transfer learning for securing electric vehicle charging infrastructure from cyber-physical attacks by Ahmad Almadhor, Shtwai Alsubai, Imen Bouazzi, Vincent Karovic, Monika Davidekova, Abdullah Al Hejaili, Gabriel Avelino Sampedro

    Published 2025-03-01
    “…So many common signs of attacks are ignored. This paper proposes a Transfer learning (TL) framework for cyber-physical attack detection in EVCS in order to overcome these difficulties and improve both accuracy and scalability. …”
    Get full text
    Article
  20. 220

    Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology by Hussain M. Mustafa, Sajan K. Sadanandan, Anurag K. Srivastava, Arif R. Sarwari, Rebecca Reece

    Published 2024-01-01
    “…Building on the analysis of similarities between different aspects of cyber-power security and infectious diseases, this work aims to develop a bio-inspired, resilient cyber defense system that can identify, protect, detect, respond to, and recover from complex, well-targeted cyber attacks in power systems. …”
    Get full text
    Article