-
241
Applying a Deep Neural Network and Feature Engineering to Assess the Impact of Attacks on Autonomous Vehicles
Published 2025-07-01“…The system evaluates the severity of incidents caused by attacks, distinguishing between different events—for example, a pedestrian injury is classified as more critical than a collision with an inanimate object. …”
Get full text
Article -
242
Principal Component Analysis-Multilinear Perceptron-based model for Distributed Denial of Service Attack Mitigation
Published 2025-05-01“…The PCA-MLP model proposed in this study demonstrated high performance, accurately identifying different types of DDoS attacks with an overall accuracy of 95.35%. …”
Get full text
Article -
243
A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
Published 2024-12-01“…The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. …”
Get full text
Article -
244
Salient object detection dataset with adversarial attacks for genetic programming and neural networksMendeley Data
Published 2024-12-01“…Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers' attacks. This dataset is an image repository containing five different image databases to evaluate adversarial robustness by introducing 12 adversarial examples, each leveraging a known adversarial attack or noise perturbation. …”
Get full text
Article -
245
Enhanced Synchrosqueezing Transform for Detecting Non-Traditional Flight Modes in High Angle of Attack Maneuvers
Published 2025-04-01“…Due to nonlinear aerodynamics, “non-traditional” flight modes may appear in longitudinal and lateral/directional dynamics once an aircraft experiences a high angle of attack and rapid maneuvers. Signal decomposition techniques are required to uncover these modes since they are hidden in flight characteristics. …”
Get full text
Article -
246
Early prediction of grape disease attack using a hybrid classifier in association with IoT sensors
Published 2024-10-01Get full text
Article -
247
TrapMI: A Data Protection Method to Resist Model Inversion Attacks in Split Learning
Published 2025-01-01“…The proposed method can induce an attacker to generate a class-specific target image that appears different from the original image when inverting the input image. …”
Get full text
Article -
248
Experimental and numerical study on the high-speed ship hydrodynamics influenced by an interceptor with varied angle of attack
Published 2024-01-01“…Efforts to improve the hydrodynamic performance of high-speed ships have been underway for a long time. There are different approaches, one of which is to take advantage of an interceptor. …”
Get full text
Article -
249
DDoS attack detection in intelligent transport systems using adaptive neuro-fuzzy inference system
Published 2025-07-01“…The protection of the intelligent transportation system from attacks and continual maintenance is crucial. In this research work, a Distributed Denial of Service attack detection scheme is proposed to protect the Intelligent Transportation System ecosystem, making use of the Adaptive Neuro-Fuzzy Inference System. …”
Get full text
Article -
250
Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning
Published 2025-07-01“…These systems are susceptible to physical and cyber-attacks, which can seriously affect human life and the economy. …”
Get full text
Article -
251
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security
Published 2025-07-01“…We have also created a confusion matrix over different kinds of attacks concerning predicted class and attack class, enabling us to evaluate the performance of a classification model for various attack groups without taking CSO and after applying the CSO approach. …”
Get full text
Article -
252
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Published 2024-12-01“…This difference is actually so important that a single sample can be considered for attacking one condition, and no training on other traces is required. …”
Get full text
Article -
253
Secure Scan Architecture for Enhanced Testability and Resistance Against Side-Channel Attacks in Cryptographic ICs
Published 2025-01-01“…Traditional scan-based Design for Testability (DFT) techniques give full visibility of internal nodes, which makes them vulnerable to side-channel attacks where the confidential data is compromised. …”
Get full text
Article -
254
Towards saturation attack detection in SDN: a multi-edge representation learning-based method
Published 2025-07-01“…Experiments conducted on two different network topologies demonstrate that the proposed method achieves high detection accuracy and strong graph representation capability, highlighting its effectiveness in identifying saturation attack flows.…”
Get full text
Article -
255
Research on load frequency control system attack detection method based on multi-model fusion
Published 2025-05-01“…Detection accuracy exceeds 99% for three different frequency characteristic attacks, with an average detection delay of only 0.12 seconds. …”
Get full text
Article -
256
GOOSE Secure: A Comprehensive Dataset for In-Depth Analysis of GOOSE Spoofing Attacks in Digital Substations
Published 2024-12-01“…The dataset highlights the real-world impacts of these attacks, demonstrating the execution of unintended operations under different operational scenarios, including both stable conditions and situations involving system failures. …”
Get full text
Article -
257
Breaking and Healing: GAN-Based Adversarial Attacks and Post-Adversarial Recovery for 5G IDSs
Published 2025-01-01“…Comprehensive experiments are conducted to evaluate the effectiveness of each GAN in exploiting IDS vulnerabilities and examine the transferability of adversarial attacks across different IDSs, considering the quality of the adversarial samples generated. …”
Get full text
Article -
258
Machine Learning-Based Methodologies for Cyber-Attacks and Network Traffic Monitoring: A Review and Insights
Published 2024-11-01“…However, these devices have several vulnerabilities that have led to the rapid growth in the number of attacks. Therefore, several machine learning-based intrusion detection system (IDS) tools have been developed to detect intrusions and suspicious activity to and from a host (HIDS—Host IDS) or, in general, within the traffic of a network (NIDS—Network IDS). …”
Get full text
Article -
259
The usage of power system multi-model forecasting aided state estimation for cyber attack detection
Published 2022-01-01“…Such an aggregate cyber-physical system can be subject to cyber attacks. One of the ways to counter cyberattacks is state estimation. …”
Get full text
Article -
260
A Novel Centrality-Based Attack Simulation: Evaluating Resilience and Vulnerability in China’s Knowledge Networks
Published 2025-05-01“…Existing research on the vulnerability of knowledge innovation networks (KINs) primarily falls into two categories: random attacks and deliberate attacks. This study introduces a novel centrality-based attack framework for the deliberate attack group and systematically examines the impact of different attack mechanisms (such as loss of connectivity, propagation delays, and structural fragmentation) on KINs. …”
Get full text
Article