Showing 261 - 280 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 261

    AI-Driven Ensemble Classifier for Jamming Attack Detection in VANETs to Enhance Security in Smart Cities by Walid El-Shafai, Ahmad Taher Azar, Saim Ahmed

    Published 2025-01-01
    “…However, the rising prevalence of jamming attacks, characterized by the intentional disruption of communications through interference signals, presents a significant challenge to the security of VANETs and, consequently, public safety. …”
    Get full text
    Article
  2. 262

    Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks by Amjed A. Ahmed, Mohammad Kamrul Hasan, Azana H. Aman, Nurhizam Safie, Shayla Islam, Fatima A. Ahmed, Thowiba E. Ahmed, Bishwajeet Pandey, Leila Rzayeva

    Published 2024-01-01
    “…During the years 2018-2024, considerable advancements have been achieved in the use of deep learning for side channel attacks. The security of cryptographic algorithm implementations is put at risk by this. …”
    Get full text
    Article
  3. 263

    A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks by Ibrahim S. Alsukayti, Mohammed Alreshoodi, Mehdi Rouissat

    Published 2025-01-01
    “…It is also possible for further variants of such an adverse attack to emerge and incur a different and significant impact on RPL networks. …”
    Get full text
    Article
  4. 264

    Efficacy and safety of Russian tableted rizatriptan 10 mg in the treatment of migraine attacks in clinical practice by E. G. Filatova, N. V. Latysheva, N. B. Kadymova, A. V. Berdnikova

    Published 2024-08-01
    “…Triptans are a targeted therapy for acute migraine attacks. They are recommended for the treatment of severe attacks when non-specific analgesics are not effective. …”
    Get full text
    Article
  5. 265

    Distinguishing stroke from transient ischemic attack using plaque characteristics and arterial transit artifacts by Ling Li, Peichun Pan, Na Zhang, Yu Wen, Min Tang, Kai Ai, Xiaoling Zhang, Xiaoyan Lei, Xuejiao Yan

    Published 2025-03-01
    “…PurposeWe aimed to investigate the differences in plaque characteristics and hemodynamics in patients with ischemic stroke and transient ischemic attack (TIA), comparing the diagnostic abilities of high-resolution magnetic resonance imaging (HRMRI) and arterial spin labeling (ASL) for ischemic stroke.MethodsThis retrospective analysis included patients who underwent HRMRI and ASL between October 2020 and December 2023. …”
    Get full text
    Article
  6. 266

    Modeling of strike drone missions for conducting wave attacks in conditions of enemy anti-drone actions by Oleg Fedorovich, Dmytro Krytskyi, Mikhail Lukhanin, Oleksandr Prokhorov, Yuliia Leshchenko

    Published 2025-02-01
    “…The actual problem of studying military logistics actions to form missions of a swarm of attack drones for conducting massive attacks on enemy targets is formed and solved. …”
    Get full text
    Article
  7. 267

    Impacts of dry swing intervention on bat speed and attack angle: an analysis of core intervention factors by Hanyao Li, Gang Cheng, Gang Cheng, Tianfeng Zhang

    Published 2025-06-01
    “…IntroductionThis study investigated the effects of dry swing intervention using differently weighted baseball bats on bat speed and attack angles during actual swing, simulating warm-up routines. …”
    Get full text
    Article
  8. 268
  9. 269
  10. 270
  11. 271

    Study on correction technology of aircraft angle-of-attack signal based on estimation of side-slip angle by XUE Yuan, LIU Shimin, WEI Jianlong

    Published 2025-06-01
    “…The inconsistency of the local airflow on both sides of the nose will cause the difference of the angle-of-attack signal.The signal-monitoring voting logic of the flight control system will judge the angle-of-attack signal and make the angle-of-attack availability decrease. …”
    Get full text
    Article
  12. 272

    The Effect of Angle of Attack and Flow Conditions on Turbulent Boundary Layer Noise of Small Wind Turbines by Nadiia AFANASIEVA

    Published 2016-11-01
    “…For the VAWT with the local angle of attack ranging from 4◦ to 20◦ the acoustic spectrum varies within low and broadband frequency bands 2 Hz – 20 kHz.…”
    Get full text
    Article
  13. 273

    Intravenous methylprednisolone versus oral prednisone for initial attacks of optic neuritis, A review of evidence by Teresita R. Castillo, MD, MHPEd

    Published 2005-06-01
    “…Most patients retained good to excellent vision following an attack of optic neuritis regardless of treatment received. …”
    Get full text
    Article
  14. 274

    Active disturbance rejection control for load frequency control systems under uncertainty and resonance attacks by Xingqi Hu, Wen Tan, Guolian Hou

    Published 2025-08-01
    “…The necessity of addressing the issue of counteracting cyber-attacks is of paramount importance to the power grid system. …”
    Get full text
    Article
  15. 275
  16. 276
  17. 277

    Detection of Varicella Zoster Virus Reactivation in Cerebrospinal Fluid in Ischemic Stroke or Transient Ischemic Attack by Wenyang Li, Peter Sguigna, Chintan Rupareliya, Suriya Subramanian, Hisham Salahuddin, Khalil S. Husari, William Moore, Mark Johnson, Alejandro Magadan, Charles Grose, Ank E. Nijhawan, Ty Shang

    Published 2025-07-01
    “…The cause of AIS and transient ischemic attack was classified using the SSS‐TOAST (Stop Stroke Study‐Trial of ORG 10172 in Acute Stroke Treatment) criteria. …”
    Get full text
    Article
  18. 278

    Multitier ensemble classifiers for malicious network traffic detection by Jie WANG, Lili YANG, Min YANG

    Published 2018-10-01
    “…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
    Get full text
    Article
  19. 279

    Multitier ensemble classifiers for malicious network traffic detection by Jie WANG, Lili YANG, Min YANG

    Published 2018-10-01
    “…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
    Get full text
    Article
  20. 280

    Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis by Ahmad Mohammadi, Reza Ahmari, Vahid Hemmati, Frederick Owusu-Ambrose, Mahmoud Nabil Mahmoud, Parham Kebria, Abdollah Homaifar

    Published 2025-01-01
    “…This detection is facilitated through time series analysis at 25 and 50 s intervals to build a profile of data errors and distribution to predict the probability of such attacks. To evaluate the algorithm's effectiveness, five different test datasets depicting four types of spoofing scenarios—turn-by-turn, overshoot, stop, and multiple small biased attacks—were created using data from the publicly accessible Honda Research Institute Driving Dataset (HDD). …”
    Get full text
    Article