-
301
Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment
Published 2019-01-01“…Text password systems are commonly used for identity authentication to access different kinds of data resources or services in cloud environment. …”
Get full text
Article -
302
Original actions performed by a beginner attacker modify defensive dispersion in small-sided soccer games
Published 2024-11-01“…Differences were found in the Stretch Index, Surface Area, and Team Width variables in SSG4v4 − Small and Surface Area in SSG5v5 − Small (p < 0.05). …”
Get full text
Article -
303
A Novel and Efficient Multi-Target Backdoor Attack for Deep Learning-Based Wireless Signal Classifiers
Published 2025-01-01“…The BackdoorNet is a lightweight model that can be injected into various target DL models without resource-intensive training, making the attack computationally efficient. We thoroughly investigate the attack’s effectiveness based on modulation classification accuracy (MCA), attack success rate (ASR), trigger false alarm rate (FAR), effect on signal characteristics, and generalization of attack performance across different target DL models. …”
Get full text
Article -
304
A comprehensive transplanting of black-box adversarial attacks from multi-class to multi-label models
Published 2025-03-01“…However, the performance of these transplanted attack algorithms shows variation among different attack types due to the correlations between labels.…”
Get full text
Article -
305
Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations
Published 2024-02-01“…Moreover, this analysis results shed light on the impact of such detection mechanisms towards building resiliency into different levels of the EV charging ecosystem while allowing power grid operators to localize attacks and take further mitigation measures. …”
Get full text
Article -
306
Securing IoT Against Slow-Rate DDoS Attacks: Implementation With Tofino P4 ASIC Hardware
Published 2025-01-01“…These attacks are not only materialized through stealthy and fast variants in different network layers but also adapt their behavior and objectives, increasingly targeting less protected devices, particularly those prevalent in Internet of Things (IoT) environments. …”
Get full text
Article -
307
False data injection attack dataset for classification, identification, and detection for IIoT in Industry 5.0Zenodo
Published 2025-08-01“…The new Industry 5.0 era of interaction and accessibility has been brought about by the widespread use of Industrial Internet of Things (IIoT) devices, however, it also has uncovered several security issues, with False Data Injection (FDI) attacks being a significant concern. The FDI attacks can interfere with the availability and operation of internet-connected IIoT devices, and pretence a serious security concern to Industry 5.0. …”
Get full text
Article -
308
Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios
Published 2025-01-01“…The adversarial training technique has been shown to improve the robustness of Machine Learning and Deep Learning models to adversarial attacks in the Computer Vision field. However, the effectiveness of this approach needs to be proven in the field of Anomaly Detection on industrial environments, where adversarial training has critical limitations. …”
Get full text
Article -
309
Dual Antiplatelet Therapy in Patients With Metabolic Syndrome After Mild Ischemic Stroke or Transient Ischemic Attack
Published 2025-08-01“…Patients with mild ischemic stroke or high‐risk transient ischemic attack were randomized to treatment with clopidogrel–aspirin or aspirin alone within 72 hours after symptom onset. …”
Get full text
Article -
310
Experiment for Effect of Attack Angle and Environmental Condition on Hydrodynamics of Near-Surface Swimming Fish-Like Robot
Published 2023-01-01“…Nine attack angles, five oscillating amplitudes, and three environmental conditions are analyzed in the experiments. …”
Get full text
Article -
311
K-Nearest Neighbors with Third-Order Distance for Flooding Attack Classification in Optical Burst Switching Networks
Published 2024-12-01“…However, OBS networks are susceptible to cyber-attacks, such as flooding attacks, which can degrade their performance and security. …”
Get full text
Article -
312
-
313
SUBJECT MATTER EXPERTS’ FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS
Published 2022-02-01“…Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. …”
Get full text
Article -
314
Serum detection of blood brain barrier injury in subjects with a history of stroke and transient ischemic attack
Published 2024-01-01“…Objective: Stroke and transient ischemic attack may have long-term negative effects on the blood-brain barrier (BBB) and promote endothelial inflammation, both of which could increase neurodegeneration and dementia risk beyond the cell death associated with the index event. …”
Get full text
Article -
315
Phenotyping the Responses to Systemic Corticosteroids in the Management of Asthma Attacks (PRISMA): protocol for an observational and translational pilot study
Published 2023-07-01“…Although severe asthma attacks are systematically prescribed corticosteroids and often antibiotics, little is known about the variability of response to these therapies. …”
Get full text
Article -
316
Consistency of group key exchange protocols
Published 2008-01-01“…These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. …”
Get full text
Article -
317
Consistency of group key exchange protocols
Published 2008-01-01“…These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. …”
Get full text
Article -
318
The Risk of Linked Census Data to Transgender Youth
Published 2025-03-01“…Our simulation assumed that in Texas, 0.2\% of the 3,095,857 residents who were under the age of 8 in the 2010 census were transgender and would have a different sex reported in the 2020 census, and 23\% would reside at the same address, which implied that 1,424 trans youth were at risk of having their transgender identity status disclosed by a reconstruction-abetted linkage attack. …”
Get full text
Article -
319
Efficacy and safety of long-term administration of various doses of colchicine in patients with gout
Published 2025-05-01“…The aim – to compare the efficacy and safety of different doses of colchicine (0.5 mg/day vs 1.0 mg/day) used for the prevention of arthritis attacks in gout patients during the initiation of urate-lowering therapy.Materials and methods. …”
Get full text
Article -
320
Multi‐data classification detection in smart grid under false data injection attack based on Inception network
Published 2024-10-01“…Abstract During operation, the smart grid is subject to different false data injection attacks (FDIA). If the different kinds of FDIAs and typical failures have been detected, the system operator can develop various defenses to protect the smart grid in multiple categories. …”
Get full text
Article