-
21
Malicious Attack Correlation Analysis Method of Source-Grid-Load System under Specific Attack Scenarios
Published 2019-10-01“…The correlation rules for different attack scenarios are automatically generated based on the classification results. …”
Get full text
Article -
22
AS-level model for restraining DoS attacks
Published 2013-09-01“…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
Get full text
Article -
23
The role of diet in the prevention of migraine attacks
Published 2021-11-01“…The review provides information concerning the influence of dietary factors and different types of diet on the origin and frequency of migraine headaches according to the up-to-date scientific data. …”
Get full text
Article -
24
Key committing attack on Tiaoxin-346 algorithm
Published 2025-04-01“…It ensures that an adversary cannot decrypt a given ciphertext to different sets of key, nonce, and associated data. …”
Get full text
Article -
25
On judges when the rule of law is under attack
Published 2025-04-01“… A main question of the paper is why the courts, and the judiciary are such a main focus of those in power who attack liberal democracy today. First it adresses the connections between democratic decline and rule of law backsliding. …”
Get full text
Article -
26
TRANSIENT ISCHEMIC ATTACK AS AN ARTERIAL HYPERTENSION COMPLICATION
Published 2015-12-01“…Data about relations between arterial hypertension, transient ischemic attacks (TIA) and strokes are presented. Pathophysiology, clinic and diagnosis of TIA are described. …”
Get full text
Article -
27
DIFshilling: A Diffusion Model for Shilling Attacks
Published 2025-03-01“…Existing shilling attack methods often face significant challenges in achieving both invisibility (i.e., making fake profiles indistinguishable from legitimate ones) and transferability (i.e., the ability to work across different RSs). …”
Get full text
Article -
28
Securing guarantee of the blockchain network:attacks and countermeasures
Published 2021-01-01“…While the security of blockchain has been the central concern of both academia and industry since the very start, new security threats continue to emerge, which poses great risks to the blockchain ecosystem.A systematic study was conducted on the most state-of-the-art research on potential security issues of blockchain.Specifically, a taxonomy was developed by considering the blockchain framework as a four-layer system, and the analysis on the most recent attacks against security loopholes in each layer was provided.Countermeasures that can strengthen the blockchain were also discussed by highlighting their fundamental ideas and comparing different solutions.Finally, the forefront of research and potential directions of blockchain security were put forward to encourage further studies on the security of blockchain.…”
Get full text
Article -
29
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article -
30
HMAC-Based Authentication Protocol: Attacks and Improvements
Published 2016-11-01“…Furthermore, security of our protocol is explored against different attacks such as; the replay attack, the tag’s ID exposure, the spoofing attack, DoS attack and traceability attack. …”
Get full text
Article -
31
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…The classification resulting from this model yielded high accuracy with robust results for different attack scenarios. Results reflect the potential superiority of the given model in detecting DDoS attacks. …”
Get full text
Article -
32
Improved Quantum Linear Attacks and Application to CAST
Published 2025-06-01“…We apply this idea to Feistel ciphers and exemplify different attack strategies on LOKI91 before applying our idea on the CAST-128 and CAST-256 ciphers. …”
Get full text
Article -
33
Threat Modeling AI/ML With the Attack Tree
Published 2024-01-01“…To ensure the validity and reliability of our findings, we have conducted a thorough and rigorous review of academic papers, summarizing different threats and attacks and their root cause analysis.…”
Get full text
Article -
34
Transient Ischemic Attack: Clinical Features and Outcome
Published 2017-11-01“…A Transient Ischemic Attack (TIA) is a state of emergency and an independent risk factor for ischemic stroke. …”
Get full text
Article -
35
Moving target defense against adversarial attacks
Published 2021-02-01“…Deep neural network has been successfully applied to image classification, but recent research work shows that deep neural network is vulnerable to adversarial attacks.A moving target defense method was proposed by means of dynamic switching model with a Bayes-Stackelberg game strategy, which could prevent an attacker from continuously obtaining consistent information and thus blocked its construction of adversarial examples.To improve the defense effect of the proposed method, the gradient consistency among the member models was taken as a measure to construct a new loss function in training for improving the difference among the member models.Experimental results show that the proposed method can improve the moving target defense performance of the image classification system and significantly reduce the attack success rate against the adversarial examples.…”
Get full text
Article -
36
The impact of the 2016 terrorist attacks in Brussels on tourism
Published 2018-03-01“…Scientists as well as the general public remember the terrorist attacks that took place in Brussels in March 2016. …”
Get full text
Article -
37
Clinical and psychopathological features of depressions with panic attacks
Published 2017-11-01“…The clinical and psychopathological picture of depression with panic attacks differed significantly in three identified groups of patients with neurotic depression (ND), recurrent depressive disorder (RDD), and bipolar affective disorder (BAD). …”
Get full text
Article -
38
Adaptive Template Attacks on the Kyber Binomial Sampler
Published 2025-06-01“…However, this performance is usually significantly diminished if the device, or even just the ad- dress space, used for profiling differs from the attacked one. Here we introduce a new technique for adapting templates generated from profiling devices in order to attack another device where we are also able to record many traces, but without knowledge of the random value held by the targeted variable. …”
Get full text
Article -
39
Approaches to panic attack symptoms in cardiology outpatients
Published 2025-05-01“…Abstract Cardiologists’ attitudes towards the patients with panic attack (PA) symptoms can be affected by many variables. …”
Get full text
Article -
40