Showing 501 - 520 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 501

    Natural durability of five amazonian species in two different decay environments by Júlio Henrique Germano de Souza, Rafael Quirino dos Santos, Patrícia Aparecida Rigatto Castelo, Janaína De Nadai Corassa

    Published 2025-06-01
    “…ABSTRACT: Understanding the natural durability of Amazonian wood species in different deterioration environments is essential to promote their sustainable use and extend their useful life in various applications. …”
    Get full text
    Article
  2. 502

    Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT by Wei Yang, Xinlong Wang, Zhiming Zhang, Shaolong Chen, Chengqi Hou, Siwei Luo

    Published 2025-01-01
    “…The Pearson correlation can effectively extract key data features for different routing attacks. And the hybrid GS-PSO algorithm can optimize the hyperparameters of IDS model and enhance the accuracy of the detection mechanism while significantly reducing computational overhead. …”
    Get full text
    Article
  3. 503

    Investigating Potential Gender Differences in ChatGPT-Diagnosed Clinical Vignettes by Anjali Mediboina, Meghana Bhupathi, Keerthana Janapareddy

    Published 2025-01-01
    “…AIMS: This study seeks to investigate gender differences in diagnostic accuracy within ChatGPT 3.5 by evaluating the accuracy and completeness of its responses to various clinical vignettes. …”
    Get full text
    Article
  4. 504
  5. 505

    MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN by Claudia-Alecsandra GABRIAN

    Published 2023-01-01
    “…The objectives of the paper are to identify those cybercrime groups that use the ransomware attack or advanced persistent threat methods to carry out major cyber-attacks and how they changed their attack method after the outbreak of the conflict. …”
    Get full text
    Article
  6. 506

    Reputation computation based on new metric in P2P network by BAO Yu1, ZENG Guo-sun1, ZENG Lian-sun3, CHEN Bo1, WANG Wei1

    Published 2008-01-01
    “…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
    Get full text
    Article
  7. 507

    Verification of color characteristics of document images captured in uncontrolled conditions by I.A. Kunina, O.A. Padas, O.A. Kolomyttseva

    Published 2024-08-01
    “…This paper examines a presentation attack when a color photo of a gray copy of a document is presented instead of the original color document during remote user identification. …”
    Get full text
    Article
  8. 508

    UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems by Zhibo Zhang, Benjamin Turnbull, Shabnam Kasra Kermanshahi, Hemanshu Pota, Jiankun Hu

    Published 2025-01-01
    “…This dataset contains synthesized benign network traffic from different campus departments, network flow of attack activities, system call traces, and microgrid-specific data from an integrated Festo LabVolt microgrid system. …”
    Get full text
    Article
  9. 509

    An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs by T. Sudhakar, R. Praveen, V. Natarajan

    Published 2025-03-01
    “…Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. …”
    Get full text
    Article
  10. 510

    Adversarial Security Analysis of Cryptographic Protocols for IoD Networks by Snehal Samanth, Prema K. V., Mamatha Balachandra

    Published 2024-01-01
    “…Due to the vast amounts of data transmission in an Internet of Drones (IoD) network, it is vulnerable to different cyber attacks. Our previous works deal with cryptographic algorithms i.e. an Authenticated Key Agreement (AKA) algorithm named Elliptic Curve Cryptography based AKA integrating Timestamps and Trigonometric concepts (ECCTST) and an encryption algorithm named Customized Lightweight Encryption Algorithm (CLEA)-256 for a legitimate IoD network. …”
    Get full text
    Article
  11. 511
  12. 512
  13. 513

    Tactical and statistical analysis of spiking efficiency by type, zone and set phase in women's volleyball by Kiattisak Sitti, K. Ravivuth Rangubhet

    Published 2025-08-01
    “…Tip shots had the lowest efficiency (EI = 0.22) but the highest continuation rate (61%). Side zone attacks exhibited higher kill rates (25.2%) and efficiency (EI = 0.227) than central zone attacks (14.1% kill rate, EI = 0.106). …”
    Get full text
    Article
  14. 514
  15. 515
  16. 516
  17. 517

    An Experimental and Quantum Chemical Calculation Study on the Performance of Different Types of Ester Collectors by Di Wu, Jianhua Chen, Yuqiong Li

    Published 2025-01-01
    “…Quantum chemical calculations show the energy difference between the HOMOs of the collector and the LUMOs of minerals. …”
    Get full text
    Article
  18. 518

    Kinematic Differences in the Roundhouse Kick among University Taekwondo Players: Brief Report by Raúl Josue Nájera-Longoria, Omar Ricardo Ortiz-Gómez, Samuel Alfredo Islas-Guerra, Arturo Iván Chávez-Erives, Arturo Martínez-Trevizo, Víctor Hugo López-Trujillo, Mario Armando Amorós Gómez

    Published 2024-01-01
    “…The analysis revealed no significant differences in reaction times (0.15 ±0.03 and 0.15 ±0.04 s, n=20), movement times (0.62 ±0.06 and 0.64 ±0.04 s, n=20), or attack times (0.77 ±0.09 and 0.79 ±0.06 s, n=20) for the dominant and non-dominant legs (p>0.05). …”
    Get full text
    Article
  19. 519

    Strain-specific differences in cerulein-induced acute and recurrent acute murine pancreatitis by Alexandra Demcsák, Thanh Tran, Miklós Sahin-Tóth, Andrea Geisz-Fremy

    Published 2025-05-01
    “…In FVB/N mice, we now found that the second episode was associated with lower pancreas edema and plasma amylase but higher inflammatory cell infiltration than the first attack. The observations reinforce the notion that inbred mouse strains exhibit differences in their pathological responses during acute and recurrent acute pancreatitis.…”
    Get full text
    Article
  20. 520

    Robust Adversarial Example Detection Algorithm Based on High-Level Feature Differences by Hua Mu, Chenggang Li, Anjie Peng, Yangyang Wang, Zhenyu Liang

    Published 2025-03-01
    “…To address these challenges, this paper introduces a novel adversarial example detection algorithm based on high-level feature differences (HFDs), which is specifically designed to improve robustness against both attacks and preprocessing operations. …”
    Get full text
    Article