Showing 61 - 80 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 61

    Practical Opcode-based Fault Attack on AES-NI by Xue Gong, Xin Zhang, Qianmei Wu, Fan Zhang, Junge Xu, Qingni Shen, Zhi Zhang

    Published 2025-06-01
    “…By analyzing the opcodes of AES-NI, we identify six pairs of instructions with only a single-bit difference, making them susceptible to bit-flip-type attacks. …”
    Get full text
    Article
  2. 62

    Probabilistic characteristics analysis of virus attack effect on digital substations by Alexander S. Leontyev, Dmitry V. Zhmatov

    Published 2025-02-01
    “…Security technologies consider different maintenance personnel operation modes to ensure customer fulfillment requirements for safe information processing probability and the case of deliberate attacks on digital substations in each period.Conclusions. …”
    Get full text
    Article
  3. 63

    Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems by Meaad Ahmed, Qutaiba Alasad, Jiann-Shiun Yuan, Mohammed Alawad

    Published 2024-12-01
    “…Among different attacks, generative adversarial networks (GANs) have been known as one of the most powerful threats to cybersecurity systems. …”
    Get full text
    Article
  4. 64

    Equilibrium analysis of block withholding attack: an evolutionary game perspective by Yukun Cheng, Zhanghao Yao, Zhiqi Xu, Xiaojing Ye

    Published 2022-12-01
    “…Due to the permissionless environment, the blockchain is vulnerable to different kinds of attacks, including the block withholding (BWH) attack. …”
    Get full text
    Article
  5. 65

    On Power-Off Temperature Attacks Potential Against Security Sensors by Maryam Esmaeilian, Vincent Beroulle, David Hély

    Published 2025-03-01
    “…Although numerous security sensors and attack detectors have been proposed in the literature to detect different sources of FIAs, it is crucial to ensure that these mechanisms themselves have not been tampered. …”
    Get full text
    Article
  6. 66

    Unveiling the Efficacy of AI-based Algorithms in Phishing Attack Detection by Tajamul Shahzad, Kashif Aman

    Published 2024-06-01
    “…Moreover, the paper shows how different AI techniques have been employed in multiple studies to detect and address phishing attacks. …”
    Get full text
    Article
  7. 67

    Hybrid quantum enhanced federated learning for cyber attack detection by G. Subramanian, M. Chinnadurai

    Published 2024-12-01
    “…Abstract Cyber-attack brings significant threat and become a critical issue in the digital world network security. …”
    Get full text
    Article
  8. 68

    Inferring influenza infection attack rate from seroprevalence data. by Joseph T Wu, Kathy Leung, Ranawaka A P M Perera, Daniel K W Chu, Cheuk Kwong Lee, Ivan F N Hung, Che Kit Lin, Su-Vui Lo, Yu-Lung Lau, Gabriel M Leung, Benjamin J Cowling, J S Malik Peiris

    Published 2014-04-01
    “…Seroprevalence survey is the most practical method for accurately estimating infection attack rate (IAR) in an epidemic such as influenza. …”
    Get full text
    Article
  9. 69

    Overview of control-flow hijacking attack and defense techniques for process by Fengfeng WANG, Tao ZHANG, Weiguang XU, Meng SUN

    Published 2019-12-01
    “…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
    Get full text
    Article
  10. 70

    Analysis of DoS attacks on Docker inter-component stdio copy by Tianyu ZHOU, Wenbo SHEN, Nanzi YANG, Jinku LI, Chenggang QIN, Wang YU

    Published 2020-12-01
    “…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
    Get full text
    Article
  11. 71

    New forgery attack on the authenticated cipher SCREAM and iSCREAM by Yu-dan TIAN, Yong-zhuang WEI

    Published 2016-01-01
    “…In particular, this attack could also be used to iSCREAM algorithm. Different to the best known attacks, the new attack requires less time and data complexities. …”
    Get full text
    Article
  12. 72

    Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection by Jayakumar Kaliappan, Revathi Thiagarajan, Karpagam Sundararajan

    Published 2015-01-01
    “…An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. …”
    Get full text
    Article
  13. 73

    Traffic Rerouting Strategy against Jamming Attacks in WSNs for Microgrid by Yujin Lim, Hak-Man Kim, Tetsuo Kinoshita

    Published 2012-04-01
    “…We determine disjoint multiple paths as candidates of a detour path and then select the detour path among the candidates in order to reduce the effect of jamming attack and distribute traffic flows on different detour paths. …”
    Get full text
    Article
  14. 74

    The Dangerous Effects of a Frustratingly Easy LLMs Jailbreak Attack by Marco Bombieri, Simone Paolo Ponzetto, Marco Rospocher

    Published 2025-01-01
    “…In particular, the vulnerabilities exposed by such attacks appear to be generalizable across different LLMs and languages. …”
    Get full text
    Article
  15. 75

    Dual-verification-based model fingerprints against ambiguity attacks by Boyao Zhao, Haozhe Chen, Jie Zhang, Weiming Zhang, Nenghai Yu

    Published 2024-12-01
    “…However, there is a concern regarding the vulnerability of previous model fingerprints to “ambiguity attacks,” where attackers may use fabricated fingerprints to bypass ownership verification, potentially leading to disputes. …”
    Get full text
    Article
  16. 76

    LDoS attack detection method based on traffic classification prediction by Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan, Meng Yue

    Published 2022-03-01
    “…The experimental results show that the global LDoS attack traffic detection method based on the Hurst index and GBDT algorithm achieves better detection results under different attack rates.…”
    Get full text
    Article
  17. 77

    Mitigating opinion polarization in social networks using adversarial attacks by Michinori Ninomiya, Genki Ichinose, Katsumi Chiyomaru, Kazuhiro Takemoto

    Published 2025-03-01
    “…Recently, it was found that even a few artificial perturbations inspired by the adversarial attack reverse the result in voter models, where a minority opinion becomes dominant through these perturbations. …”
    Get full text
    Article
  18. 78

    ProvNavigator: shadow path guided attack investigation method by XI Hao, FAN Hao, YUAN Shenyang, ZHU Jinyu, CHEN Changhua, WAN Hai, ZHAO Xibin

    Published 2025-04-01
    “…After cyber attacks, conducting an investigation to analyze its root cause and impact is crucial. …”
    Get full text
    Article
  19. 79

    Task Allocation and Saturation Attack Approach for Unmanned Underwater Vehicles by Qiangqiang Chen, Baisheng Liu, Changdong Yu, Mingkai Yang, Haonan Guo

    Published 2025-02-01
    “…In modern marine warfare, unmanned underwater vehicles (UUVs) have fast and efficient attack capabilities. However, existing research on UUV attack strategies is relatively limited, often ignoring the requirement for the effective allocation of different strategic value areas, which restricts its performance in the marine combat environment. …”
    Get full text
    Article
  20. 80

    Simulated Adversarial Attacks on Traffic Sign Recognition of Autonomous Vehicles by Chu-Hsing Lin, Chao-Ting Yu, Yan-Ling Chen, Yo-Yu Lin, Hsin-Ta Chiao

    Published 2025-04-01
    “…Different attack methods interfered with the original machine learning model to a certain extent, hindering autonomous vehicles from recognizing traffic signs and detecting them accurately.…”
    Get full text
    Article