Showing 121 - 140 results of 2,541 for search 'different attack', query time: 0.10s Refine Results
  1. 121

    A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms by Jannatul Ferdous, Rafiqul Islam, Arash Mahboubi, Md. Zahidul Islam

    Published 2023-01-01
    “…We extensively review the malware landscape from 1970 to the present and analyze malware types, operational mechanisms, attack vectors, and vulnerabilities. Furthermore, we explore different defensive strategies developed in response to these evolving threats. …”
    Get full text
    Article
  2. 122

    The attacking style of teams is determinant of high-intensity actions of soccer referees by Paulo Sandi, Anderson S Teixeira, Gabriel S G Maia, Pedro V S Passos, Paulo V Souza, Carlo Castagna, Paulo H Borges, Juliano F Silva

    Published 2024-09-01
    “…A total of 3898 (FRs: 2118; ARs: 1780) actions were analyzed by video-motion to determine attacking style: counterattack (CA), fast attack (FA) and positional attack (PA). …”
    Get full text
    Article
  3. 123

    Experimental study on dynamic mechanical properties of concrete under sulfate attack by Ruixue Liu, Xianbiao Mao, Bing Li, Yan Li, Lianying Zhang

    Published 2025-03-01
    “…The dissipation energy of concrete subject to sulfate attack is more sensitive to the strain rate compared with concrete free from sulfate attack, and the increase of strain rate will obviously decrease the energy utilization rate of concrete subject to sulfate attack.…”
    Get full text
    Article
  4. 124

    Sulfate attack on geopolymer: effect of the proportion of binder and air-entraining additive by Neusa Aparecida Munhak Beltrame, Vitor Lorival Kudlanvec Junior, Rafaela Souto, Amanda Venancio Trisotto, João Cláudio Nascimento da Silva, Ronaldo Alves de Medeiros-Junior

    Published 2024-09-01
    “…Abstract This research aimed to evaluate the resistance to sodium and magnesium sulfates of geopolymeric mortars, prepared with different proportions of alkaline activators of silicate and sodium hydroxide (Ma), Na2O content in relation to metakaolin (MK) and silica modulus (Ms). …”
    Get full text
    Article
  5. 125
  6. 126

    Microbial communities in the phyllosphere and endosphere of Norway spruce under attack by Heterobasidion by Wen-jing Meng, Zi-lan Wen, Risto Kasanen, Hui Sun, Hui Sun, Fred O. Asiegbu

    Published 2025-01-01
    “…Fungal communities from the same anatomic region differed between the symptomatic and asymptomatic trees. …”
    Get full text
    Article
  7. 127

    Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques by Jabbar Mahmood, Rahim Ali Qamar, Shahzad Latif

    Published 2024-02-01
    “…The research focuses on detecting PUEAs using the time difference of arrivals (TDOA) to detect the attacker and reduce detection errors using heuristic techniques. …”
    Get full text
    Article
  8. 128

    Simple power analysis attack against cryptosystems based on Montgomery algorithm by Gang GAN, Min WANG, Zhi-bo DU, Zhen WU

    Published 2013-08-01
    “…The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. …”
    Get full text
    Article
  9. 129

    Simple power analysis attack against cryptosystems based on Montgomery algorithm by Gang GAN, Min WANG, Zhi-bo DU, Zhen WU

    Published 2013-08-01
    “…The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. …”
    Get full text
    Article
  10. 130

    Detection of attacker and location in wireless sensor network as an application for border surveillance by Mohammed Aseeri, Muhammad Ahmed, Mohammed Shakib, Oussama Ghorbel, Hussian Shaman

    Published 2017-11-01
    “…We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. …”
    Get full text
    Article
  11. 131

    Experimental evaluation of differential fault attack on lightweight block cipher PIPO by SeongHyuck Lim, Dong‐Guk Han

    Published 2023-01-01
    “…A Differential fault attack (DFA) is a type of SCA that induces fault in cryptographic operations and utilises difference information that occurs. …”
    Get full text
    Article
  12. 132

    EVALUATION OF A BEACH VOLLEYBALL SKILL INSTRUMENT FOR THE LINE SHOT ATTACK by George Giatsis, Afroditi Lola, Dimitris Hatzimanouil, George Tzetzis

    Published 2023-05-01
    “…Therefore, the line shot attack test can be used as a valid and reliable measurement instrument for evaluating the performance of beach volleyball athletes.…”
    Get full text
    Article
  13. 133

    Stochastic Evolutionary Analysis of an Aerial Attack–Defense Game in Uncertain Environments by Shiguang Hu, Le Ru, Bo Lu, Zhenhua Wang, Wenfei Wang, Hailong Xi

    Published 2024-09-01
    “…Aiming at the problem of random environment interference in the process of strategy interaction and the behavioral evolution of an aerial attack–defense game, this paper considers the influence of the difference in the performance and value between both game players in terms of strategy evolution; explores the randomness of the complex battlefield environment, the uncertainty of the behavioral state of game players, and the limitations of the emergent situation; constructs a mathematical model of the stochastic evolution of an aerial-coordinated attack–defense game in uncertain environments; and studies the stability of the strategy interaction and behavioral decision-making process of both players of the aerial attack–defense game. …”
    Get full text
    Article
  14. 134

    Evaluation of Sleep Quality in Patients with Migraine Attacks Presenting to the Emergency Department by Sümeyye Çakmak, Ruken Şimşekoğlu

    Published 2024-12-01
    “…Objective: To investigate the sleep quality of adult patients presenting to the emergency department (ED) with migraine attacks and explore the correlations with age, gender, and education period. …”
    Get full text
    Article
  15. 135

    Leveraging the Chain on Goals Model in Football: Applications for Attack and Defensive Play by Blanca De-la-Cruz-Torres, Miguel Navarro-Castro, Anselmo Ruiz-de-Alarcón-Quintero

    Published 2025-01-01
    “…This study aims to contribute to this area by applying the chain on goals model to analyze both the attacking and defensive phases of football matches. …”
    Get full text
    Article
  16. 136

    A Quantum Differential Attack on ChaCha and Related Resources Estimation by Mintu Mandal, Hirendra Kumar Garai, Sabyasachi Dey

    Published 2025-01-01
    “…However, since the setups for brute force attacks and differential attacks with probabilistic neutral bits differ significantly, the feasibility of applying Grover’s algorithm to the existing differential attacks on ChaCha remained unclear. …”
    Get full text
    Article
  17. 137

    You Only Attack Once: Single-Step DeepFool Algorithm by Jun Li, Yanwei Xu, Yaocun Hu, Yongyong Ma, Xin Yin

    Published 2024-12-01
    “…Adversarial attacks expose the latent vulnerabilities within artificial intelligence systems, necessitating a reassessment and enhancement of model robustness to ensure the reliability and security of deep learning models against malicious attacks. …”
    Get full text
    Article
  18. 138
  19. 139

    Multi-stage detection method for APT attack based on sample feature reinforcement by Lixia XIE, Xueou LI, Hongyu YANG, Liang ZHANG, Xiang CHENG

    Published 2022-12-01
    “…Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stages, a multi-stage detection method for APT attack based on sample feature reinforcement was proposed.Firstly, the malicious flow was divided into different attack stages and the APT attack identification sequences were constructed by analyzing the characteristics of the APT attack.In addition, sequence generative adversarial network was used to simulate the generation of identification sequences in the multi-stage of APT attacks.Sample feature reinforcement was achieved by increasing the number of sequence samples in different stages, which improved the diversity of multi-stage sample features.Finally, a multi-stage detection network was proposed.Based on the multi-stage perceptual attention mechanism, the extracted multi-stage flow features and identification sequences were calculated by attention to obtain the stage feature vectors.The feature vectors were used as auxiliary information to splice with the identification sequences.The detection model’s perception ability in different stages was enhanced and the detection accuracy was improved.The experimental results show that the proposed method has remarkable detection effects on two benchmark datasets and has better effects on multi-class potential APT attacks than other models.…”
    Get full text
    Article
  20. 140

    Multi-stage detection method for APT attack based on sample feature reinforcement by Lixia XIE, Xueou LI, Hongyu YANG, Liang ZHANG, Xiang CHENG

    Published 2022-12-01
    “…Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stages, a multi-stage detection method for APT attack based on sample feature reinforcement was proposed.Firstly, the malicious flow was divided into different attack stages and the APT attack identification sequences were constructed by analyzing the characteristics of the APT attack.In addition, sequence generative adversarial network was used to simulate the generation of identification sequences in the multi-stage of APT attacks.Sample feature reinforcement was achieved by increasing the number of sequence samples in different stages, which improved the diversity of multi-stage sample features.Finally, a multi-stage detection network was proposed.Based on the multi-stage perceptual attention mechanism, the extracted multi-stage flow features and identification sequences were calculated by attention to obtain the stage feature vectors.The feature vectors were used as auxiliary information to splice with the identification sequences.The detection model’s perception ability in different stages was enhanced and the detection accuracy was improved.The experimental results show that the proposed method has remarkable detection effects on two benchmark datasets and has better effects on multi-class potential APT attacks than other models.…”
    Get full text
    Article