-
121
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms
Published 2023-01-01“…We extensively review the malware landscape from 1970 to the present and analyze malware types, operational mechanisms, attack vectors, and vulnerabilities. Furthermore, we explore different defensive strategies developed in response to these evolving threats. …”
Get full text
Article -
122
The attacking style of teams is determinant of high-intensity actions of soccer referees
Published 2024-09-01“…A total of 3898 (FRs: 2118; ARs: 1780) actions were analyzed by video-motion to determine attacking style: counterattack (CA), fast attack (FA) and positional attack (PA). …”
Get full text
Article -
123
Experimental study on dynamic mechanical properties of concrete under sulfate attack
Published 2025-03-01“…The dissipation energy of concrete subject to sulfate attack is more sensitive to the strain rate compared with concrete free from sulfate attack, and the increase of strain rate will obviously decrease the energy utilization rate of concrete subject to sulfate attack.…”
Get full text
Article -
124
Sulfate attack on geopolymer: effect of the proportion of binder and air-entraining additive
Published 2024-09-01“…Abstract This research aimed to evaluate the resistance to sodium and magnesium sulfates of geopolymeric mortars, prepared with different proportions of alkaline activators of silicate and sodium hydroxide (Ma), Na2O content in relation to metakaolin (MK) and silica modulus (Ms). …”
Get full text
Article -
125
Improving LLM Outputs Against Jailbreak Attacks With Expert Model Integration
Published 2025-01-01Get full text
Article -
126
Microbial communities in the phyllosphere and endosphere of Norway spruce under attack by Heterobasidion
Published 2025-01-01“…Fungal communities from the same anatomic region differed between the symptomatic and asymptomatic trees. …”
Get full text
Article -
127
Detection of Emulation Attacks in Cognitive Radio Networks using Heuristic Techniques
Published 2024-02-01“…The research focuses on detecting PUEAs using the time difference of arrivals (TDOA) to detect the attacker and reduce detection errors using heuristic techniques. …”
Get full text
Article -
128
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01“…The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. …”
Get full text
Article -
129
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01“…The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. …”
Get full text
Article -
130
Detection of attacker and location in wireless sensor network as an application for border surveillance
Published 2017-11-01“…We use both the Dempster–Shafer theory and the time difference of arrival method to identify and locate an attacked node. …”
Get full text
Article -
131
Experimental evaluation of differential fault attack on lightweight block cipher PIPO
Published 2023-01-01“…A Differential fault attack (DFA) is a type of SCA that induces fault in cryptographic operations and utilises difference information that occurs. …”
Get full text
Article -
132
EVALUATION OF A BEACH VOLLEYBALL SKILL INSTRUMENT FOR THE LINE SHOT ATTACK
Published 2023-05-01“…Therefore, the line shot attack test can be used as a valid and reliable measurement instrument for evaluating the performance of beach volleyball athletes.…”
Get full text
Article -
133
Stochastic Evolutionary Analysis of an Aerial Attack–Defense Game in Uncertain Environments
Published 2024-09-01“…Aiming at the problem of random environment interference in the process of strategy interaction and the behavioral evolution of an aerial attack–defense game, this paper considers the influence of the difference in the performance and value between both game players in terms of strategy evolution; explores the randomness of the complex battlefield environment, the uncertainty of the behavioral state of game players, and the limitations of the emergent situation; constructs a mathematical model of the stochastic evolution of an aerial-coordinated attack–defense game in uncertain environments; and studies the stability of the strategy interaction and behavioral decision-making process of both players of the aerial attack–defense game. …”
Get full text
Article -
134
Evaluation of Sleep Quality in Patients with Migraine Attacks Presenting to the Emergency Department
Published 2024-12-01“…Objective: To investigate the sleep quality of adult patients presenting to the emergency department (ED) with migraine attacks and explore the correlations with age, gender, and education period. …”
Get full text
Article -
135
Leveraging the Chain on Goals Model in Football: Applications for Attack and Defensive Play
Published 2025-01-01“…This study aims to contribute to this area by applying the chain on goals model to analyze both the attacking and defensive phases of football matches. …”
Get full text
Article -
136
A Quantum Differential Attack on ChaCha and Related Resources Estimation
Published 2025-01-01“…However, since the setups for brute force attacks and differential attacks with probabilistic neutral bits differ significantly, the feasibility of applying Grover’s algorithm to the existing differential attacks on ChaCha remained unclear. …”
Get full text
Article -
137
You Only Attack Once: Single-Step DeepFool Algorithm
Published 2024-12-01“…Adversarial attacks expose the latent vulnerabilities within artificial intelligence systems, necessitating a reassessment and enhancement of model robustness to ensure the reliability and security of deep learning models against malicious attacks. …”
Get full text
Article -
138
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01Get full text
Article -
139
Multi-stage detection method for APT attack based on sample feature reinforcement
Published 2022-12-01“…Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stages, a multi-stage detection method for APT attack based on sample feature reinforcement was proposed.Firstly, the malicious flow was divided into different attack stages and the APT attack identification sequences were constructed by analyzing the characteristics of the APT attack.In addition, sequence generative adversarial network was used to simulate the generation of identification sequences in the multi-stage of APT attacks.Sample feature reinforcement was achieved by increasing the number of sequence samples in different stages, which improved the diversity of multi-stage sample features.Finally, a multi-stage detection network was proposed.Based on the multi-stage perceptual attention mechanism, the extracted multi-stage flow features and identification sequences were calculated by attention to obtain the stage feature vectors.The feature vectors were used as auxiliary information to splice with the identification sequences.The detection model’s perception ability in different stages was enhanced and the detection accuracy was improved.The experimental results show that the proposed method has remarkable detection effects on two benchmark datasets and has better effects on multi-class potential APT attacks than other models.…”
Get full text
Article -
140
Multi-stage detection method for APT attack based on sample feature reinforcement
Published 2022-12-01“…Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stages, a multi-stage detection method for APT attack based on sample feature reinforcement was proposed.Firstly, the malicious flow was divided into different attack stages and the APT attack identification sequences were constructed by analyzing the characteristics of the APT attack.In addition, sequence generative adversarial network was used to simulate the generation of identification sequences in the multi-stage of APT attacks.Sample feature reinforcement was achieved by increasing the number of sequence samples in different stages, which improved the diversity of multi-stage sample features.Finally, a multi-stage detection network was proposed.Based on the multi-stage perceptual attention mechanism, the extracted multi-stage flow features and identification sequences were calculated by attention to obtain the stage feature vectors.The feature vectors were used as auxiliary information to splice with the identification sequences.The detection model’s perception ability in different stages was enhanced and the detection accuracy was improved.The experimental results show that the proposed method has remarkable detection effects on two benchmark datasets and has better effects on multi-class potential APT attacks than other models.…”
Get full text
Article