-
141
On the performance of non‐profiled side channel attacks based on deep learning techniques
Published 2023-05-01“…This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non‐profiled attacks on the AES‐128 encryption implementation. …”
Get full text
Article -
142
Modeling and Detection of Cyber and Physical Attacks on the Control Unit of PV Farm System
Published 2025-06-01“… The use of solar panels is becoming increasingly important now as a source of renewable energy. With the different systems designed to invest solar energy and the different electronic attacks on renewable energy systems, the importance of designing a photovoltaic system with different features appears in terms of detecting the attack on the input of the control unit to the system, and thus knowing the electronic attacks targeting the control unit. …”
Get full text
Article -
143
Research of kinematic characteristics of basic attacking technical action young wrestlers freestyle
Published 2014-04-01“…Іdentified temporal characteristic structures basic attacking technicians action young wrestlers freestyle different qualifications. …”
Get full text
Article -
144
Research of Attack Angle on Quasi-static Derailment Criterion of the Rail Changing Robot
Published 2020-05-01Get full text
Article -
145
Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent
Published 2024-01-01“…However, most of the model ensemble attacks directly combine the different models’ output but ignore the large differences in optimization direction of them, which severely limits the transfer attack ability. …”
Get full text
Article -
146
A Robust Method to Protect Text Classification Models against Adversarial Attacks
Published 2022-05-01“…The diversity and sparseness of adversarial perturbations of different attack methods challenge these approaches. …”
Get full text
Article -
147
A Machine Learning-Based Framework for Measuring Attack Surfaces of IoT Systems
Published 2025-01-01“…Several machine learning models have been used to show how to evaluate and validate the mapping process between different layers and various cyberattacks. Once higher performance results are obtained of the defined mapping, the security metrics proposed here are applied to measure the attack surface size of that particular architecture.…”
Get full text
Article -
148
Probabilistic models for evaluating network edge's resistance against scan and foothold attack
Published 2024-12-01“…Abstract The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which greatly affects the application and development of edge computing network architecture. …”
Get full text
Article -
149
A survey on detection and localisation of false data injection attacks in smart grids
Published 2024-12-01“…For this purpose, more than 40 major research contributions were selected and inspected, while conducting a detailed analysis of the methodology and objectives in relation to the FDI attacks detection and localisation. Key findings of the identified papers were provided according to different criteria, such as employed FDI attacks localisation techniques, utilised evaluation scenarios, investigated FDI attack types, application scenarios, adopted methodologies and the use of additional data. …”
Get full text
Article -
150
Modelling the impact of a smallpox attack in India and influence of disease control measures
Published 2020-12-01“…Objectives To estimate the impact of a smallpox attack in Mumbai, India, examine the impact of case isolation and ring vaccination for epidemic containment and test the health system capacity under different scenarios with available interventions.Setting The research is based on Mumbai, India population.Interventions We tested 50%, 70%, 90% of case isolation and contacts traced and vaccinated (ring vaccination) in the susceptible, exposed, infected, recovered model and varied the start of intervention between 20, 30 and 40 days after the initial attack.Primary and secondary outcome measures We estimated and incorporated in the model the effect of past vaccination protection, age-specific immunosuppression and contact rates and Mumbai population age structure in modelling disease morbidity and transmission.Results The estimated duration of an outbreak ranged from 127 days to 8 years under different scenarios, and the number of vaccine doses needed for ring vaccination ranged from 16 813 to 8 722 400 in the best-case and worst-case scenarios, respectively. …”
Get full text
Article -
151
An Incident Management System Design to Protect Critical Infrastructures from Cyber Attacks
Published 2024-08-01“…With the studies, a total of 10 different categories were analyzed, with the category consisting of nine types of attacks, namely Analysis, Backdoor, DoS, Exploits, Fuzzers, Generic, Reconnaissance, Shellcode, and Worms and Normal activities. …”
Get full text
Article -
152
Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases
Published 2020-09-01“…The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations’ response and recovery.…”
Get full text
Article -
153
Event-Triggered Quantized Stabilization of Markov Jump Systems under Deception Attacks
Published 2023-01-01“…This paper focuses on the event-triggered quantized control for Markov jump systems with deception attacks. First, we design an event-triggered scheme relying on dwell time and end instants of attacks. …”
Get full text
Article -
154
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
Published 2018-04-01“…For addressing the problem of two typical types of distributed denial of service (DDoS) attacks in cloud environment,a DDoS attack detection and prevention scheme called SDCC based on software defined network (SDN) architecture was proposed.SDCC used a combination of bandwidth detection and data flow detection,utilized confidence-based filtering (CBF) method to calculate the CBF score of packets,judged the packet of CBF score below the threshold as an attacking packet,added its attribute information to the attack flow feature library,and sent the flow table to intercept it through SDN controller.Simulation results show that SDCC can detect and prevent different types of DDoS attacks effectively,and it has high detection efficiency,reduces the controller’s computation overhead,and achieves a low false positive rate.…”
Get full text
Article -
155
Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment
Published 2024-01-01“…As the Internet of Things (IoT) technology is developing rapidly, many network devices have been subject to botnet attacks leading to substantial losses in different sectors. …”
Get full text
Article -
156
DDoS Attacks Detection With Deep Learning Approach Using Convolutional Neural Network
Published 2024-08-01“…The detection system of DDoS (Distributed Denial-of-Service) attacks aims to enhance network security across all facets of internet technology utilization. …”
Get full text
Article -
157
PKK’s Drone Attacks within the Perspective of Learning Organisation and Türkiye’s Counter Reaction
Published 2025-06-01“… PKK’s methods used in its terrorist attacks targeting Türkiye have been observed to transform over time. …”
Get full text
Article -
158
DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability
Published 2025-05-01“…We employed the Xception model with fine-tuning, and we achieved an average of 91% accuracy in detecting eleven different types of DoS and DDoS attacks, which is higher than the current state-of-the-art by 5% targeting the same task. …”
Get full text
Article -
159
Attacks on Polish Bank Customers During the Pandemic: Cyberscams and the Role of Security Alerts
Published 2025-06-01Get full text
Article -
160
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01“…Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming at DDoS attack problem of security in SDN,a DDoS attack detection method called DCNN-DSAE based on deep learning hybrid model in SDN was proposed.In this method,when a deep learning model was constructed,the input feature included 21 different types of fields extracted from the data plane and 5 extra self-designed features of distinguishing flow types.The experimental results show that the method has high accuracy,it’s better than the traditional support vector machine (SVM) and deep neural network (DNN) and other machine learning methods.At the same time,the proposed method can also shorten the processing time of classification detection.The detection model is deployed in SDN controller,and the new security policy is sent to the OpenFlow switch to achieve the defense against specific DDoS attack.…”
Get full text
Article