Showing 161 - 180 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 161

    The effect of Flow Speed and Angle of Attack on the Aerodynamic Noise of NACA 0012 Airfoil by Hussein Mohammad, Bade Shrestha, Viktor Kilchyk

    Published 2023-12-01
    “…The influence of the wind speed and the angle of attack on the aerodynamic noise was investigated in this study. …”
    Get full text
    Article
  2. 162

    Analysis of attacking styles and goal-scoring in the 2021/22 Women's Super League. by Lizzie Craven, Patrick Oxenham, Jayamini Ranaweera

    Published 2025-01-01
    “…Thereby, this study aimed to describe goal scoring in relation to different attacking styles during a Women's Super League (WSL) season. …”
    Get full text
    Article
  3. 163

    5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches by José Dias, Pedro Pinto, Ricardo Santos, Silvestre Malta

    Published 2025-06-01
    “…This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. …”
    Get full text
    Article
  4. 164
  5. 165

    Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review by Kun Hwang, Chan Yong Park

    Published 2024-03-01
    “…The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. …”
    Get full text
    Article
  6. 166

    Flood Risks of Cyber‐Physical Attacks in a Smart Storm Water System by Chung‐Yi Lin, Yi‐Chen Ethan Yang, Faegheh Moazeni

    Published 2024-01-01
    “…Findings reveal that FDIs can amplify flood risks by feeding the control system false data, leading to erroneous outflow directives. Notably, FDI attacks can reshape flood risk dynamics across different storm intensities, accentuating flood risks during less severe but more frequent storms. …”
    Get full text
    Article
  7. 167

    Consensus-Based Power System State Estimation Algorithm Under Collaborative Attack by Zhijian Cheng, Guanjun Chen, Xiao-Meng Li, Hongru Ren

    Published 2024-10-01
    “…By integrating these two types of attack models, a different consensus-based distributed estimator is designed to accurately estimate the state of the power system under collaborative attacks. …”
    Get full text
    Article
  8. 168

    Cascading Failure Dynamics against Intentional Attack for Interdependent Industrial Internet of Things by Hao Peng, Zhen Qian, Zhe Kan, Dandan Zhao, Juan Yu, Jianmin Han

    Published 2021-01-01
    “…Our method theoretically analyzes the cascading failure dynamics of the intentional attack network. Simultaneously, we verified the theoretical results through simulations and gave the risk factors that affect the system’s security to mitigate potential security attack threats. …”
    Get full text
    Article
  9. 169

    Epidemiological Model for Stability Analysis of Wireless Sensor Network under Malware Attack by Chakradhar Verma, C. P. Gupta

    Published 2022-03-01
    “…Malware attack is growing day by day in cyberspace. And Wireless Sensor Network (WSN) is also facing a hazardous type of situation due to attack of malware (malicious code, virus, worm etc.). …”
    Get full text
    Article
  10. 170

    A phishing attack awareness framework for a South African University of Technology by Japhet M. Kayomb, Errol R. Francke, Tabisa Ncubukezi

    Published 2025-07-01
    “…Results: The findings showed many phishing attacks and victims at the university. Furthermore, phishers use different techniques in phishing attacks, and IT users need constant reminders about the danger of phishing attacks. …”
    Get full text
    Article
  11. 171

    Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey by Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed Saad, Yang Xiang

    Published 2013-05-01
    “…Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. …”
    Get full text
    Article
  12. 172

    Degradation of Shotcrete Materials Subjected to Sulfate and Chloride Attack in Varying Exposure Regimes by Ruiqiang Zhao, Lihao Xu, Jun Yang, Yang Zou, Zhongya Zhang

    Published 2021-01-01
    “…Three water-to-binder ratios (w/b), i.e., 0.35, 0.45, and 0.55, and two types of supplementary cementitious materials (SCMs), namely, fly ash (FA) and silica fume (SF), were considered in the current study. Two different laboratorial immersion regimes (continuously full immersion and partial immersion with cycling temperature and relative humidity) were carried out to induce chemical/physical sulfate attack. …”
    Get full text
    Article
  13. 173

    Efficient black-box attack with surrogate models and multiple universal adversarial perturbations by Tao Ma, Hong Zhao, Ling Tang, Mingsheng Xue, Jing Liu

    Published 2025-05-01
    “…Existing attack algorithms often face challenges in balancing effectiveness and efficiency. …”
    Get full text
    Article
  14. 174

    BACAD: AI-based framework for detecting vertical broken access control attacks by Ahmed Anas, Ayman A. Alhelbawy, Salwa El Gamal, Basheer Youssef

    Published 2024-12-01
    “…The evaluation against a spectrum of real-world and demonstration web applications highlights remarkable efficiency in detecting VBAC exploits, providing robust application protection against different sets of VBAC attacks. Furthermore, it shows that BACAD addresses the VBAC problem by presenting an applicable, dynamic, flexible, and technology-independent solution to counter VBAC vulnerability risks. …”
    Get full text
    Article
  15. 175

    Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm by Jaeseung Han, Dong-Guk Han

    Published 2025-07-01
    “…Experiments were conducted on an Atmel XMEGA128D4 processor to evaluate the effectiveness of the proposed attack method. We also introduced artificial noise into the power traces to compare the proposed attack’s performance at different noise levels. …”
    Get full text
    Article
  16. 176

    The Effective Healing Strategy against Localized Attacks on Interdependent Spatially Embedded Networks by Kai Gong, Jia-Jian Wu, Ying Liu, Qing Li, Run-Ran Liu, Ming Tang

    Published 2019-01-01
    “…A lot of works were devoted to revealing the vulnerability of interdependent spatially embedded networks (ISENs) when facing node failures and showed that the ISENs are susceptible to geographically localized attacks caused by natural disasters or terrorist attacks. …”
    Get full text
    Article
  17. 177

    Design and implementation of OSPF vulnerability analysis and detection system by Zun-ying QIN, Guo-dong LI, Wei LI, Xu-chang HUANG

    Published 2013-09-01
    “…A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability.The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model with zero-copy technology.The method combining SNMP and bypass monitoring was adopted to achieve real-time monitoring of test results.Finally,the system proves the vulnerability of different types of routing equipments in the test environment and the vulnerability hazards were analyzed quantitatively.…”
    Get full text
    Article
  18. 178
  19. 179

    Unsupervised detection method of RoQ covert attacks based on multilayer features by Jing ZHAO, Jun LI, Chun LONG, Wei WAN, Jinxia WEI, Kai CHEN

    Published 2022-09-01
    “…To solve the problems that RoQ covert attacks are hidden in overwhelming background traffic and difficult to identify, besides the existing samples are scarce and cannot provide large-scale learning data, an unsupervised detection method of RoQ covert attacks based on multilayer features was proposed under the condition of very little prior knowledge.First, considering that most normal flow might interfere with subsequent results, a classification method based on semi-supervised spectral clustering was studied by flow characteristics, so that the proportion of normal samples in the filtered traffic was close to 100%.Secondly, in order to distinguish the nuance between the hidden attack features and normal flow without relying on the attack samples, an unsupervised detection model based on the n-Shapelet subsequence was constructed by packet characteristics, and the subsequences with obvious difference were used, which enabled detection of RoQ convert attacks.Experimental results demonstrate that with only a small number of learning samples, the proposed method has higher precision and recall rate than existing methods, and is robust to evading attacks.…”
    Get full text
    Article
  20. 180

    Impaired glymphatic function contributes to high-frequency attacks in patients with episodic migraine by Xin Cai, Wei Sun, Mengfei Cai, Dawei Li, Zhenzhen Chen, Hao Li, Bo Yuan, Yan Li, Zaiyi Liu, Yuhu Zhang

    Published 2025-06-01
    “…This study aimed to investigate glymphatic function in patients with episodic migraine (EM), focusing on varying attack frequencies, and to explore its potential pathophysiologic role in migraine. …”
    Get full text
    Article