-
161
The effect of Flow Speed and Angle of Attack on the Aerodynamic Noise of NACA 0012 Airfoil
Published 2023-12-01“…The influence of the wind speed and the angle of attack on the aerodynamic noise was investigated in this study. …”
Get full text
Article -
162
Analysis of attacking styles and goal-scoring in the 2021/22 Women's Super League.
Published 2025-01-01“…Thereby, this study aimed to describe goal scoring in relation to different attacking styles during a Women's Super League (WSL) season. …”
Get full text
Article -
163
5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
Published 2025-06-01“…This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. …”
Get full text
Article -
164
Effect of powdery mildew attack on quality parameters and experimental bread baking of wheat
Published 2006-09-01Get full text
Article -
165
Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review
Published 2024-03-01“…The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. …”
Get full text
Article -
166
Flood Risks of Cyber‐Physical Attacks in a Smart Storm Water System
Published 2024-01-01“…Findings reveal that FDIs can amplify flood risks by feeding the control system false data, leading to erroneous outflow directives. Notably, FDI attacks can reshape flood risk dynamics across different storm intensities, accentuating flood risks during less severe but more frequent storms. …”
Get full text
Article -
167
Consensus-Based Power System State Estimation Algorithm Under Collaborative Attack
Published 2024-10-01“…By integrating these two types of attack models, a different consensus-based distributed estimator is designed to accurately estimate the state of the power system under collaborative attacks. …”
Get full text
Article -
168
Cascading Failure Dynamics against Intentional Attack for Interdependent Industrial Internet of Things
Published 2021-01-01“…Our method theoretically analyzes the cascading failure dynamics of the intentional attack network. Simultaneously, we verified the theoretical results through simulations and gave the risk factors that affect the system’s security to mitigate potential security attack threats. …”
Get full text
Article -
169
Epidemiological Model for Stability Analysis of Wireless Sensor Network under Malware Attack
Published 2022-03-01“…Malware attack is growing day by day in cyberspace. And Wireless Sensor Network (WSN) is also facing a hazardous type of situation due to attack of malware (malicious code, virus, worm etc.). …”
Get full text
Article -
170
A phishing attack awareness framework for a South African University of Technology
Published 2025-07-01“…Results: The findings showed many phishing attacks and victims at the university. Furthermore, phishers use different techniques in phishing attacks, and IT users need constant reminders about the danger of phishing attacks. …”
Get full text
Article -
171
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
Published 2013-05-01“…Detecting the node replication attack has become an imperative research topic in sensor network security, and designing detection schemes against node replication attack involves different threatening issues and challenges. …”
Get full text
Article -
172
Degradation of Shotcrete Materials Subjected to Sulfate and Chloride Attack in Varying Exposure Regimes
Published 2021-01-01“…Three water-to-binder ratios (w/b), i.e., 0.35, 0.45, and 0.55, and two types of supplementary cementitious materials (SCMs), namely, fly ash (FA) and silica fume (SF), were considered in the current study. Two different laboratorial immersion regimes (continuously full immersion and partial immersion with cycling temperature and relative humidity) were carried out to induce chemical/physical sulfate attack. …”
Get full text
Article -
173
Efficient black-box attack with surrogate models and multiple universal adversarial perturbations
Published 2025-05-01“…Existing attack algorithms often face challenges in balancing effectiveness and efficiency. …”
Get full text
Article -
174
BACAD: AI-based framework for detecting vertical broken access control attacks
Published 2024-12-01“…The evaluation against a spectrum of real-world and demonstration web applications highlights remarkable efficiency in detecting VBAC exploits, providing robust application protection against different sets of VBAC attacks. Furthermore, it shows that BACAD addresses the VBAC problem by presenting an applicable, dynamic, flexible, and technology-independent solution to counter VBAC vulnerability risks. …”
Get full text
Article -
175
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm
Published 2025-07-01“…Experiments were conducted on an Atmel XMEGA128D4 processor to evaluate the effectiveness of the proposed attack method. We also introduced artificial noise into the power traces to compare the proposed attack’s performance at different noise levels. …”
Get full text
Article -
176
The Effective Healing Strategy against Localized Attacks on Interdependent Spatially Embedded Networks
Published 2019-01-01“…A lot of works were devoted to revealing the vulnerability of interdependent spatially embedded networks (ISENs) when facing node failures and showed that the ISENs are susceptible to geographically localized attacks caused by natural disasters or terrorist attacks. …”
Get full text
Article -
177
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01“…A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability.The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model with zero-copy technology.The method combining SNMP and bypass monitoring was adopted to achieve real-time monitoring of test results.Finally,the system proves the vulnerability of different types of routing equipments in the test environment and the vulnerability hazards were analyzed quantitatively.…”
Get full text
Article -
178
Remote Assessment of Platelet Function in Patients with Acute Stroke or Transient Ischaemic Attack
Published 2017-01-01Get full text
Article -
179
Unsupervised detection method of RoQ covert attacks based on multilayer features
Published 2022-09-01“…To solve the problems that RoQ covert attacks are hidden in overwhelming background traffic and difficult to identify, besides the existing samples are scarce and cannot provide large-scale learning data, an unsupervised detection method of RoQ covert attacks based on multilayer features was proposed under the condition of very little prior knowledge.First, considering that most normal flow might interfere with subsequent results, a classification method based on semi-supervised spectral clustering was studied by flow characteristics, so that the proportion of normal samples in the filtered traffic was close to 100%.Secondly, in order to distinguish the nuance between the hidden attack features and normal flow without relying on the attack samples, an unsupervised detection model based on the n-Shapelet subsequence was constructed by packet characteristics, and the subsequences with obvious difference were used, which enabled detection of RoQ convert attacks.Experimental results demonstrate that with only a small number of learning samples, the proposed method has higher precision and recall rate than existing methods, and is robust to evading attacks.…”
Get full text
Article -
180
Impaired glymphatic function contributes to high-frequency attacks in patients with episodic migraine
Published 2025-06-01“…This study aimed to investigate glymphatic function in patients with episodic migraine (EM), focusing on varying attack frequencies, and to explore its potential pathophysiologic role in migraine. …”
Get full text
Article