Showing 321 - 340 results of 416 for search 'error attacks', query time: 0.11s Refine Results
  1. 321

    Unlocking Cybersecurity: A Game-Changing Framework for Training and Awareness—A Systematic Review by Kiran Amjad, Kashif Ishaq, Naeem A. Nawaz, Fadhilah Rosdi, Abdul Basit Dogar, Fawad Ali Khan

    Published 2025-01-01
    “…However, this increased automation has also escalated cyber threats and attacks alarmingly, as most data breaches are attributed to human errors, which are critical in these incidents. …”
    Get full text
    Article
  2. 322

    Flexible calorimetric differential pressure sensor array integrated with a superhydrophobic surface for flight parameter estimation by Xin Ke, Yu Gao, Zheng Gong, Yunfan Li, Zihao Dong, Bowei Wan, Yurun Guo, Yonggang Jiang

    Published 2025-07-01
    “…Utilizing a multilayer perceptron neural network, we demonstrated the function of the sensor array in estimating airspeeds and angle of attacks, achieving average solving errors of 0.15 m/s and 0.37°, respectively.…”
    Get full text
    Article
  3. 323

    Digital Twin Approach for Fault Diagnosis in Photovoltaic Plant DC–DC Converters by Pablo José Hueros-Barrios, Francisco Javier Rodríguez Sánchez, Pedro Martín Sánchez, Carlos Santos-Pérez, Ariya Sangwongwanich, Mateja Novak, Frede Blaabjerg

    Published 2025-07-01
    “…Fault detection is performed by comparing the real-time system behaviour with DT predictions, using dynamic thresholds based on power, voltage, and current sensors errors. Once a discrepancy is flagged, a second step classifier processes normalized time-series windows to identify the specific fault type. …”
    Get full text
    Article
  4. 324

    Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing by Mengdi Zhao, Huiyan Chen

    Published 2025-07-01
    “…We provide a formal security proof of the proposed scheme under the small-integer solution (SIS) and learning with errors (LWE) within the random oracle model. Theoretical analysis confirms that the scheme achieves security guarantees while maintaining practical feasibility. …”
    Get full text
    Article
  5. 325

    ABA-IDS: Attention-Based Autoencoder for Intrusion Detection in Assistive Mobility Robotic Network by Daniel Ayo Oladele, Elisha Didam Markus

    Published 2025-01-01
    “…Anomaly scores are generated from reconstruction errors, and testing on a benchmark dataset showed that ABA-IDS outperformed existing models with fewer parameters. …”
    Get full text
    Article
  6. 326

    CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs by Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan

    Published 2024-09-01
    “…In this paper, cryptanalysis of Xiong’s CLAS scheme revealed its vulnerabilities to partial key replacement and identity replacement attacks, alongside mathematical errors in the batch verification process. …”
    Get full text
    Article
  7. 327

    NON EPILEPTIC PAROXYSMAL EVENTS IMITATING EPILEPSY IN CHILDREN by S. O. Aivazyan

    Published 2017-03-01
    “…The most frequent diagnostic errors were linked to the lack of objective information about the nature of paroxysms and misinterpretation of the EEG. …”
    Get full text
    Article
  8. 328

    An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme by Juan Qu, Li-min Zou

    Published 2013-01-01
    “…However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. …”
    Get full text
    Article
  9. 329

    Recapture voice replay detection based on phase spectrum by Can LI, Rangding WANG, Diqun YAN, Yanan CHEN

    Published 2017-08-01
    “…Meanwhile,the equal error rate (EER) of the ASV system has dropped about 22% with this method being integrated,which indicates that the system’s ability of resisting playback attack is enhanced.…”
    Get full text
    Article
  10. 330

    Side-Channel Free Measurement-Device- Independent Quantum Key Distribution Based on Source Monitoring by Wen-Lin Wang, Xing-Yu Zhou, Ming-Shuo Sun, Chun-Hui Zhang, Qin Wang

    Published 2023-01-01
    “…To remove those assumptions, here we construct a scheme on characterizing the source modulation errors with Hong-Ou-Mandel (HOM) interferences. Furthermore, we combine it with the decoy-state method and present the security analysis. …”
    Get full text
    Article
  11. 331

    A high-throughput ResNet CNN approach for automated grapevine leaf hair quantification by Nagarjun Malagol, Tanuj Rao, Anna Werner, Reinhard Töpfer, Ludger Hausmann

    Published 2025-01-01
    “…Additional validation between expert vs. non-expert on six varieties showed that non-experts contributed to over- and underestimation of the trait, with an absolute error of 0% to 30% and -5% to -60%, respectively. …”
    Get full text
    Article
  12. 332

    Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing by Vinothkumar.M, R. Saravana Ram

    Published 2025-04-01
    “…It possesses numerous benefits like cost minimization, few medical errors with better healthcare access and tracking. …”
    Get full text
    Article
  13. 333

    Identity-Based Online/Offline Encryption Scheme from LWE by Binger Zuo, Jiguo Li, Yichen Zhang, Jian Shen

    Published 2024-09-01
    “…To overcome the shortcoming of existing identity-based encryption (IBE) schemes in resisting quantum attacks, we introduce an IBE scheme based on learning with errors (LWE). …”
    Get full text
    Article
  14. 334

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum entanglement sources fortify secure communication protocols, improving resistance to attacks. Quantum information networks (QINs) enhance computing, sensing, and security capabilities over extended distances. …”
    Get full text
    Article
  15. 335

    Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining by Gan Liu, Kai Lu, Saiqi Pi

    Published 2025-04-01
    “…The escalating frequency and severity of cyber-attacks have presented formidable challenges to the safeguarding of cyberspace. …”
    Get full text
    Article
  16. 336

    Sistem Monitoring Frekuensi Denyut Nadi pada Pelari Menggunakan Metode Photoplethysmographic by Asih Setiarini, Mahatma Widya Laksana, Basuki Winarno

    Published 2021-11-01
    “…Alat yang dirancang memiliki error maksimum sebesar 0,73% berdasarkan data percobaan dari 5 partisipan. …”
    Get full text
    Article
  17. 337

    Stroke in children and adolescents: topical problems of pre-hospital diagnostics by Y. A. Khachaturov, I. O. Shchederkina, N. F. Plavunov, A. M. Sidorov, E. E. Petryaykina, I. P. Vytkovskaya, V. A. Kadyshev

    Published 2020-01-01
    “…Particular attention is paid to the features of the symptoms of stroke and stroke-like conditions («stroke masks») in the pediatric population and the analysis of the main factors that influence errors in the early diagnosis of stroke in children and adolescents. …”
    Get full text
    Article
  18. 338

    Trajectory privacy protection scheme based on differential privacy by Si CHEN, Anmin FU, Mang SU, Huaijiang SUN

    Published 2021-09-01
    “…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
    Get full text
    Article
  19. 339

    Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning by Mohd Anjum, Naoufel Kraiem, Hong Min, Ashit Kumar Dutta, Yousef Ibrahim Daradkeh, Sana Shahab

    Published 2025-03-01
    “…However, recent sophisticated security and privacy attacks such as data breaches, data integrity issues, and data collusion have raised concerns in the healthcare industry. …”
    Get full text
    Article
  20. 340

    Multimodal malware classification using proposed ensemble deep neural network framework by Sadia Nazim, Muhammad Mansoor Alam, Safdar Rizvi, Jawahir Che Mustapha, Syed Shujaa Hussain, Mazliham Mohd Su’ud

    Published 2025-05-01
    “…The cross-domain research in data fusion strives to integrate information from multiple sources to augment reliability and minimize errors in detecting sophisticated cyber threats. This collaborative approach is the least addressed and pivotal for protecting against the advancing environment of modern malware attacks. …”
    Get full text
    Article