-
1
-
2
On the independence heuristic in the dual attack
Published 2025-07-01Subjects: “…dual attack…”
Get full text
Article -
3
-
4
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Published 2024-01-01Subjects: Get full text
Article -
5
Research on fixed-time time-varying formation of heterogeneous multi-agent systems based on tracking error observer under DoS attacks
Published 2024-12-01Subjects: “…Denial-of-service attacks…”
Get full text
Article -
6
Analysing Differences in Attack Indicators in Men’s First Division Volleyball According to the Positional Status of Teams
Published 2024-12-01Subjects: Get full text
Article -
7
Neural Network-Adaptive Secure Control for Nonlinear Cyber-Physical Systems Against Adversarial Attacks
Published 2025-04-01Subjects: Get full text
Article -
8
Differential fault analysis on EMV application cryptogram
Published 2016-04-01Subjects: Get full text
Article -
9
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01“…A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. …”
Get full text
Article -
10
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article -
11
Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism
Published 2025-06-01“…The analytical results reveal that observer errors grow unbounded under DAs but converge to zero in attack-free scenarios, enabling effective attack identification. …”
Get full text
Article -
12
Attack Reconstruction and Attack-Resilient Consensus Control for Fuzzy Markovian Jump Multi-Agent Systems
Published 2024-11-01“…Second, an adaptive fuzzy estimator is developed for the simultaneous reconstruction of states and attacks in MASs. The derived estimates are utilized to design an attack-resilient consensus control strategy that compensates for the effects of FDIAs on the closed-loop consensus error dynamics. …”
Get full text
Article -
13
Cause Analysis and Enlightenment of Global Blackouts in the Past 30 Years
Published 2021-10-01Subjects: Get full text
Article -
14
Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality
Published 2025-06-01“…In video transmission, maintaining high visual quality under variable network conditions, including bandwidth and efficiency, is essential for optimal viewer experience. Channel errors or malicious attacks during transmission can cause degradation in video quality, affecting its secure transmission and putting its confidentiality and integrity at risk. …”
Get full text
Article -
15
Controlling user access with scripting to mitigate cyber-attacks
Published 2024-12-01“…This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. …”
Get full text
Article -
16
Chosen-key extracting attack to random LSB steganography
Published 2010-01-01“…A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.…”
Get full text
Article -
17
Guaranteed False Data Injection Attack Without Physical Model
Published 2025-01-01“…The key innovation lies in the AE-GAN hybrid model’s ability to replicate the residual error distribution while maximizing attack efficacy, offering a performance guarantee that existing methods lack. …”
Get full text
Article -
18
Intercept-Resend Attack on SARG04 Protocol: An Extended Work
Published 2020-06-01“…In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is investigated by bounding the information of an eavesdropper; then, the attack has been analyzed. …”
Get full text
Article -
19
Learning atomic forces from uncertainty-calibrated adversarial attacks
Published 2025-07-01Get full text
Article -
20
Benign paroxysmal torticollis in infancy – diagnostic error possibility
Published 2017-01-01Get full text
Article