Showing 1 - 20 results of 450 for search 'promising attacks', query time: 0.10s Refine Results
  1. 1
  2. 2

    PROMISING WATERMELON VARIETY ‘METEOR’ by S. V. Malueva, E. A. Varivoda, I. N. Bocherova

    Published 2018-02-01
    “…According to research results, comparative characteristics between new promising variety ‘Meteor’ and control variety ‘Zenith’ were given. …”
    Get full text
    Article
  3. 3

    The role of diet in the prevention of migraine attacks by O. O. Kopchak, O. Ye. Hrytsenko

    Published 2021-11-01
    “…An update on the role of diet in the pathogenesis and prevention of migraine attacks is an extremely important and promising scientific field, which requires further research with the development of personalized approaches taking into account the individual characteristics of each patient.…”
    Get full text
    Article
  4. 4
  5. 5

    Face Spoof Attack Recognition Using Discriminative Image Patches by Zahid Akhtar, Gian Luca Foresti

    Published 2016-01-01
    “…Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD) shows promising results compared to existing works.…”
    Get full text
    Article
  6. 6

    Hybridization of Swarm for Features Selection to Modeling Heart Attack Data by Omar Shakir, Ibrahim Saleh

    Published 2022-12-01
    “…Predicting heart attacks using machine learning is an important topic. …”
    Get full text
    Article
  7. 7

    Attacks and countermeasures on federated learning via historical knowledge modeling by Songsong Zhang, Zhengliang Jiang, Hang Gao, Suying Gui, Tiegang Gao

    Published 2025-07-01
    “…Abstract Federated learning has emerged as a promising paradigm for privacy-preserving multi-source data fusion. …”
    Get full text
    Article
  8. 8

    Physics-Informed Graph Neural Networks for Attack Path Prediction by Marin François, Pierre-Emmanuel Arduin, Myriam Merad

    Published 2025-04-01
    “…The automated identification and evaluation of potential attack paths within infrastructures is a critical aspect of cybersecurity risk assessment. …”
    Get full text
    Article
  9. 9

    The study of promising secure information systems based on signal modeling by V. A. Sizov, D. M. Malinichev, Kh. K. Kuchmezov

    Published 2019-05-01
    “…Instead, you have to think about such things as data manipulation attacks, which, for example, can be used to command the mechanisms to perform certain actions (for example, open the door or take control of an unmanned vehicle). …”
    Get full text
    Article
  10. 10

    Towards distinguishing trust based attacks in an IoV network by Yingxun Wang, Adnan Mahmood, Mohamad Faizrizwan Mohd Sabri, Hushairi Zen

    Published 2025-05-01
    “…Nevertheless, trust-based attacks also present a formidable challenge. Therefore, in this paper, an IoV-based trust management heuristic has been envisaged that takes into account both direct trust and indirect trust to ascertain the behaviors of the vehicles vis-à-vis time in a bid to detect various trust-based attacks, i.e., zig-zag attacks, self-promoting attacks, on-off attacks, and opportunistic attacks, along with the attackers’ multiple attacking strategies. …”
    Get full text
    Article
  11. 11

    Informer-based DDoS attack detection method for the power Internet of Things. by Wei Cui, Xiao Liao, Yang Yang, Shiying Feng, Mingyan Song

    Published 2025-01-01
    “…Traditional network intrusion detection systems often rely on manually engineered features, which are not only resource-intensive but also struggle to handle the diverse range of attack types. This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. …”
    Get full text
    Article
  12. 12

    Fuzzy Matching Template Attacks on Multivariate Cryptography: A Case Study by Weijian Li, Xian Huang, Huimin Zhao, Guoliang Xie, Fuxiang Lu

    Published 2020-01-01
    “…Multivariate cryptography is one of the most promising candidates for post-quantum cryptography. …”
    Get full text
    Article
  13. 13

    On the generalisation capabilities of Fisher vector‐based face presentation attack detection by Lázaro J. González‐Soler, Marta Gomez‐Barrero, Christoph Busch

    Published 2021-09-01
    “…A feature space based on Fisher Vectors computed from compact binarised statistical image features histograms, which allows discovering semantic feature subsets from known samples to enhance the detection of unknown attacks is presented. This representation, which is evaluated for challenging unknown attacks taken from freely available facial databases, reports promising results. …”
    Get full text
    Article
  14. 14

    Transgenic poplar for resistance against pest and pathogen attack in forests: an overview by Swati Sharan, Amrita Chakraborty, Amit Roy, Indrakant K. Singh, Archana Singh, Archana Singh

    Published 2024-12-01
    “…However, several biotic stresses, such as attacks by pests and pathogens, severely affect poplar production and productivity. …”
    Get full text
    Article
  15. 15

    Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review by Bethuel Sibongiseni Ngcamu

    Published 2025-02-01
    “…The study’s findings demonstrate that peer pressure, failure to provide the promised basic needs to the citizens, and denialism by the government all contribute to the xenophobic attacks in South Africa. …”
    Get full text
    Article
  16. 16

    You Only Attack Once: Single-Step DeepFool Algorithm by Jun Li, Yanwei Xu, Yaocun Hu, Yongyong Ma, Xin Yin

    Published 2024-12-01
    “…Under a single iteration, it achieves a 70.6% higher success rate of the attacks compared to the DeepFool algorithm. Our proposed method shows promise for widespread application in both offensive and defensive strategies for diverse deep learning models. …”
    Get full text
    Article
  17. 17

    Teplizumab: a promising intervention for delaying type 1 diabetes progression by Muhammad Rizwan Saleem, Muhammad Talha Khan

    Published 2025-04-01
    “…Type 1 diabetes (T1D) arises from an autoimmune attack on pancreatic beta cells, leading to a reliance on external insulin to maintain glucose levels. …”
    Get full text
    Article
  18. 18
  19. 19

    DDoS Attacks Detection With Deep Learning Approach Using Convolutional Neural Network by Rafiq Amalul Widodo, Mera Kartika Delimayanti, Asri Wulandari

    Published 2024-08-01
    “…The detection system of DDoS (Distributed Denial-of-Service) attacks aims to enhance network security across all facets of internet technology utilization. …”
    Get full text
    Article
  20. 20

    Hybrid genetic algorithm and deep learning techniques for advanced side-channel attacks by Faisal Hameed, Hoda Alkhzaimi

    Published 2025-07-01
    “…These findings validate genetic algorithms as a robust alternative for optimizing side-channel attack models, offering both scalability and consistent performance across diverse attack scenarios while advancing the state of cryptographic security assessment.…”
    Get full text
    Article