Suggested Topics within your search.
Suggested Topics within your search.
- Quality of life 2
- Social conditions 2
- Social problems 2
- COMPUTERS / Security / General 1
- Civil rights 1
- Crime prevention 1
- Information technology 1
- Internal security 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Prevention 1
- Security, International 1
- Technology 1
- Violence 1
-
1
Object detection with afordable robustness for UAV aerial imagery: model and providing method
Published 2024-08-01“…The analysis of the experimental results demonstrates that the proposed method provides an 11.7 % increase in mAP during testing under fault injection conditions and a 15.1 % increase in mAP during adversarial attack testing.…”
Get full text
Article -
2
A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers’ Perspective
Published 2025-01-01“…Causes may include legitimate factors, such as misconfiguration, interference, and congestion, but they could also be the result of cyber attacks. This review exposes knowledge gaps that impede the development of effective troubleshooting tools (particularly related to cyber attacks) for BSPs, including network-related challenges and dataset limitations. …”
Get full text
Article -
3
THE SYSTEM ANALYSIS OF TRAFFIC PROVIDER TO IDENTIFY A DISTRIBUTED DENIAL OF SERVICE CHANNEL
Published 2022-10-01Get full text
Article -
4
RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control
Published 2025-06-01Subjects: Get full text
Article -
5
Mites That Attack Humans
Published 1999-05-01“… This document provides an overview of mites that attack humans, including household, bird, insect, rodent, scabies, and house dust mites. …”
Get full text
Article -
6
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01“…Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network attack surface based on Bayesian attack graph was proposed.The network system resources,vulnerability and dependencies between them were used to establish Bayesian attack graph.Considering dependencies between nodes,the correlation between the resource and the influence of attacks on the attack path,the probability of each state that attackers can reach and the maximum probability attack path can be inferred.The experimental results prove the feasibility and effectiveness of the proposed network attack surface risk assessment method,which can provide a good support for the selection of dynamic defensive measures of attack surface.…”
Get full text
Article -
7
Survey of Load-Altering Attacks Against Power Grids: Attack Impact, Detection, and Mitigation
Published 2025-01-01“…Additionally, mitigation techniques are examined, focusing on both preventive measures, designed to thwart attack execution, and reactive methods, which aim to optimize responses to ongoing attacks. …”
Get full text
Article -
8
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article -
9
On the independence heuristic in the dual attack
Published 2025-07-01“…Then, we provide estimates on the success probability and the cost of the dual attack against the decisional version of the BDD problem. …”
Get full text
Article -
10
Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses
Published 2024-01-01“…We provide the insight of these attacks and present ways to countermeasure the attacks and to reduce the attack surface. …”
Get full text
Article -
11
Attack Reconstruction and Attack-Resilient Consensus Control for Fuzzy Markovian Jump Multi-Agent Systems
Published 2024-11-01“…However, the performance of MASs can be easily compromised by malicious false data injection attacks (FDIAs) due to the inherent vulnerability of the cyber layer. …”
Get full text
Article -
12
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT
Published 2024-11-01“…Given the high risk of Internet of Things (IoT) device compromise, it is crucial to discuss the attack detection aspect. However, due to the physical limitations of IoT, such as battery life and sensing and processing power, the widely used detection techniques, such as signature-based or anomaly-based detection, are quite ineffective. …”
Get full text
Article -
13
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01“…A novel taxonomy of DDoS attacks is introduced, categorizing them by distinct characteristics, and mapping each attack type to relevant detection methods within specific SDN layers. …”
Get full text
Article -
14
Analysis of the success probability of cube attack
Published 2012-10-01“…The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic support to cube attack.The theoretical results meet with the experimental results of the analysis of the stream ciphers Trivium and Grain v1 very closely.…”
Get full text
Article -
15
The role of diet in the prevention of migraine attacks
Published 2021-11-01“…The review provides information concerning the influence of dietary factors and different types of diet on the origin and frequency of migraine headaches according to the up-to-date scientific data. …”
Get full text
Article -
16
Disruptive attacks on artificial neural networks: A systematic review of attack techniques, detection methods, and protection strategies
Published 2025-06-01“…This paper provides a systematic review of disruptive attacks on artificial neural networks (ANNs). …”
Get full text
Article -
17
DOG: An Object Detection Adversarial Attack Method
Published 2025-01-01“…Additionally, ablation experiments were used to analyze the impact of each module on attack effectiveness, providing a theoretical basis and practical guidance for future research. …”
Get full text
Article -
18
Securing guarantee of the blockchain network:attacks and countermeasures
Published 2021-01-01“…While the security of blockchain has been the central concern of both academia and industry since the very start, new security threats continue to emerge, which poses great risks to the blockchain ecosystem.A systematic study was conducted on the most state-of-the-art research on potential security issues of blockchain.Specifically, a taxonomy was developed by considering the blockchain framework as a four-layer system, and the analysis on the most recent attacks against security loopholes in each layer was provided.Countermeasures that can strengthen the blockchain were also discussed by highlighting their fundamental ideas and comparing different solutions.Finally, the forefront of research and potential directions of blockchain security were put forward to encourage further studies on the security of blockchain.…”
Get full text
Article -
19
HMAC-Based Authentication Protocol: Attacks and Improvements
Published 2016-11-01“…We prove that this protocol is not secure against various attacks and also does not provide untraceability. …”
Get full text
Article -
20
Key committing attack on Tiaoxin-346 algorithm
Published 2025-04-01“…Notably, the computational complexity of our attack is O(1), significantly lower than the generic attack complexity of $$O\left( 2^{64}\right)$$ O 2 64 , which effectively violates the key commitment security of Tiaoxin-346. …”
Get full text
Article