Suggested Topics within your search.
Suggested Topics within your search.
- Quality of life 2
- Social conditions 2
- Social problems 2
- COMPUTERS / Security / General 1
- Civil rights 1
- Crime prevention 1
- Information technology 1
- Internal security 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Prevention 1
- Security, International 1
- Technology 1
- Violence 1
-
21
Incremental Adversarial Learning for Polymorphic Attack Detection
Published 2024-01-01“…AI-based Network Intrusion Detection Systems (NIDS) provide effective mechanisms for cybersecurity analysts to gain insights and thwart several network attacks. …”
Get full text
Article -
22
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01“…However, minor perturbations or ineffectual byte insertions can easily ‘fool’ these trained ML classifiers, making them ineffective against these crafted and smart malicious software. This survey aims to provide an encyclopedic overview of adversarial evasion attacks specifically targeting malware detection and classification systems, standing apart from previous surveys by focusing exclusively and comprehensively on this unique application domain. …”
Get full text
Article -
23
Routing Attacks and Countermeasures in the RPL-Based Internet of Things
Published 2013-08-01“…In this paper we provide a comprehensive analysis of IoT technologies and their new security capabilities that can be exploited by attackers or IDSs. …”
Get full text
Article -
24
An SDN-Based Approach to Ward Off LAN Attacks
Published 2018-01-01“…In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. …”
Get full text
Article -
25
Cloud Survivability Scenarios Under Attacks With and Without Countermeasures
Published 2025-01-01“…This highlights the importance of optimizing countermeasures, especially to handle high-intensity attacks. Conclusion: This study provides valuable insights for cloud managers to enhance resilience and face sophisticated DDoS attacks. …”
Get full text
Article -
26
Investigate the Use of Deep Learning in IoT Attack Detection
Published 2025-06-01“…This study contributes a comprehensive comparative analysis of deep learning models for IoT security, focusing on the effectiveness of weighted features in improving detection accuracy. The results provide valuable information for the advancement of real-time IoT attack detection systems.…”
Get full text
Article -
27
Visual Scheme for the Detection of Mobile Attack on WSN Simulator
Published 2013-08-01“…Sensors can be efficiently arranged through this sensor node information, and when the sensors have been arranged, security simulation functions applied with data encryption for data transmission between sensor nodes are provided. This paper also proposes an external detection trace simulator (EDTS) that would make sensing data transmitted between sensors visually provide information on the sensing of external attacks.…”
Get full text
Article -
28
Preventing Stealthy Attacks on Power Electronics Dominated Grids
Published 2023-01-01“…Another advantage to the attacker is an increased amount of telecommunication devices in PEDGs which provides the attacker with a larger attack surface. …”
Get full text
Article -
29
Command Injection Attacks in Smart Grids: A Survey
Published 2024-01-01“…Several studies have been conducted to discuss different types of cyberattacks and provide their countermeasures. The false command injection attack (FCIA) is considered one of the most critical attacks that have been studied. …”
Get full text
Article -
30
Investigating Brute Force Attack Patterns in IoT Network
Published 2019-01-01“…At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. …”
Get full text
Article -
31
Preparing a Family Communication Plan for Terrorist Attacks
Published 2003-06-01Get full text
Article -
32
Preparing a Family Communication Plan for Terrorist Attacks
Published 2003-06-01Get full text
Article -
33
Side-Channel Attack on ARADI in Non-Profiling Scenarios
Published 2025-01-01“…These findings highlight critical weaknesses in the physical security of ARADI and emphasize the need for robust countermeasures to address side-channel vulnerabilities without compromising performance. This research provides new insights into the practical security of ARADI, underscoring the importance of integrating physical attack resilience in cryptographic designs.…”
Get full text
Article -
34
Localizing Adversarial Attacks To Produces More Imperceptible Noise
Published 2025-05-01“…This work provides a comprehensive analysis of localized adversarial attacks, offering practical insights for advancing attack strategies and designing robust defensive systems. …”
Get full text
Article -
35
Vulnerability Assessment of Hazmat Storage Tanks to Shooting Attacks
Published 2025-06-01“…The present study addresses this gap and provide a novel scientifically based modelling approach to calculate baseline values of standoff distances for atmospheric storage equipment that can be used to assess the potential damage of shooting attacks targeting them. …”
Get full text
Article -
36
The impact of terrorist attacks on cultural values as expressed in books.
Published 2024-01-01“…We assessed the effects of the 9/11/2001 terrorist attacks on the salience of moral words and phrases in the United States, Great Britain, and Spanish-speaking countries, focusing particularly on those phrases related to authority and loyalty. …”
Get full text
Article -
37
Deterioration of service reservoirs due to soft water attack
Published 2025-01-01“…The paper discusses the findings of the field and laboratory investigation after one and seven years of immersion. It provides an indication of the most resistant mix designs, effects of the use of fly ash and ground granulated blastfurnace slag, and reliable water parameters that can be utilised to assess the risk and rate of attack.…”
Get full text
Article -
38
Leveraging Graph Neural Networks for IoT Attack Detection
Published 2025-06-01“…High accuracy, precision, recall, and AUC values indicate the model's robustness in detecting attacks while minimizing false alarms. The study advances IoT security by introducing synergistic solutions and provides practical insights for implementing intrusion detection systems in real-world IoT environments.…”
Get full text
Article -
39
Review of Research on Adversarial Attack in Three Kinds of Images
Published 2024-12-01“…Finally, the current status of image adversarial samples is analyzed, the possible research directions of adversarial attacks in the future image field are prospected, the potential problems that may be encountered in the future are summarized, and corresponding solutions are provided.…”
Get full text
Article -
40
Resilience of Named Entity Recognition models against adversarial attacks
Published 2025-07-01“…Adversarial Attacks are actions that aims to mislead models by introducing subtle and often imperceptible changes in model’s input. …”
Get full text
Article