Search alternatives:
providing » promising (Expand Search)
Showing 1 - 20 results of 2,479 for search 'providing attacks', query time: 0.12s Refine Results
  1. 1

    Object detection with afordable robustness for UAV aerial imagery: model and providing method by Viacheslav Moskalenko, Artem Korobov, Yuriy Moskalenko

    Published 2024-08-01
    “…The analysis of the experimental results demonstrates that the proposed method provides an 11.7 % increase in mAP during testing under fault injection conditions and a 15.1 % increase in mAP during adversarial attack testing.…”
    Get full text
    Article
  2. 2

    A Survey on the Effectiveness of Existing Smart Home Cyber Attacks Detection Solution: A Broadband Service Providers’ Perspective by Md Mizanur Rahman, Faycal Bouhafs, Frank den Hartog

    Published 2025-01-01
    “…Causes may include legitimate factors, such as misconfiguration, interference, and congestion, but they could also be the result of cyber attacks. This review exposes knowledge gaps that impede the development of effective troubleshooting tools (particularly related to cyber attacks) for BSPs, including network-related challenges and dataset limitations. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Mites That Attack Humans by P.G. Koehler

    Published 1999-05-01
    “… This document provides an overview of mites that attack humans, including household, bird, insect, rodent, scabies, and house dust mites. …”
    Get full text
    Article
  6. 6

    Risk assessment method for network attack surface based on Bayesian attack graph by Yuyang ZHOU, Guang CHENG, Chunsheng GUO

    Published 2018-06-01
    “…Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network attack surface based on Bayesian attack graph was proposed.The network system resources,vulnerability and dependencies between them were used to establish Bayesian attack graph.Considering dependencies between nodes,the correlation between the resource and the influence of attacks on the attack path,the probability of each state that attackers can reach and the maximum probability attack path can be inferred.The experimental results prove the feasibility and effectiveness of the proposed network attack surface risk assessment method,which can provide a good support for the selection of dynamic defensive measures of attack surface.…”
    Get full text
    Article
  7. 7

    Survey of Load-Altering Attacks Against Power Grids: Attack Impact, Detection, and Mitigation by Sajjad Maleki, Shijie Pan, Subhash Lakshminarayana, Charalambos Konstantinou

    Published 2025-01-01
    “…Additionally, mitigation techniques are examined, focusing on both preventive measures, designed to thwart attack execution, and reactive methods, which aim to optimize responses to ongoing attacks. …”
    Get full text
    Article
  8. 8

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article
  9. 9

    On the independence heuristic in the dual attack by Bashiri Kaveh, Wiemers Andreas

    Published 2025-07-01
    “…Then, we provide estimates on the success probability and the cost of the dual attack against the decisional version of the BDD problem. …”
    Get full text
    Article
  10. 10

    Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses by Muhammad Usman Rana, Munam Ali Shah, Mohammad Abdulaziz Al-Naeem, Carsten Maple

    Published 2024-01-01
    “…We provide the insight of these attacks and present ways to countermeasure the attacks and to reduce the attack surface. …”
    Get full text
    Article
  11. 11

    Attack Reconstruction and Attack-Resilient Consensus Control for Fuzzy Markovian Jump Multi-Agent Systems by Yunji Li, Yajun Wu, Yi Gao, Meng Wei, Ziyan Hua, Junjie Chen

    Published 2024-11-01
    “…However, the performance of MASs can be easily compromised by malicious false data injection attacks (FDIAs) due to the inherent vulnerability of the cyber layer. …”
    Get full text
    Article
  12. 12

    Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT by Asmaa Munshi

    Published 2024-11-01
    “…Given the high risk of Internet of Things (IoT) device compromise, it is crucial to discuss the attack detection aspect. However, due to the physical limitations of IoT, such as battery life and sensing and processing power, the widely used detection techniques, such as signature-based or anomaly-based detection, are quite ineffective. …”
    Get full text
    Article
  13. 13

    Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks by Abdinasir Hirsi, Mohammed A. Alhartomi, Lukman Audah, Adeb Salh, Nan Mad Sahar, Salman Ahmed, Godwin Okon Ansa, Abdullahi Farah

    Published 2025-01-01
    “…A novel taxonomy of DDoS attacks is introduced, categorizing them by distinct characteristics, and mapping each attack type to relevant detection methods within specific SDN layers. …”
    Get full text
    Article
  14. 14

    Analysis of the success probability of cube attack by Hai-xin SONG, Xiu-bin FAN, Chuan-kun WU, Deng-guo FENG

    Published 2012-10-01
    “…The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic support to cube attack.The theoretical results meet with the experimental results of the analysis of the stream ciphers Trivium and Grain v1 very closely.…”
    Get full text
    Article
  15. 15

    The role of diet in the prevention of migraine attacks by O. O. Kopchak, O. Ye. Hrytsenko

    Published 2021-11-01
    “…The review provides information concerning the influence of dietary factors and different types of diet on the origin and frequency of migraine headaches according to the up-to-date scientific data. …”
    Get full text
    Article
  16. 16

    Disruptive attacks on artificial neural networks: A systematic review of attack techniques, detection methods, and protection strategies by Ahmad Alobaid, Talal Bonny, Maher Alrahhal

    Published 2025-06-01
    “…This paper provides a systematic review of disruptive attacks on artificial neural networks (ANNs). …”
    Get full text
    Article
  17. 17

    DOG: An Object Detection Adversarial Attack Method by Jinpeng Li, Xiaoyu Ji, Wenyuan Xu, Yushi Cheng

    Published 2025-01-01
    “…Additionally, ablation experiments were used to analyze the impact of each module on attack effectiveness, providing a theoretical basis and practical guidance for future research. …”
    Get full text
    Article
  18. 18

    Securing guarantee of the blockchain network:attacks and countermeasures by Peipei JIANG, Qian WANG, Yanjiao CHEN, Qi LI, Chao SHEN

    Published 2021-01-01
    “…While the security of blockchain has been the central concern of both academia and industry since the very start, new security threats continue to emerge, which poses great risks to the blockchain ecosystem.A systematic study was conducted on the most state-of-the-art research on potential security issues of blockchain.Specifically, a taxonomy was developed by considering the blockchain framework as a four-layer system, and the analysis on the most recent attacks against security loopholes in each layer was provided.Countermeasures that can strengthen the blockchain were also discussed by highlighting their fundamental ideas and comparing different solutions.Finally, the forefront of research and potential directions of blockchain security were put forward to encourage further studies on the security of blockchain.…”
    Get full text
    Article
  19. 19

    HMAC-Based Authentication Protocol: Attacks and Improvements by Behzad Abdolmaleki, Karim Baghery, Mohammad javad Emadi

    Published 2016-11-01
    “…We prove that this protocol is not secure against various attacks and also does not provide untraceability. …”
    Get full text
    Article
  20. 20

    Key committing attack on Tiaoxin-346 algorithm by Nan Liu, Chenhui Jin, Junwei Yu

    Published 2025-04-01
    “…Notably, the computational complexity of our attack is O(1), significantly lower than the generic attack complexity of $$O\left( 2^{64}\right)$$ O 2 64 , which effectively violates the key commitment security of Tiaoxin-346. …”
    Get full text
    Article