Limpar
536.498 resultados

Acesso aberto

Tipo do recurso

Tipo de base de dados

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Livro

Alexander Street

Revisão

Surendra Kumar, Mridula Dwivedi, Mohit Kumar, Sukhpal Singh Gill,

... securing cloud services against vulnerabilities, threats, and modern attacks remains a major concern. Application layer attacks are particularly problematic because they can cause significant ... flows. Moreover, preventing Distributed Denial of Service (DDoS) attacks is challenging due to its high impact on ... bandwidth. This study examines new variations of DDoS attacks within the broader context of cyber threats and ... based approaches to detect and prevent such modern attacks. The conducted investigation determines that the current detection ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2024 - Elsevier BV | Computer Science Review

Artigo Acesso aberto Revisado por pares

Onur Polat, Muammer Türkoğlu, Hüseyin Polat, Saadin Oyucu, Hüseyin Üzen, Fahri Yardımcı, Ahmet Aksöz,

... advantages, it cannot address security concerns against cyber-attacks such as a distributed denial of service (DDoS). ... and programmability features causes attackers to carry out attacks that specifically target the SDN controller and data plane. If DDoS attacks against the SDN-based SCADA network are not ... have terrible consequences. By detecting a possible DDoS attack at an early stage, security measures that can reduce the impact of the attack can be taken immediately, and the likelihood of being a direct victim of the attack decreases. This study proposes a multi-stage learning ...

Tópico(s): Smart Grid Security and Resilience

2024 - Multidisciplinary Digital Publishing Institute | Sensors

Primary Document -- Manuscript Acesso aberto

... on Israel by Arab states; Israel-Egypt: Israeli attack at Sabha, 2 Nov 1955; Israel-Egypt: US ... El Auja and Egyptian press coverage of counter attack at Sabha. Gives further details of the Israeli ...

1955 - Gale Group | ArchivesUnbound Arabi Israeli

Artigo Acesso aberto Revisado por pares

Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, Samuel C. Hollifield, Pablo Moriano, Steven C. Hespeler, Bill Kay, Frank L. Combs,

... CAN intrusion detection system (IDS) datasets. We categorize attacks on CANs including fabrication (adding frames, e.g., ... suspension (removing an ID's frames), and masquerade attacks (spoofed frames sent in lieu of suspended ones). ... of each dataset; an enumeration of each datasets' attacks, benefits, and drawbacks; categorization as real vs. simulated CAN data and real vs. simulated attacks; whether the data is raw CAN data or ... are limited to real fabrication (simple message injection) attacks and simulated attacks often in synthetic data, lacking ...

Tópico(s): Data Management and Algorithms

2024 - Public Library of Science | PLoS ONE

Livro Acesso aberto

National Library of Medicine (NCBI)

Artigo Acesso aberto Revisado por pares

Muhammad Aurangzeb, Yifei Wang, Sheeraz Iqbal, Ausnain Naveed, Zeeshan Ahmed, Mohammed Alenezi, Mokhtar Shouran,

... as a result, some deep black box adversarial attacks have been conducted and presented. We propose a ... for benchmarking smart grid security with black box attacks. Additionally, concerning the type of smart grids, Smart Power Grids, deep black box adversarial attacks which can be crafted using virtually no knowledge ... We identify potential impacts of deep black box attacks on Smart Power Grids as implemented by the ... initiate a study on deep black box adversarial attacks against Smart Power Grids showing that statistically significant ...

Tópico(s): Network Security and Intrusion Detection

2024 - Elsevier BV | Energy Reports

Artigo Revisado por pares

Yoav Groweiss, Carmel Blank, Sami Hamdan, Yuval Neria, Yossi Levi‐Belz,

... 2023, Israeli citizens came under an unprecedented terrorist attack that impacted the entire country. Recent research has ... to document the mental health impact of the attack but has yet to address the question of whether the attack had a differential impact across ethnic communities. In ... Jews and Arabs in the post-October 7th attack. Specifically, we aimed to understand the role ethnicity ... depression, and anxiety diagnoses from pre- to post-attack. The sample comprised 656 participants (332 female, 50. ...

Tópico(s): Suicide and Self-Harm Studies

2024 - Elsevier BV | Psychiatry Research

Artigo Revisado por pares

Hussah Albinali, Farag Azzedin,

... However, it has become a target for numerous attacks, which have sparked a need for researchers to ... comprehensive literature review covering 175 papers on RPL attacks and their mitigation solutions. Our rigorous selection process ... understanding of how RPL is exploited for different attacks and the solutions designed to mitigate such attacks. Our study proposes RPL attacks taxonomy based on the attack vector, along with mitigation solutions taxonomy. RPL attacks are classified based on the attack vector, such ...

Tópico(s): Web Application Security Vulnerabilities

2024 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Network and Service Management

Artigo Revisado por pares

Fuyi Yang, Xiangpeng Xie, Qiuye Sun, Dong Yue,

In this paper, false-data-injection (FDI) attack estimation and event-triggered resilient control of DC microgrid (DC-MG) systems under FDI and denial-of-service (DoS) hybrid attacks are studied. In order to describe more general DoS attack characteristics, a time-constrained DoS attack (TCDA) model is established. This model only requires attack duration information compared to the classic DoS model. ... based switching DC-MG system model with FDI attack compensation is established by using pulse observer, event- ...

Tópico(s): Software-Defined Networks and 5G

2024 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Smart Grid

Livro

National Bureau of Economic Research (NBER)

Artigo Acesso aberto Revisado por pares

Jinlai Zhang, Yinpeng Dong, Jun Zhu, Jihong Zhu, Minchi Kuang, Xiaming Yuan,

... 3D applications, concerns about their vulnerability to adversarial attacks grow in tandem. This paper addresses the challenge of enhancing the transferability of 3D adversarial attacks, a critical aspect for evaluating model robustness across ... a marginal increase in computational time. The proposed attack method operates within the Carlini-Wagner (CW) optimization ... scaling and shearing transformations, Scale and Shear (SS) attack seamlessly integrates with established attack methods, enhancing flexibility ...

Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security

2024 - Elsevier BV | Information Sciences

Artigo Acesso aberto

Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu‐Ghazaleh,

The recent Spectre attacks exploit speculative execution, a pervasively used feature of modern microprocessors, to allow the exfiltration of sensitive data across protection ... this paper, we introduce a new Spectre-class attack that we call SpectreRSB. In particular, rather than ... predict return addresses. We show that both local attacks (within the same process such as Spectre 1) and attacks on SGX are possible by constructing proof of concept attacks. We also analyze additional types of the attack ...

Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security

2024 - Institute of Electrical and Electronics Engineers | IEEE Design and Test

Primary Document -- Manuscript Acesso aberto

... on Israel by Arab states; Israel-Egypt: Israeli attack at Sabha, 2 Nov 1955; Israel-Egypt: US ... El Auja and Egyptian press coverage of counter attack at Sabha. Contains American press comment on the ...

1955 - Gale Group | ArchivesUnbound Arabi Israeli

Artigo Revisado por pares

Ashfaq Ahmad Najar, S. Manohar Naik,

... given rise to an alarming increase in cyber-attacks, posing serious threats to the security and stability of modern networks. Among these attacks, Distributed Denial of Service (DDoS) attacks have emerged as one of the most devastating, ... notification mechanisms, making them ineffective in detecting DDoS attacks. This paper proposes an efficient approach (BRS + CNN) ... and Convolutional Neural Networks (CNNs) to detect DDoS attacks in SDN environments. We have applied various mitigation ... proposed DDoS detection system not only detects the attack but also sends detailed contextual information to a ...

Tópico(s): Software-Defined Networks and 5G

2024 - Elsevier BV | Computers & Security