Results 31 to 40 of about 574,096 (277)

Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities

open access: yesShuju Caiji Yu Chuli
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan   +4 more
doaj   +1 more source

A false data attack detection method for power grid based on an improved AIGA

open access: yesZhejiang dianli, 2023
As a typical cyber-physical attack, false data are measured unchanged, thus deceiving the detection based on chi-square detector. To this end, a false data attack detection method for smart grid based on an improved adaptive immune genetic algorithm ...
WANG Xinyu   +4 more
doaj   +1 more source

A Comparison of Stealthy Sensor Attacks on Control Systems

open access: yes, 2017
As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection.
aström   +5 more
core   +1 more source

Algorithm Selection Framework for Cyber Attack Detection

open access: yes, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +1 more source

Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models

open access: yesSensors, 2022
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters.
Xu Zhang   +7 more
doaj   +1 more source

Audio-replay attack detection countermeasures

open access: yes, 2017
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander   +5 more
core   +1 more source

Integrated Replay Spoofing-Aware Text-Independent Speaker Verification

open access: yesApplied Sciences, 2020
A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages.
Hye-jin Shim   +3 more
doaj   +1 more source

Detection algorithm for cache pollution attacks based on node state model in content centric networking

open access: yesTongxin xuebao, 2016
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG   +3 more
doaj   +2 more sources

DDoS Attack Detection and Attacker Identification

open access: yesInternational Journal of Computer Applications, 2012
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

Home - About - Disclaimer - Privacy