Results 61 to 70 of about 6,155,073 (227)

Robust DDoS attack detection with adaptive transfer learning

open access: yesComputers & security
In the evolving cybersecurity landscape, the rising frequency of Distributed Denial of Service (DDoS) attacks requires robust defense mechanisms to safeguard network infrastructure availability and integrity.
Mulualem Bitew Anley   +3 more
semanticscholar   +1 more source

Integrated Replay Spoofing-Aware Text-Independent Speaker Verification

open access: yesApplied Sciences, 2020
A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages.
Hye-jin Shim   +3 more
doaj   +1 more source

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar   +2 more
core   +2 more sources

Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks

open access: yesComputers Materials & Continua, 2021
: In Wireless Body Area Networks (WBANs) with respect to health care, sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically. The great challenges posed to healthcare WBANs are the black hole and
Rajesh Kumar Dhanaraj   +3 more
semanticscholar   +1 more source

Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection [PDF]

open access: yesIEEE Transactions on Network and Service Management, 2020
Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today’s Internet, disrupting the availability of essential services.
R. D. Corin   +4 more
semanticscholar   +1 more source

Detection algorithm for cache pollution attacks based on node state model in content centric networking

open access: yesTongxin xuebao, 2016
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG   +3 more
doaj   +2 more sources

Unambiguous state discrimination in quantum cryptography with weak coherent states

open access: yes, 2000
The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination.
A. Chefles   +18 more
core   +1 more source

Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks

open access: yes, 2022
ICLR 2024 Spotlight (top 5%)
Franzmeyer, T   +6 more
openaire   +3 more sources

Low Latency Detection of Sparse False Data Injections in Smart Grids

open access: yesIEEE Access, 2018
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the
Israel Akingeneye, Jingxian Wu
doaj   +1 more source

False data injection attack in smart grid: Attack model and reinforcement learning-based detection method

open access: yesFrontiers in Energy Research, 2023
The smart grid, as a cyber-physical system, is vulnerable to attacks due to the diversified and open environment. The false data injection attack (FDIA) can threaten the grid security by constructing and injecting the falsified attack vector to bypass ...
Xixiang Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy