Results 61 to 70 of about 6,155,073 (227)
Robust DDoS attack detection with adaptive transfer learning
In the evolving cybersecurity landscape, the rising frequency of Distributed Denial of Service (DDoS) attacks requires robust defense mechanisms to safeguard network infrastructure availability and integrity.
Mulualem Bitew Anley +3 more
semanticscholar +1 more source
Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages.
Hye-jin Shim +3 more
doaj +1 more source
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar +2 more
core +2 more sources
Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks
: In Wireless Body Area Networks (WBANs) with respect to health care, sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically. The great challenges posed to healthcare WBANs are the black hole and
Rajesh Kumar Dhanaraj +3 more
semanticscholar +1 more source
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection [PDF]
Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today’s Internet, disrupting the availability of essential services.
R. D. Corin +4 more
semanticscholar +1 more source
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG +3 more
doaj +2 more sources
Unambiguous state discrimination in quantum cryptography with weak coherent states
The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination.
A. Chefles +18 more
core +1 more source
Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks
ICLR 2024 Spotlight (top 5%)
Franzmeyer, T +6 more
openaire +3 more sources
Low Latency Detection of Sparse False Data Injections in Smart Grids
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the
Israel Akingeneye, Jingxian Wu
doaj +1 more source
The smart grid, as a cyber-physical system, is vulnerable to attacks due to the diversified and open environment. The false data injection attack (FDIA) can threaten the grid security by constructing and injecting the falsified attack vector to bypass ...
Xixiang Lin +3 more
doaj +1 more source

