Results 21 to 30 of about 462,135 (294)

Security-Oriented Cyber-Physical Risk Assessment for Cyberattacks on Distribution System

open access: yesApplied Sciences, 2023
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS).
Yuhang Zhang, Ming Ni
doaj   +1 more source

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms

open access: yesIEEE Access, 2021
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben   +3 more
doaj   +1 more source

Logically Consistent Adversarial Attacks for Soft Theorem Provers

open access: yesProceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Recent efforts within the AI community have yielded impressive results towards “soft theorem proving” over natural language sentences using language models. We propose a novel, generative adversarial framework for probing and improving these models’ reasoning capabilities. Adversarial attacks in this domain suffer from the logical inconsistency problem,
Gaskell, A, Miao, Y, Specia, L, Toni, F
openaire   +5 more sources

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

The Heart Cases in Workmen’s Compensation: An Analysis and Suggested Solution [PDF]

open access: yes, 1967
It is one of the great tragedies of the workmen\u27s compensation story that almost all courts, in their perfectly justifiable search for a legal barrier that would keep compensation heart liability from getting out of hand, have seized upon the wrong ...
Larson, Arthur
core   +3 more sources

EVALUATION OF A BEACH VOLLEYBALL SKILL INSTRUMENT FOR THE LINE SHOT ATTACK [PDF]

open access: yesJournal of Physical Education, 2023
This study aimed to develop a test for measuring athletes’ performance. Logical, content, construct, criterion validity, as well as reliability, were examined.
George Giatsis   +3 more
doaj   +1 more source

Connecting fuzzy logic and argumentation frames via logical attack principles [PDF]

open access: yesSoft Computing, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Corsi Esther Anna   +1 more
openaire   +1 more source

A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers

open access: yesAutomation, 2022
Programmable logic controllers (PLCs) make up a substantial part of critical infrastructures (CIs) and industrial control systems (ICSs). They are programmed with a control logic that defines how to drive and operate critical processes such as nuclear power plants, petrochemical factories, water treatment systems, and other facilities.
Wael Alsabbagh, Peter Langendörfer
openaire   +2 more sources

A Subjective Logical Framework-Based Trust Model for Wormhole Attack Detection and Mitigation in Low-Power and Lossy (RPL) IoT-Networks

open access: yesInformation, 2023
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack.
Sarmad Javed   +6 more
doaj   +1 more source

Method of Early Staged Cyber Attacks Detection in IT and Telecommunication Networks

open access: yesElektronika ir Elektrotechnika, 2018
Increasing digitization together with the benefits has also brought a lot of problems related to the challenges in cyberspace. Due to the ongoing cyberattacks yearly increase, losses in sectors that are using Telecommunication and IT services are growing.
Saulius Japertas, Tautvydas Baksys
doaj   +1 more source

Home - About - Disclaimer - Privacy