Results 81 to 90 of about 13,174 (191)
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source
Spoiled Onions: Exposing Malicious Tor Exit Relays
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
Modulating immunosuppression while eliminating residual microscopic tumors is critical for inhibiting the postoperative recurrence of triple‐negative breast cancer (TNBC). Although immunotherapy has shown potential in achieving this goal, due to multiple
Zhiping Rao +10 more
doaj +1 more source
Protocolul HSTS impotriva atacurilor MITM
Un atac man-in-the-middle MITM este un tip de atac cibernetic care permite unui actor rău intenționat să facă interceptarea, trimiterea și primirea datelor destinate pentru altcineva. Un atac MITM exploatează procesarea în timp real al tranzacțiilor, conversațiilor sau transferul altor date.
Bulai, R., Cucu, E.
openaire +1 more source
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi +2 more
doaj +1 more source
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision ...
Farhan Ahmad +4 more
doaj +1 more source
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann +12 more
core +1 more source
Parallelizing quantum circuit synthesis
Quantum circuit synthesis is the process in which an arbitrary unitary operation is decomposed into a sequence of gates from a universal set, typically one which a quantum computer can implement both efficiently and fault-tolerantly.
Di Matteo, Olivia, Mosca, Michele
core +1 more source

