Results 81 to 90 of about 13,174 (191)

Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa   +5 more
wiley   +1 more source

Spoiled Onions: Exposing Malicious Tor Exit Relays

open access: yes, 2014
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core  

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Injectable Autocatalytic Hydrogel Triggers Pyroptosis to Stimulate Anticancer Immune Response for Preventing Postoperative Tumor Recurrence

open access: yesAdvanced Science
Modulating immunosuppression while eliminating residual microscopic tumors is critical for inhibiting the postoperative recurrence of triple‐negative breast cancer (TNBC). Although immunotherapy has shown potential in achieving this goal, due to multiple
Zhiping Rao   +10 more
doaj   +1 more source

Protocolul HSTS impotriva atacurilor MITM

open access: yes, 2017
Un atac man-in-the-middle MITM este un tip de atac cibernetic care permite unui actor rău intenționat să facă interceptarea, trimiterea și primirea datelor destinate pentru altcineva. Un atac MITM exploatează procesarea în timp real al tranzacțiilor, conversațiilor sau transferul altor date.
Bulai, R., Cucu, E.
openaire   +1 more source

Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks

open access: yesIEEE Access
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi   +2 more
doaj   +1 more source

Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

open access: yesSensors, 2018
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision ...
Farhan Ahmad   +4 more
doaj   +1 more source

Stealthy Deception Attacks Against SCADA Systems

open access: yes, 2017
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann   +12 more
core   +1 more source

Parallelizing quantum circuit synthesis

open access: yes, 2016
Quantum circuit synthesis is the process in which an arbitrary unitary operation is decomposed into a sequence of gates from a universal set, typically one which a quantum computer can implement both efficiently and fault-tolerantly.
Di Matteo, Olivia, Mosca, Michele
core   +1 more source

Home - About - Disclaimer - Privacy