Results 31 to 40 of about 291,448 (281)
Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu +3 more
doaj +1 more source
Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim +3 more
core +1 more source
Secure data collection method of WSN based on mobile Sink
At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice. To solve this
MIAO Chunyu, FAN Yuan, GE Kaiqiang, ZHANG Xiaomeng +1 more
doaj +3 more sources
Internet of things (IoT) is a complex and massive wireless network, where millions of devices are connected together. These devices gather different types of data from different systems that transform human daily lives by modernizing home appliances ...
Sabeen Tahir +2 more
doaj +1 more source
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David +3 more
core +1 more source
Sleep Deprivation Attack Detection in Wireless Sensor Network
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes.
Bhattasali, Tapalina +2 more
core +3 more sources
DDoS Attack Detection Based on Self-organizing Mapping Network in Software Defined Networking
The software defined networking is a new kind of network architecture, the programmability of SDN enables hackers to easily launch DDoS attack on the network through software programming. To solve the problem, a DDoS attack detection scheme based on self-
Zhao Chanchan, Liu Feng
doaj +1 more source
Threshold Verification Technique for Network Intrusion Detection System [PDF]
Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important ...
Faizal, M. A. +5 more
core +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of ...
Wenchao Li +4 more
doaj +1 more source

