Results 81 to 90 of about 291,448 (281)
Context Wireless sensor network (WSN) is susceptible to vampire attacks. It is a type of denial of service (DoS) attack that drains sensor nodes’ energy, leading to network failure. The study addresses the challenge by detecting these attacks to conserve
M. Sudha +3 more
doaj +1 more source
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source
Network Attack Detection for Business Safety
In the technology age, the use of networks has hugely increased. this led to an increment in the number of attackers. A network attack is an try to achieve unauthorized access to personnel of an organization’s network, steal data or perform other ...
Fadia Abduljabbar Saeed +2 more
doaj +1 more source
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram +1 more
doaj +1 more source
ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) [PDF]
In this research, a hierarchical off-line anomaly network intrusion detection system based on Distributed Time-Delay Artificial Neural Network is introduced. This research aims to solve a hierarchical multi class problem in which the type of attack (DoS,
LAHEEB MOHAMMAD IBRAHIM
core
Detecting Adversarial Attacks in the Context of Bayesian Networks [PDF]
In this research, we study data poisoning attacks against Bayesian network structure learning algorithms. We propose to use the distance between Bayesian network models and the value of data conflict to detect data poisoning attacks. We propose a 2-layered framework that detects both one-step and long-duration data poisoning attacks.
Emad Alsuwat +4 more
openaire +2 more sources
Value of MRI Outcomes for Preventive and Early‐Stage Trials in Spinocerebellar Ataxias 1 and 3
ABSTRACT Objective To examine the value of MRI outcomes as endpoints for preventive and early‐stage trials of two polyglutamine spinocerebellar ataxias (SCAs). Methods A cohort of 100 participants (23 SCA1, 63 SCA3, median Scale for the Assessment and Rating of Ataxia (SARA) score = 5, 42% preataxic, and 14 gene‐negative controls) was scanned at 3T up ...
Thiago J. R. Rezende +26 more
wiley +1 more source
Vestibular Patient Journey: Insights From Vestibular Disorders Association (VeDA) Registry
ABSTRACT Objective Vestibular symptoms impose a high burden of disability. Understanding real‐world diagnostic and treatment pathways can identify care gaps and guide interventions. We aimed to characterize symptom profiles, diagnostic trends, provider involvement, and treatment patterns in vestibular disorders.
Ali Rafati +10 more
wiley +1 more source
Abnormal Traffic Detection Method for Multi-stage Attacks of Internet of Things Botnets [PDF]
To address the problem of how to efficiently detect multi-stage attack behavior of IoT botnet from massive network traffic data,an IoT botnet attack detection method based on multi-scale hybrid residual network(IBAD-MHRN)is proposed.Firstly,in order to ...
CHEN Liang, LI Zhihua
doaj +1 more source
On the Use of Word Networks to Mimicry Attack Detection [PDF]
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mimicry attacks [1]. A mimicry attack is a variation of an attack that attempts to pass by as normal behaviour.
Fernando Godínez +2 more
openaire +1 more source

