To see the other types of publications on this topic, follow the link: Counter attack.

Journal articles on the topic 'Counter attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Counter attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

W., B. "Counter attack." Canadian Medical Association Journal 174, no. 2 (2006): 211–12. http://dx.doi.org/10.1503/cmaj.051546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cho, Jonghyeon, Taehun Kim, Soojin Kim, Miok Im, Taehyun Kim, and Youngjoo Shin. "Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor." Applied Sciences 10, no. 3 (2020): 984. http://dx.doi.org/10.3390/app10030984.

Full text
Abstract:
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim. Hence, a spy can obtain secret information without alerting the victim. To resist this attack, many detection techniques have been proposed. However, these approaches have limitations as they do not operate in real time. This article proposes a real-time detection method against cache side channel attacks. The proposed technique performs the detection of cache side channel attacks immediately after observing a
APA, Harvard, Vancouver, ISO, and other styles
3

Barth, R. L. "Sassoon’s Counter-Attack." Explicator 49, no. 2 (1991): 117–18. http://dx.doi.org/10.1080/00144940.1991.11484030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Innis, Jack. "Corrosion Counter-Attack!" CoatingsPro 12, no. 3 (2012): 36–85. https://doi.org/10.5006/cp2012_12_3-36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McLaughlin, Kevin L. "Cyber Attack! Is a Counter Attack Warranted?" Information Security Journal: A Global Perspective 20, no. 1 (2011): 58–64. http://dx.doi.org/10.1080/19393555.2010.544705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tin, Derrick, Dennis G. Barten, Harald De Cauwer, and Gregory R. Ciottone. "Transport Terrorism: A Counter-Terrorism Medicine Analysis." Prehospital and Disaster Medicine 37, no. 2 (2022): 217–22. http://dx.doi.org/10.1017/s1049023x22000371.

Full text
Abstract:
AbstractBackground:Many capital cities around the world have been subjected to terrorist attacks on their transport systems with devastating consequences. Large crowds in small enclosed spaces, disruption to people movement, and the psychosocial and financial repercussions of attacks are some of the many soft target vulnerabilities of mass-transit systems.This study is an epidemiological examination of all terrorism-related events targeting air, sea, and ground transport modalities sustained from 1970-2019, comparing the rates of fatal injuries (FI) and non-fatal injuries (NFI).Method:The Glob
APA, Harvard, Vancouver, ISO, and other styles
7

Zegzhda, Dmitry, Evgeny Pavlenko, and Elena Aleksandrova. "Modelling Artificial Immunization Processes to Counter Cyberthreats." Symmetry 13, no. 12 (2021): 2453. http://dx.doi.org/10.3390/sym13122453.

Full text
Abstract:
This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in information security—in particular, the use of immune methods to protect several critical system nodes from a predetermined range of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize the tasks, means and modes of immunization to describe how modern systems can counter the spread of computer at
APA, Harvard, Vancouver, ISO, and other styles
8

Parvin, Sazia, Farookh Khadeer Hussain, and Sohrab Ali. "A Methodology to Counter DoS Attacks in Mobile IP Communication." Mobile Information Systems 8, no. 2 (2012): 127–52. http://dx.doi.org/10.1155/2012/268781.

Full text
Abstract:
Similar to wired communication, Mobile IP communication is susceptible to various kinds of attacks. Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication. The number of approaches hitherto proposed to prevent DoS attack in the area of mobile IP communication is much less compared to those for the wired domain and mobile ad hoc networks. In this work, the effects of Denial of Service attack on mobile IP communication are analyzed in detail. We propose to use packet filtering techniques that work in different domains and base stations of mobi
APA, Harvard, Vancouver, ISO, and other styles
9

Barten, Dennis G., Derrick Tin, Harald De Cauwer, Robert G. Ciottone, and Gregory R. Ciottone. "A Counter-Terrorism Medicine Analysis of Drone Attacks." Prehospital and Disaster Medicine 37, no. 2 (2022): 192–96. http://dx.doi.org/10.1017/s1049023x22000139.

Full text
Abstract:
AbstractBackground:The rapid popularization of unmanned aerial vehicles (UAVs; also referred to as drones), in both the recreational and industrial sectors, has paved the way for rapid developments in drone capabilities. Although the threat of UAVs used by terrorists has been recognized by specialists in both Counter-Terrorism and Counter-Terrorism Medicine (CTM), there are limited data on the extent and characteristics of drone use by terrorist organizations.Methods:Data collection was performed using a retrospective database search through the Global Terrorism Database (GTD). The GTD was sea
APA, Harvard, Vancouver, ISO, and other styles
10

Mrs.Ashvinee, N.Kharat* Prof.Mr.(Dr.).B.D.Phulpagar. "SURVEY ON METHODS FOR EVASION ATTACK DETECTION." INTERNATIONAL JOURNALOFRESEARCH SCIENCE& MANAGEMENT 4, no. 7 (2017): 54–60. https://doi.org/10.5281/zenodo.831440.

Full text
Abstract:
Network security has become more necessary to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security sanctions a better understanding of the emergence of security technology. Network attacks had become a curse to technology, where attacker destroy or gain illegal access to system recourses and restrict the legitimate users from accessing the information. In this paper, we are going study different type of network security attack and learn counter measures for that attack. We are also going to study
APA, Harvard, Vancouver, ISO, and other styles
11

Yonita, Delvira, Iman Sulaiman, and Yasep Setiakarna Wijaya. "Model Latihan Counter Attack Atlet Kumite Cabang Olahraga Karate." Jurnal Terapan Ilmu Keolahragaan 4, no. 2 (2019): 99–106. http://dx.doi.org/10.17509/jtikor.v4i2.18971.

Full text
Abstract:
AbstrakTujuan dari penelitian dan pengembangan ini adalah untuk menghasilkan model latihan counter attack atlet kumite cabang olahraga karate. Selain itu, penelitian dan pengembangan ini dilakukan untuk memperoleh informasi secara mendalam tentang: pengembangan dan penerapan model latihan counter attack atlet kumite cabang olahraga karate dan mengetahui efektivitas, efisiensi dan peningkatan keterampilan latihan atlet terhadap model yang dibuat. Penelitian dan pengembangan ini menggunakan metode Penelitian pengembangan Research Development (RD) dari Borg and Gall. Subyek dalam penelitian dan p
APA, Harvard, Vancouver, ISO, and other styles
12

Tin, Derrick, Dennis G. Barten, Harald De Cauwer, Luc JM Mortelmans, and Gregory R. Ciottone. "Terrorist Attacks in Western Europe: A Counter-Terrorism Medicine Analysis." Prehospital and Disaster Medicine 37, no. 1 (2022): 19–24. http://dx.doi.org/10.1017/s1049023x21001370.

Full text
Abstract:
AbstractBackground:The modern concept of terrorism has its roots in the “old continent” of Western Europe, more specifically in France, during the “Reign of Terror” period of the French Revolution. At the time, this form of state terror had a positive connotation: it was a legitimate means of defending the young state. While no single accepted definition of terrorism exists today, it is universally considered an attack on both state and society. The health care impacts of terrorist attacks often extend disproportionally beyond the casualty toll, but the potential for such events to induce mass
APA, Harvard, Vancouver, ISO, and other styles
13

Peng, Yi-Kun, and Shih-Chung Cheng. "Analysis of Critical Determinant Factors for Beach Volleyball Winning in Elite Men and Women Teams." European Journal of Sport Sciences 2, no. 4 (2023): 1–12. http://dx.doi.org/10.24018/ejsport.2023.2.4.89.

Full text
Abstract:
Purpose: was to explore critical determinant factors for beach volleyball winning in elite men's and women's teams. Methods: Python web crawler were implemented to collect attack & defense records of the world beach volleyball world championships for elite men & women beach volleyball games during 2015~2022, including 839 sets from 366 men's matches as well as 840 sets from 367 women's matches. By using classification and regression tree referring to decision tree, binary logistic regression, characteristics of the scoring effectiveness and model of critical determinant winning skills
APA, Harvard, Vancouver, ISO, and other styles
14

jain, Rupal, and Rajneesh Pachouri. "DETECTING AND ISOLATING BLACK-HOLE ATTACKS IN MANET USING COUNTER BASED TROLLING TECHNIQUE." International Journal of Advanced Research in Computer Science 11, no. 6 (2020): 36–45. http://dx.doi.org/10.26483/ijarcs.v11i6.6679.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is a part of wireless networks that gives different applications in various fields. MANET's security had gotten perhaps the greatest issue in fields of networks. MANET is powerless against various kinds of attacks that influence its usefulness and availability. The black hole attack is viewed as one of the most perilous dynamic attacks which impedes the presentation and dependability of the network because of the dropping of all approaching data packets by the malicious node. The black hole attack intends to deceive each node in the network that needs to speak wit
APA, Harvard, Vancouver, ISO, and other styles
15

Samer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.

Full text
Abstract:
ABSTRACT The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a hardware attack has been identified, mitigation techniques should be employed to protect the system. There are now a wide variety of techniques, which can be used against hardware attacks. In th
APA, Harvard, Vancouver, ISO, and other styles
16

Pincevičius, Albertas, Rimantas-Jonas Rakauskas, Gintautas Misevičius, and Svajonė Vašterienė. "The mathematical modeling of counter-attack." Lietuvos matematikos rinkinys 41 (December 17, 2001): 542–47. http://dx.doi.org/10.15388/lmr.2001.34644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dr., Janaki Sivakumar, Smitha Nayak Ms., and Amala Nirmal Doss Dr. "IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks." International Journal of Engineering and Management Research 10, no. 1 (2020): 72–78. https://doi.org/10.31033/ijemr.10.1.13.

Full text
Abstract:
<strong>Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer&nbsp; based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS)&nbsp; to avoid pseudonym attac
APA, Harvard, Vancouver, ISO, and other styles
18

Abdulqadir, Ziyad. "Migration controls and counter-terrorism in Europe: a discussion of challenges and policies." Journal of Scientific Papers "Social development and Security" 11, no. 2 (2021): 18–25. http://dx.doi.org/10.33445/sds.2021.11.2.3.

Full text
Abstract:
This paper explores the European suspicion against the migrants and analyses the European security concerns regarding terrorist attacks. The paper shows that Europeans’ wrong perception about migrants has been created by homogenizing the category of migrants as well as politicizing the issue of migrants for electoral maneuvering. The suspicion has been grown after the 9/11 terrorist attack on America. Islamic radical organization Al-Qaeda perpetrated this attack to achieve its political agenda. This attack gave legitimacy to America and Europe to suspect everybody who is coming into their area
APA, Harvard, Vancouver, ISO, and other styles
19

Siddiqi, Murtaza Ahmed, Wooguil Pak, and Moquddam A. Siddiqi. "A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures." Applied Sciences 12, no. 12 (2022): 6042. http://dx.doi.org/10.3390/app12126042.

Full text
Abstract:
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s security architecture. Social engineering attacks exploit specific human attributes and psychology to bypass technical security measures for malicious acts. Social engineering is becoming a pervasive approach used for compromising individuals and organizations (is relatively more convenient to compromise a human compared to discovering a vulnerabili
APA, Harvard, Vancouver, ISO, and other styles
20

Viktorov, D., D. Sevostianov, V. Shklyaev, and Yu Yarushev. "METHOD FOR IMPROVING PRICK ACCURACY IN YOUNG FENCERS." Human Sport Medicine 19, no. 2 (2019): 86–91. http://dx.doi.org/10.14529/hsm190211.

Full text
Abstract:
Aim. The article deals with justifying the application of the method for improving prick accuracy in young fencers during their technical and tactical preparation. Materials and methods. 30 beginners in fencing aged 8-9 participated in the pedagogical experiment. The experiment consisted of recording video and making graphical notes about the preferable actions of each athlete. Using special protocols, we registered the data obtained from video recordings where the pricks were regarded as a result of the attack actions described with special symbols. Results. The attack and counter-attack acti
APA, Harvard, Vancouver, ISO, and other styles
21

Dohrenwend, Robert E. "Animales peligrosos y artes marciales asiáticas." Revista de Artes Marciales Asiáticas 5, no. 1 (2012): 127. http://dx.doi.org/10.18002/rama.v5i1.141.

Full text
Abstract:
In spite of legends to the contrary, the unarmed fighting arms did not originate as protection against attacks by wild animals. The modern unarmed martial arts have no techniques devised to counter an attack by any animal, wild or domestic. An attack by an animal is extremely dangerous; it is at least as likely as an attack by another human being, and there is little that you can do if unarmed. This introduction to animal attacks, based on personal experience and published accounts, is written to emphasize this gap in our training, in the hope that the reader will take steps to become less vul
APA, Harvard, Vancouver, ISO, and other styles
22

K., Thamizhmaran. "Enhanced Secure Technique for Detecting Attacks in Network." Journal of Advancement in Electronics Design 3, no. 3 (2020): 1–6. https://doi.org/10.5281/zenodo.4223718.

Full text
Abstract:
<em>Recent research years of development of network mainly affected denial of service attacks are a virulent. Distributed rejection of service attackers infiltrate enormous quantities of computers by misusing software vulnerabilities, to set up distributed attack networks.These accidental computers are then summoned to wage a coordinated, large-scale enormous attack against at least one more victim systems. As specific counter measures are developed, attackers enhance existing denial attack tools, developing new and derivative developed techniques and attack tools. As opposed to respond to new
APA, Harvard, Vancouver, ISO, and other styles
23

Isberg, R. "Host microbe interactions: bacteria Innate immune response: attack and counter-attack." Current Opinion in Microbiology 3, no. 1 (2000): 13–15. http://dx.doi.org/10.1016/s1369-5274(99)00044-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zhao, Jian Xun. "Research and Design on an Improved TOTP Authentication." Applied Mechanics and Materials 411-414 (September 2013): 595–99. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.595.

Full text
Abstract:
HOTP generation algorithm has safety risks because the counter is easily predicted. This paper describes TOTP generation algorithm which make the counter replace with timer, and makes an improved authentication method according to Three-Protocol of HOTP authentication method based on TOTP. The improved authentication method use an authentication number threshold and a timestamp to resist brute force attacks and replay attacks, use a random number and the MD5 encryption resist Man-in-the-Middle attack. Finally, a safe and useful Web authentication system is designed by PHP language.
APA, Harvard, Vancouver, ISO, and other styles
25

Khan, Israr, William Farrelly, and Kevin Curran. "A Demonstration of Practical DNS Attacks and their Mitigation Using DNSSEC." International Journal of Wireless Networks and Broadband Technologies 9, no. 1 (2020): 56–78. http://dx.doi.org/10.4018/ijwnbt.2020010104.

Full text
Abstract:
The authors implement common attacks on a DNS server and demonstrate that DNSSEC is an effective solution to counter DNS security flaws. This research demonstrates how to counter the zone transfer attack via the generation of DNSSEC keys on the name servers which prevent attackers from obtaining a full zone transfer as its request for the transfer without the keys was denied by the primary server. This article also provides a detailed scenario of how DNSSEC can be used as a mechanism to protect against the attack if an attacker tried to perform Cache Poisoning. The authors ultimately show that
APA, Harvard, Vancouver, ISO, and other styles
26

Lasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." International Journal of Information Security and Privacy 5, no. 1 (2011): 33–49. http://dx.doi.org/10.4018/jisp.2011010103.

Full text
Abstract:
Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrates the effectiveness of desynchronisation attacks against a security protocol for mobile satellite communications. A new mutual authentication protocol for satellite communications, incorporating a resyn
APA, Harvard, Vancouver, ISO, and other styles
27

Jiao, Jiajia, Ran Wen, and Yulian Li. "T-Smade: A Two-Stage Smart Detector for Evasive Spectre Attacks Under Various Workloads." Electronics 13, no. 20 (2024): 4090. http://dx.doi.org/10.3390/electronics13204090.

Full text
Abstract:
Evasive Spectre attacks have used additional nop or memory delay instructions to make effective hardware performance counter based detectors with lower attack detection successful rate. Interestingly, the detection performance gets worse under different workloads. For example, the attack detection successful rate is only 59.8% for realistic applications, while it is much lower 27.52% for memory stress test. Therefore, this paper proposes a two-stage smart detector T-Smade designed for evasive Spectre attacks (e.g., evasive Spectre nop and evasive Spectre memory) under various workloads. T-Smad
APA, Harvard, Vancouver, ISO, and other styles
28

Sarmento, H., A. Marques, J. Martins, T. Anguera, J. Campanico, and J. Leitao. "Tactical analysis of the Barcelona counter-attack." British Journal of Sports Medicine 45, no. 15 (2011): A4. http://dx.doi.org/10.1136/bjsports-2011-090606.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Debatin, Klaus-Michael. "CD95 System Counter Attack and Prognostic Impact." Oncology Research and Treatment 29, no. 8-9 (2006): 358–59. http://dx.doi.org/10.1159/000094698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Braimah, Joseph Odunayo, Tendai Makoni, and Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria." F1000Research 13 (September 2, 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.

Full text
Abstract:
Background While Boko Haram insurgency’s dangers are well documented, existing research lacks methods for effective monitoring and prediction, of their activities. This study addresses this gap by analyzing data from Nigerian Security Tracker website (https://www.cfr.org/nigeria/nigeria-security-tracker/p29483) from year 2011 to 2023 and geolocated information on Boko Haram activity. Methods The research employs a mixed-methods approach. It uses descriptive statistics to understand attack trends and time series models (ARIMA/SARIMA) to forecast future attacks. Additionally, control charts iden
APA, Harvard, Vancouver, ISO, and other styles
31

Kaur, Ramanpreet, Amrit Lal Sangal, and Krishan Kumar. "A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/5191405.

Full text
Abstract:
The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave), and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. One attack to compromise the service availability in overlay network is intentional churn (join/leave) attack, where a large number of malicious users will join and leave
APA, Harvard, Vancouver, ISO, and other styles
32

Martin, Brian. "Preparing for advocacy, resisting attack." Pacific Conservation Biology 25, no. 1 (2019): 105. http://dx.doi.org/10.1071/pc17015.

Full text
Abstract:
When scientists engage in public advocacy, or indeed in any public comment on controversial issues, there is a risk they will come under attack. To reduce the possibility of reprisals, it is worthwhile preparing, in several ways, including learning from the experience of others and making mild comments to see the reaction. If there is a serious risk, reducing expenditures and transferring assets can provide extra financial security. Building networks for personal support is crucially important, including family and friends, work colleagues and various others. When coming under attack, it is im
APA, Harvard, Vancouver, ISO, and other styles
33

Jeong, Yeuncheol. "THE OPERATION DESERT STORM AND THE PATRIOT MISSILE DEFENSE SYSTEM [4] -THE PATRIOT’S INDIRECT SUCCESS." International Journal of Applied Science and Engineering Review 05, no. 03 (2024): 24–26. http://dx.doi.org/10.52267/ijaser.2024.5305.

Full text
Abstract:
According to Raytheon, the manufacturer of the Patriot system. The Patriot’s success was certainly a political one. Saudi Arabia could not possibly be on the same side of Israel if Israel counter-attacks Iraq. Because of this political complication, the US provided Israel with the defensive weapon such as the Patriot system. Thus, regardless of the Patriot’s defense effectiveness, the US was able to limit Israel’s military action to directly counter-attack Iraq. In this way, the US could keep the allied forces together, sustaining the US policy in the middle east.
APA, Harvard, Vancouver, ISO, and other styles
34

Rustamov, S., K. Sharipov, and T. Pulatov. "VULNERABILITY ANALYSIS OF EMERGENCY RESPONSE SYSTEM BASED ON NAVIGATIONAL UNITS IN CASE OF VEHICLE ACCIDENTS." Technical science and innovation 2020, no. 2 (2020): 14–18. http://dx.doi.org/10.51346/tstu-01.20.2-77-0058.

Full text
Abstract:
When we focusing Emergency response system based on navigational units vulnerability to intentional interference and an opportunity incentive to attackers who wants to fool or impair Emergency response system based on navigational units especially smartphones and drones then Spoofing interference is a considerably powerful attack than jamming cause of jammer attacks block GNSS legitimate communication signals immediately on several receivers this arise mitigation strategy and counter measures for efficient jamming detection before damages are done. However, spoofing attack is most dangerous ty
APA, Harvard, Vancouver, ISO, and other styles
35

Chauahn, Devendra, Manish Patel, Bhavik Prajapati, and Gaurang Patel. "Intrusion Detection Approach Using AI & ML Classifiers." SPU Journal of Science, Technology and Management Research 1, no. 2 (2024): 40–50. https://doi.org/10.63766/spujstmr.24.000015.

Full text
Abstract:
In the Current world situation with an increase in internet speed and bandwidth, data requirement increases with a transfer of a tremendous amount of data over a network, especially internet, wired or wireless network. This poses a significant challenge to network security or cyber security i.e. unauthorized access to secure data. To counter these challenges on wireless networks is hard with its extra ordinary properties. To counter this challenge IDS (Intrusion Detection System) is used to detect various types of attacks on a network by analyzing abnormal behavior on a network. One common met
APA, Harvard, Vancouver, ISO, and other styles
36

Nisa, Khalimatu. "HUMOUR AS A COUNTER ISLAMIST DISCOURSE." Epistemé: Jurnal Pengembangan Ilmu Keislaman 18, no. 1 (2023): 1–25. http://dx.doi.org/10.21274/epis.2023.18.1.1-25.

Full text
Abstract:
This article addresses counter-Islamist discourses by NU Garis Lucu (NU’s Funny Brigade) through its social media accounts. Instead of a clear-cut theological debates, NU Garis Lucu offers humour as method to counter attack Islamit’s arguments through its social-media activism. Using a discourse analysis approach, this article examines tweets of the NU Garis Lucu’s during the course of 2015-2020. It further reveals the account strategies to counter attack Islamist’s discourse which include questioning the legitimacy of the religious authority of Islamist groups, promoting religious moderation,
APA, Harvard, Vancouver, ISO, and other styles
37

T, Mr Umesh. "SECURITY IN SOCIAL MEDIA: AWARNESS OF PHISHING ATTACKS TECHNIQUES AND COUNTER MEASURES." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31435.

Full text
Abstract:
As time and technology progresses, the social media security is one of the basic and most important aspects to consider when browsing the internet.Nowadays all people using social media mostly, using social media is widely spread among different age groups to meet several purposes including education, entertainment, or even pursue a research. With the increase of using smartphones and social media, the cyber security threats also increased. The most widely- perpetrated form of social media attacks is phishing; it is used to gather sensitive personal and professional information such as social
APA, Harvard, Vancouver, ISO, and other styles
38

Pfisterer, Valentin. "The Second SWIFT Agreement Between the European Union and the United States of America — An Overview." German Law Journal 11, no. 10 (2010): 1173–90. http://dx.doi.org/10.1017/s2071832200020174.

Full text
Abstract:
The United States and other nations have taken numerous military, police and intelligence measures in order to counter terrorists’ threats in response to the September 11 attacks on the World Trade Center in New York City and the Pentagon in Virginia as well as the attempted attack on a target in Washington, D. C.
APA, Harvard, Vancouver, ISO, and other styles
39

Abdul, Khadar A., Shrishail Math Dr., Brahmananda S. H. Dr., and Shivamurthy G. Dr. "Website Vulnerability Detection: Inception of Mitigation of Advanced Persistent Threats." Solid State Technology 63, no. 6 (2020): 7902. https://doi.org/10.5281/zenodo.7549581.

Full text
Abstract:
There are four basic stages of Advanced Persistent Threat attacks Study, Spear, Search and Sabotage. The study stage is executed with intent to acquire as much information as possible about attack target through various methods. One of the most successful methods is to gather the vulnerabilities of the target website. To counter the APTs the very basic solution is to detect the vulnerabilities present in the website and build an attack proof website to further shorten the chance of APT attacks. Vulnerability is a weakness that exists in the computer component upon exploiting which the attacker
APA, Harvard, Vancouver, ISO, and other styles
40

Pingua, Bhagyajit, Deepak Murmu, Meenakshi Kandpal, et al. "Mitigating adversarial manipulation in LLMs: a prompt-based approach to counter Jailbreak attacks (Prompt-G)." PeerJ Computer Science 10 (October 22, 2024): e2374. http://dx.doi.org/10.7717/peerj-cs.2374.

Full text
Abstract:
Large language models (LLMs) have become transformative tools in areas like text generation, natural language processing, and conversational AI. However, their widespread use introduces security risks, such as jailbreak attacks, which exploit LLM’s vulnerabilities to manipulate outputs or extract sensitive information. Malicious actors can use LLMs to spread misinformation, manipulate public opinion, and promote harmful ideologies, raising ethical concerns. Balancing safety and accuracy require carefully weighing potential risks against benefits. Prompt Guarding (Prompt-G) addresses these chal
APA, Harvard, Vancouver, ISO, and other styles
41

Dr. P. S. AITHAL, Dr K. SAI MANOJ,. "CYBER SECURITY AND PRIVACY INTERNAL ATTACKS MEASUREMENTS THROUGH BLOCK CHAIN." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 1033–44. http://dx.doi.org/10.17762/itii.v9i1.236.

Full text
Abstract:
Cyber Security plays critical role in privacy and now a day’s its assumesanimportanttask in the field of data security. Security concern Block chain gives best fruitful results to overcome unauthorized access and internal counter attacks operations| we propose new technique to reduce and identify internal privacy leaks and attack to measure with efficient manner. These technique very useful to cyber internal avoid attacks with accountability way and real-time environment operations.
APA, Harvard, Vancouver, ISO, and other styles
42

Dougan, Timothy, and Kevin Curran. "Man in the Browser Attacks." International Journal of Ambient Computing and Intelligence 4, no. 1 (2012): 29–39. http://dx.doi.org/10.4018/jaci.2012010103.

Full text
Abstract:
Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security community has been aware of them as such for time but they have grown in ability and success during that time. These attacks are a specialised version of Man-in-the-Middle attack, and operate by stealing authentication data and altering legitimate user transactions to benefit the attackers. This paper examines what Man-in-the-Browser attacks are capable of and how specific versions of the attack are executed, with referen
APA, Harvard, Vancouver, ISO, and other styles
43

Qi, B., C. H. F. Fung, H. K. Lo, and F. X. Ma. "Time-shift attack in practical quantum cryptosystems." Quantum Information and Computation 7, no. 1&2 (2007): 73–82. http://dx.doi.org/10.26421/qic7.1-2-3.

Full text
Abstract:
Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another ``time-shift'' attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0'' and bit "1'' with the same SPD, Eve, in some circumstances, could acquire full information on the final k
APA, Harvard, Vancouver, ISO, and other styles
44

Yankson, Samuel, and Mahdi Ghamkhari. "Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems." Future Internet 12, no. 1 (2019): 4. http://dx.doi.org/10.3390/fi12010004.

Full text
Abstract:
The automatic generation control mechanism in power generators comes into operation whenever an over-supply or under-supply of energy occurs in the power grid. It has been shown that the automatic generation control mechanism is highly vulnerable to load altering attacks. In this type of attack, the power consumption of multiple electric loads in power distribution systems is remotely altered by cyber attackers in such a way that the automatic generation control mechanism is disrupted and is hindered from performing its pivotal role. The existing literature on load altering attacks has studied
APA, Harvard, Vancouver, ISO, and other styles
45

Kubayi, Alliance. "The Creation of Goal-Scoring Opportunities at the 2019 FIFA Women’s World Cup." Journal of Human Kinetics 82, no. 1 (2022): 165–72. http://dx.doi.org/10.2478/hukin-2022-0043.

Full text
Abstract:
Abstract The aim of this study was to analyse how goal-scoring opportunities (GSOs) were created at the 2019 FIFA Women’s World Cup. The sample consisted of 868 GSOs that led to a shot at the goal throughout all 52 games during the tournament. All games were downloaded from the InStat platform. Descriptive statistics, chi-square of association and binary logistic regression analysis were used to analyse the data. Of the 868 GSOs, 81 (9.1%) resulted in goals. A significant association was observed between GSOs and the type of attack (χ2=6.38, p=0.01, V=0.09), with more goals being scored from a
APA, Harvard, Vancouver, ISO, and other styles
46

Cummings, Brian. "Nietzsche and Luther: Reading, Counter-Text, Hermeneutics." CounterText 7, no. 1 (2021): 90–105. http://dx.doi.org/10.3366/count.2021.0217.

Full text
Abstract:
In what way is Nietzsche's infamous late aphorism, ‘God is dead’, related to a general attack on theology and its intellectual practices? In Twilight of the Idols, he remarks: ‘I'm afraid we're not rid of God because we still believe in grammar.’ Reason, he decries, has become mired in linguistic rules long determined by the requirements of scholastic philosophy, whether of medieval theology or of Immanuel Kant. Nietzsche dismisses these as die Sprach-Metaphysik (‘metaphysics of language’). In this essay I examine Nietzsche's attack on theology via his long-term struggle with the ideas of Luth
APA, Harvard, Vancouver, ISO, and other styles
47

Kshirsagar, Prof Prakash. "Defend Predict: Forecasting Innovations in Cyber Attack Detection." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2858–67. http://dx.doi.org/10.22214/ijraset.2024.60466.

Full text
Abstract:
Abstract: The rapid evolution of digital technologies has revolutionized the way we connect and conduct our daily activities, offering unparalleled convenience. However, this digital transformation has also exposed our interconnected systems to a myriad of cyber threats. Thus, the significance of robust cyber attack detection mechanisms cannot be emphasized enough. As cyber threats become increasingly complex and sophisticated, it is imperative to employ advanced detection techniques to effectively counter them. Cyber attack detection serves as a crucial safeguard for digital assets and critic
APA, Harvard, Vancouver, ISO, and other styles
48

Adi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.

Full text
Abstract:
Nowadays in cloud based business services have risks of side channel attacks. Cache-based side channel attack, cross-VM side channel attacks are the serious threat and security pitfall under same cloud network services. In order to provide more security and less infrastructure investment leads to challenging task. In this paper, the discussions on various levels of attacks on VM ware based solution under same cloud network computing, vulnerabilities to other cloud services, security weakness and counter measures in cryptographic algorithms.
APA, Harvard, Vancouver, ISO, and other styles
49

K.S, Poornima, and Nandhni J.P. "Enhanced RRED to Counter LDoS Attacks." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 08 (2013): 252–55. https://doi.org/10.5281/zenodo.14613317.

Full text
Abstract:
This paper provides an enhancement technique and algorithm to the Robust RED packet dropping algorithm in order to intelligently make packet drops and also to trace the IP addresses on a rough approximate of the creators of the low rate DoS attack. This technique also reduces the time complexity of the algorithm.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
50

Fauzi, Muhammad, and Dikdik Zafar Sidik. "Efektivitas Distribusi Lemparan Kiper terhadap Hasil Counter Attack dalam Final Four Profesional 2018." Jurnal Kepelatihan Olahraga 11, no. 1 (2019): 12–20. http://dx.doi.org/10.17509/jko-upi.v11i1.16781.

Full text
Abstract:
Tujuan penelitian ini adalah untuk mengetahui efektivitas distribusi lemparan kiper terhadap hasil counter attack dalam pertandingan futsal. Metode yang digunakan adalah metode deskriptif dengan melakukan observasi langsung. Sampel dipilih dengan teknik purposive sampling sehingga sampel yang digunakan adalah tim yang lolos Final Four Profesional Futsal League tahun 2018, berjumlah empat tim. Instrument penelitian menggunakan analisis video, kemudian data di analisis dengan teknik deskriptif persentase. Hasil yang didapat dari penelitian ini adalah rendahnya tingkat keberhasilan distribusi lem
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!