Academic literature on the topic 'Digital attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital attacks"

1

Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.

Full text
Abstract:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS at
APA, Harvard, Vancouver, ISO, and other styles
2

Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.

Full text
Abstract:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS at
APA, Harvard, Vancouver, ISO, and other styles
3

Dugyala, Raman, N. Hanuman Reddy, Raghuram G, and J. Lakshminarayana. "Decentralized Secure Online Digital Data Registrations." International Journal of Engineering & Technology 7, no. 4.6 (2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.6.20231.

Full text
Abstract:
A potential challenge in the present secure transaction lies in illegitimate access to premium digital data available in various formats on various service-sectors for Government and Non-Government process models. This vulnerable scenario leads to identity attacks, man in the middle (MITM) attacks and denial of service (DoS) attacks. Our proposed model uses blockchain technology with machine learning classifiers to identify and detect possible attacks within a peer-to-peer network. Blockchain uses digital signatures, proof-of-work algorithm and consensus algorithms to protect system from possi
APA, Harvard, Vancouver, ISO, and other styles
4

Nwaocha, Vivian O., and Ayodele Oloyede. "Averting DDOS Attacks in Web-Based Applications." Advances in Multidisciplinary and scientific Research Journal Publication 11, no. 1 (2023): 51–63. http://dx.doi.org/10.22624/aims/digital/v11n1p4.

Full text
Abstract:
Distributed Denial-of-Service attacks are becoming increasingly pervasive, especially in web-based applications, and their impact have been devastating and affect businesses and organisations negatively. This research highlights web-based applications which enables users connect with a remote server via a web browser. The web apps are used on a range of devices, including desktops, laptops, tablets, and smartphones, which are prone to various attacks and predominantly DDoS attacks. Consequently, effective strategies, Mitigation Service are proposed for detecting DDoS attacks and blocking malic
APA, Harvard, Vancouver, ISO, and other styles
5

Stein, Zvi, Adir Hazan, and Adrian Stern. "Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks." Sensors 25, no. 7 (2025): 2301. https://doi.org/10.3390/s25072301.

Full text
Abstract:
Despite the outstanding performance of deep neural networks, they remain vulnerable to adversarial attacks. While digital domain adversarial attacks are well-documented, most physical-world attacks are typically visible to the human eye. Here, we present a novel invisible optical-based physical adversarial attack via dazzling a CMOS camera. This attack involves using a designed light pulse sequence spatially transformed within the acquired image due to the camera’s shutter mechanism. We provide a detailed analysis of the photopic conditions required to keep the attacking light source invisible
APA, Harvard, Vancouver, ISO, and other styles
6

Kpieleh, Ferdinand. "A Review of Ddos Attack Detection in Iot Networks." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 43–54. http://dx.doi.org/10.22624/aims/digital/v10n4p6.

Full text
Abstract:
The security risks and vulnerabilities associated with these resource-constrained Internet of Things (IoT) devices grow as their usability rises. Distributed Denial of Service is one of the main dangers to Internet of Things devices (DDoS). Continuous monitoring, early detection, and adaptive decision-making are necessary for IoT device security to be robust and effective. With software-defined networking (SDN), these issues can be solved, giving IoT devices the chance to manage DDoS threats in an efficient manner. This study suggests a unique SDN-based secure IoT framework that uses IP Payloa
APA, Harvard, Vancouver, ISO, and other styles
7

Kansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.

Full text
Abstract:
WhatsApp provides a fertile ground for the large-scale dissemination of information, particularly in countries like Brazil and India. Given its increasing popularity and use for political discussions, it is paramount to ensure that WhatsApp groups are adequately protected from attackers who aim to disrupt the activity of WhatsApp groups. Motivated by this, in this work, we characterize two types of attacks that may disrupt WhatsApp groups. We look into the flooding attack, where an attacker shares a large number of usually duplicate messages within a short period, and the hijacking attack, whe
APA, Harvard, Vancouver, ISO, and other styles
8

Beny Abukhaer Tatara, Bisma Abdurachman, Desta Lesmana Mustofa, and David Yacobus. "The Potential of Cyber Attacks in Indonesia's Digital Economy Transformation." NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam 20, no. 1 (2023): 19–37. http://dx.doi.org/10.19105/nuansa.v20i1.7362.

Full text
Abstract:
In the era of the industrial revolution 4.0, many activities use the internet and computers, including economic activities. Many activities in real space are transformed into cyberspace. Currently, the world economy is transforming from conventional methods to digital. Thus, almost all countries in the world are competing to adapt to these changes, one of which is Indonesia which, based on the McKinsey report, ranks first as the country with the fastest growth in adopting the digital economy. The purpose of writing this article is to analyze the potential for cyber attacks that can affect the
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.

Full text
Abstract:
Federated learning aims to train a centralized federated model using decentralized data sources and to ensure the security and privacy of user data during system training process. Federal learning still faces four challenges: high communication costs, system heterogeneity, data heterogeneity, and data security, The primary attacks facing federal learning include confidentiality, integrity, and usability attacks. Attackers mainly target confidential attacks, while malicious attackers target integrity attacks and usability attacks. Homomorphism encryption refers to the encryption algorithm that
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.

Full text
Abstract:
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements that make the digital watermark strong as possible. Technologies of digital watermarking are mainly classified depending on their domain to spatial domain watermarks, Watermarks belonging to frequency (tr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital attacks"

1

Liu, Yan. "Digital Video Watermarking Robust to Geometric Attacks and Compressions." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20281.

Full text
Abstract:
This thesis focuses on video watermarking robust against geometric attacks and video compressions. In addition to the requirements for an image watermarking algorithm, a digital video watermarking algorithm has to be robust against advanced video compressions, frame loss, frame swapping, aspect ratio change, frame rate change, intra- and inter-frame filtering, etc. Video compression, especially, the most efficient compression standard, H.264, and geometric attacks, such as rotation and cropping, frame aspect ratio change, and translation, are considered the most challenging attacks for video w
APA, Harvard, Vancouver, ISO, and other styles
2

Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.

Full text
Abstract:
Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. The goal of this study is to identify indicators of resilience against SE-attacks from individual computer space data, such as network settings, social media profiles, web browsing behaviour and more. This study is based on qualitative methods to collect information, analyse and evaluate data. Resilience is evaluated with mo
APA, Harvard, Vancouver, ISO, and other styles
3

Su, Karen. "Digital video watermarking principles for resistance to collusion and interpolation attacks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63030.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTER
APA, Harvard, Vancouver, ISO, and other styles
5

Holm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.

Full text
Abstract:
The 2014 cyber attack on Sony Pictures Entertainment is an example of a disruptive event where a nation state utilized cyber tools in order to coerce a target into changing their course of action. Cyber attacks, something that might be perceived as a looming futuristic threat, became reality for Sony and its employees under the course of a few months in late 2014. The coercer’s attempt to change the behavior of the company eventually failed and North Korea who was attributed as coercer was imposed with new sanctions. This paper takes on the task of evaluating the Sony case against both the tra
APA, Harvard, Vancouver, ISO, and other styles
6

Steiner, Hrafn. "Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5273.

Full text
Abstract:
In the wake of the cyber-attacks in 2007 against Estonia and in 2010 against Iran, academics have debated the character of cyberwar. This study applies the theories of coercive diplomacy to the cases of Estonia and Iran in order to explain cyber-attacks as instrument for coercive diplomacy. While the long term effects of the attacks have yet to be understood it is clear that cyber-attacks can, and will, become a serious threat against political decision-makers in times of conflict.
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ge, Shizun. "Design of reliable and secure devices by algebraic manipulation codes." Thesis, Boston University, 2012. https://hdl.handle.net/2144/21153.

Full text
Abstract:
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.<br>In this thesis, we firstly present the secure multipliers protected by the AMD codes, and demonstrate that the fault masking probabilities are not worse than the results based on the theoretical analysis of error masking proba
APA, Harvard, Vancouver, ISO, and other styles
9

Mouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.

Full text
Abstract:
The new and upcoming field of wireless sensor networking is unfortunately still lacking in terms of both digital forensics and security. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically and, at the same time, retain their integrity and authenticity. The study presents several attacks that can be executed successfully on a wireless sensor network, after which the dissertation delves more deeply into the flooding attack as it is one of the most difficult attacks to a
APA, Harvard, Vancouver, ISO, and other styles
10

Keskinarkaus, A. (Anja). "Digital watermarking techniques for printed images." Doctoral thesis, Oulun yliopisto, 2013. http://urn.fi/urn:isbn:9789526200583.

Full text
Abstract:
Abstract During the last few decades, digital watermarking techniques have gained a lot of interest. Such techniques enable hiding imperceptible information to images; information which can be extracted later from those images. As a result, digital watermarking techniques have many interesting applications for example in Internet distribution. Contents such as images are today manipulated mainly in digital form; thus, traditionally, the focus of watermarking research has been the digital domain. However, a vast amount of images will still appear in some physical format such as in books, poster
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Digital attacks"

1

Su, Karen. Digital video watermarking principles for resistance to collusion and interpolation attacks. National Library of Canada, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davis, Mark W. (Mark William), 1955-, ed. Digital assassination: Protecting your reputation, brand, or business against online attacks. St. Martin's Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Russkevich, Evgeniy. Criminal law and "digital crime": problems and solutions. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.

Full text
Abstract:
The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian
APA, Harvard, Vancouver, ISO, and other styles
4

Project, American Social History, and George Mason University. Center for History and New Media., eds. The September 11 digital archive: Saving the histories of September 11, 2001. s.n.], 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Sung Justin. Integrated and Distributed Digital Low-Drop-Out Regulators with Event-Driven Controls and Side-Channel Attack Resistance. [publisher not identified], 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Honeker, Kenneth S. An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN). Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mark, Davis, and Richard Torrenzano. Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks. St. Martin's Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thakkar, Dhanya. Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks. Packt Publishing - ebooks Account, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hybrid Media Events: The Charlie Hebdo Attacks and Global Circulation of Terrorist Violence. Emerald Publishing Limited, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Department of Defense. Cyber Attacks, Attribution, and Deterrence: Case Studies - Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure As Vital to National Security. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Digital attacks"

1

Bhardwaj, Akashdeep. "Supply chain attacks." In Insecure Digital Frontiers. CRC Press, 2024. http://dx.doi.org/10.1201/9781003515395-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Szynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.

Full text
Abstract:
AbstractThe distributed denial of service (DDoS) attack is an attempt to disrupt the proper availability of a targeted server, service or network. The attack is achieved by corrupting or overwhelming the target’s communications with a flood of malicious network traffic. In the current era of mass connectivity DDoS attacks emerge as one of the biggest threats, staidly causing greater collateral damage and heaving a negate impacting on the integral Internet Infrastructure. DDoS attacks come in a variety of types and schemes, they continue to evolve, steadily becoming more sophisticated and large
APA, Harvard, Vancouver, ISO, and other styles
3

Venturini, Ilaria. "Oracle Attacks and Covert Channels." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vila-Forcén, J. E., S. Voloshynovskiy, O. Koval, F. Pérez-González, and T. Pun. "Practical Data-Hiding: Additive Attacks Performance Analysis." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Malware and Automated Computer Attacks." In Cybercrime and Digital Forensics. Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Babamir, Seyed Morteza, Reyhane Nowrouzi, and Hadi Naseri. "Mining Bluetooth Attacks in Smart Phones." In Networked Digital Technologies. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14292-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.

Full text
Abstract:
AbstractDetection of unknown attacks is challenging due to the lack of exemplary attack vectors. However, previously unknown attacks are a significant danger for systems due to a lack of tools for protecting systems against them, especially in fast-evolving Internet of Things (IoT) technology. The most widely used approach for malicious behaviour of the monitored system is detecting anomalies. The vicious behaviour might result from an attack (both known and unknown) or accidental breakdown. We present a Net Anomaly Detector (NAD) system that uses one-class classification Machine Learning tech
APA, Harvard, Vancouver, ISO, and other styles
8

Doërr, Gwenaël, and Jean-Luc Dugelay. "Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manasa, Sanyasi, and Kukatlapalli Pradeep Kumar. "Digital Forensics Analysis for Adversarial Attacks in Ai-Based Systems." In Attacks on Artificial Intelligence. Apple Academic Press, 2025. https://doi.org/10.1201/9781003498827-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jenkinson, A. J. "Domain Name System (DNS) Attacks." In Digital Blood on Their Hands. CRC Press, 2022. http://dx.doi.org/10.1201/9781003323273-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital attacks"

1

Ali Khan, Mohammed Rauf, and Ahmad Almulhem. "Behavioral and Propagation-Based Analysis of APT Attacks for Effective Attack Attribution." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alharthi, Naif Wasel, and Martim Brandão. "Physical and Digital Adversarial Attacks on Grasp Quality Networks." In 2024 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2024. http://dx.doi.org/10.1109/icra57147.2024.10610886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jares, Garrett, and Chyna Lane. "Secure Development of Machine Learning Against Poisoning Attacks." In 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC). IEEE, 2024. http://dx.doi.org/10.1109/dasc62030.2024.10748747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Matholia, Hardi, and Oluwasola Mary Adedayo. "Investigating NoSQL Injection Attacks on MongoDB Web Applications." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quénéhervé, Kévin, William Pensec, Philippe Tanguy, Rachid Dafali, and Vianney Lapôtre. "Exploring Fault Injection Attacks on CVA6 PMP Configuration Flow." In 2024 27th Euromicro Conference on Digital System Design (DSD). IEEE, 2024. http://dx.doi.org/10.1109/dsd64264.2024.00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sucith, R., P. Mathiazhagan, M. Ajith, and G. Lingesh. "Deep Learning Approaches for Detecting Forgery Attacks on Digital Images." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ouazza, Hajra, Fadoua Khennou, and Abderrahim Abdellaoui. "Adversarial Retraining and White-Box Attacks for Robust Malware Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yujie, and Wenze Shao. "The clean sample matters to transferable attacks on object detection models." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fang, Hao, Ajian Liu, Haocheng Yuan, et al. "Unified Physical-Digital Face Attack Detection." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/83.

Full text
Abstract:
Face Recognition (FR) systems can suffer from physical (i.e., print photo) and digital (i.e., DeepFake) attacks. However, previous related work rarely considers both situations at the same time. This implies the deployment of multiple models and thus more computational burden. The main reasons for this lack of an integrated model are caused by two factors: (1) The lack of a dataset including both physical and digital attacks which the same ID covers the real face and all attack types; (2) Given the large intra-class variance between these two attacks, it is difficult to learn a compact feature
APA, Harvard, Vancouver, ISO, and other styles
10

Moser, Daniel, Vincent Lenders, and Srdjan Capkun. "Digital radio signal cancellation attacks." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3319720.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Digital attacks"

1

Wiratraman, Herlambang Perdana. How can Indonesian journalists be best protected from digital attacks? Edited by Ria Ernunsari and Suzannah Lyons. Monash University, 2023. http://dx.doi.org/10.54377/e39a-8802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spirito, Christopher, Fan Zhang, and Md Hossain. M3CT-23IN1105035 - Protecting and Defending against Autonomous Control Systems and Digital Twin Cyber Attacks (Final). Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2331253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca013.

Full text
Abstract:
Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful digital supply chain attacks against cyber infrastructure suggest the answer may be no. This report introduces policymakers to these emerging threats and provides recommendations for how to secure the machine learning supply chain.
APA, Harvard, Vancouver, ISO, and other styles
4

Almorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, 2024. http://dx.doi.org/10.26735/orro4624.

Full text
Abstract:
Threat actors, including infamous cybercrime groups and financially driven ransomware gangs, have focused on Arab countries› businesses and organizations as they grow and move toward digital transformation. In particular, ransomware is a very serious type of cyber-attack worldwide, and many organizations are severely affected by it. INTERPOL indicates that the ransomware gangs are targeting different regions such as Africa, Americas, Caribbean, Asia-Pacific, Europe, Middle East, and North Africa 1. The Center of Excellence in Cybercrime and Digital Forensics (CoECDF) at NAUSS has conducted a d
APA, Harvard, Vancouver, ISO, and other styles
5

Ihsan, Yilmaz, and Raja Ali M. Saleem. The nexus of religious populism and digital authoritarianism in Pakistan. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/pp0016.

Full text
Abstract:
Pakistan has a turbulent political history. In the seven decades since its creation, the country has faced four military-led dictatorships and another two decades under indirect military rule. Given this political trend, authoritarianism is not a novel phenomenon in the country. Digital authoritarianism, however, is a relatively new domain of oppression. This paper looks at how a political party in power and the “establishment” (military elite and its civilian collaborators) have been increasing the control of digital mediums as well as weaponizing space. This dual control and usage allow for
APA, Harvard, Vancouver, ISO, and other styles
6

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-sou
APA, Harvard, Vancouver, ISO, and other styles
7

Scrivens, Ryan, Steven M. Chermak, Joshua D. Freilich, Thomas W. Wojciechowski, and Richard Frank. Detecting Extremists Online: Examining Online Posting Behaviors of Violent and Non-Violent Right-Wing Extremists. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.21.remve.

Full text
Abstract:
Like most of us, violent extremists often leave a digital footprint behind. Researchers, practitioners, and policymakers raise questions about whether violent individuals can be identified online prior to their attacks offline based on their online posting behaviors. Despite ongoing concerns, few empirically grounded analyses have identified which online users have engaged in violent extremism offline and then assessed their digital footprints, and fewer analyses have identified differences in posting behaviors of those who share extreme ideological beliefs but are violent or non-violent in th
APA, Harvard, Vancouver, ISO, and other styles
8

Belcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2113.

Full text
Abstract:
Public transit agencies in the United States depend on external vendors to help deliver and maintain many essential services and to provide critical technologies, from ticket purchases to scheduling to email management. While the integration of new, advanced technologies into the public transit industry brings important advancements to U.S. critical transportation infrastructure, the application of digital technologies also brings with it a new assortment of digital risks. Transit agencies of all sizes are finding themselves subject to cyber incidents—most notably ransomware attacks—like those
APA, Harvard, Vancouver, ISO, and other styles
9

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, 2022. http://dx.doi.org/10.55271/5jchdy.

Full text
Abstract:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of
APA, Harvard, Vancouver, ISO, and other styles
10

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), 2022. http://dx.doi.org/10.55271/rp0001.

Full text
Abstract:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!