Academic literature on the topic 'Method of "intelligent attack"'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Method of "intelligent attack".'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Method of "intelligent attack""

1

Qiu, Ling, and Cai Ming Liu. "An Intelligent Detection Method for Network Security." Applied Mechanics and Materials 530-531 (February 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.

Full text
Abstract:
To dynamically discover network attacks hidden in network data, an intelligent detection method for network security is proposed. Biological immune principles and mechanisms are adopted to judge whether network data contain illegal network packets. Signature library of network attacks and section library of attack signatures are constructed. They store attack signatures and signature sections, respectively. They are used to make the initial detection ability of proposed method. Detectors are defined to simulate immune cells. They evolve dynamically to adapt the network security. Signatures of
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Lei, Xiaoqin Wang, Youhuan Yang, and Xiuqing Mao. "D-UAP: Initially Diversified Universal Adversarial Patch Generation Method." Electronics 12, no. 14 (2023): 3080. http://dx.doi.org/10.3390/electronics12143080.

Full text
Abstract:
With the rapid development of adversarial example technologies, the concept of adversarial patches has been proposed, which can successfully transfer adversarial attacks to the real world and fool intelligent object detection systems. However, the real-world environment is complex and changeable, and the adversarial patch attack technology is susceptible to real-world factors, resulting in a decrease in the success rate of attack. Existing adversarial-patch-generation algorithms have a single direction of patch initialization and do not fully consider the impact of initial diversification on i
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Mingjiang, Junfei Bi, Tao Xie, Na Zhang, and Weihu Zhao. "Adversarial Patch Attack Method for Vehicle Target Detection." Journal of Physics: Conference Series 2717, no. 1 (2024): 012026. http://dx.doi.org/10.1088/1742-6596/2717/1/012026.

Full text
Abstract:
Abstract Due to the susceptibility of intelligent recognition systems to adversarial sample attacks, research on adversarial sample attack methods for target detection is of great significance for improving the safety of vehicle autonomous driving. By studying the transfer-based self-ensemble attack adversarial sample generation algorithm, and based on the trained Faster R-CNN and YOLOX white box target detectors, a cross-model and cross-instance vehicle target detection attack method was designed. Through training, a universal adversarial patch was obtained, which achieved recognition attacks
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Yafei, Shengqiang Han, Nan Zhang, and Peng Hu. "Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle." E3S Web of Conferences 268 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202126801010.

Full text
Abstract:
Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity. For the purpose of promoting cybersecurity research capabilities, a novel Cybersecurity Attack-Defense Visualization method based on Intelligent Connected Vehicle (CADV-ICV) is proposed. In this scheme, an Attack-Defense Game model (ADG) is designed so that the logical relationship between the attack and defense can be studied through a system architecture.
APA, Harvard, Vancouver, ISO, and other styles
5

Karthiga, B., Danalakshmi Durairaj, Nishad Nawaz, Thiruppathy Kesavan Venkatasamy, Gopi Ramasamy, and A. Hariharasudan. "Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches." Wireless Communications and Mobile Computing 2022 (October 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/5069104.

Full text
Abstract:
Detecting the attacks in Vehicular Ad hoc Network (VANET) system is very important to provide more secure and reliable communication between all vehicles in the system. In this article, an effective Intelligent Intrusion Detection System (IDS) is proposed using machine learning and deep learning approaches such as Adaptive Neuro Fuzzy Inference System (ANFIS) and Convolutional Neural Networks (CNN), respectively. The existing methods focus on detecting only the known attacks in VANET environment. This limitation is overcome by proposing the Intelligent IDS system using soft computing technique
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Tianxiao, Yingtao Niu, and Zhanyang Zhou. "Adversarial attacks against intelligent anti-jamming communication: An adaptive gray-box attack method." Physical Communication 72 (October 2025): 102716. https://doi.org/10.1016/j.phycom.2025.102716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Kailong, Ke Pan, Weijie Xiu, Min Li, Zhonghe He, and Li Wang. "Research on Attack Detection for Traffic Signal Systems Based on Game Theory and Generative Adversarial Networks." Applied Sciences 14, no. 21 (2024): 9709. http://dx.doi.org/10.3390/app14219709.

Full text
Abstract:
With the rapid development of intelligent transportation systems and information technology, the security of road traffic signal systems has increasingly attracted the attention of managers and researchers. This paper proposes a new method for detecting attacks on traffic signal systems based on game theory and Generative Adversarial Networks (GAN). First, a game theory model was used to analyze the strategic game between the attacker and the defender, revealing the diversity and complexity of potential attacks. A Bayesian game model was employed to calculate and analyze the attacker’s choice
APA, Harvard, Vancouver, ISO, and other styles
8

Xiang, Yingxiao, Wenjia Niu, Endong Tong, et al. "Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods." Security and Communication Networks 2021 (October 31, 2021): 1–17. http://dx.doi.org/10.1155/2021/1632825.

Full text
Abstract:
The intelligent traffic signal (I-SIG) system aims to perform automatic and optimal signal control based on traffic situation awareness by leveraging connected vehicle (CV) technology. However, the current signal control algorithm is highly vulnerable to CV data spoofing attacks. These vulnerabilities can be exploited to create congestion in an intersection and even trigger a cascade failure in the traffic network. To avoid this issue, timely and accurate congestion attack detection and identification are essential. This work proposes a congestion attack detection approach by combining empiric
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Qian, Yongjie Wang, Xinli Xiong, Peng Wang, and Yang Li. "Adversarial Decision-Making for Moving Target Defense: A Multi-Agent Markov Game and Reinforcement Learning Approach." Entropy 25, no. 4 (2023): 605. http://dx.doi.org/10.3390/e25040605.

Full text
Abstract:
Reinforcement learning has shown a great ability and has defeated human beings in the field of real-time strategy games. In recent years, reinforcement learning has been used in cyberspace to carry out automated and intelligent attacks. Traditional defense methods are not enough to deal with this problem, so it is necessary to design defense agents to counter intelligent attacks. The interaction between the attack agent and the defense agent can be modeled as a multi-agent Markov game. In this paper, an adversarial decision-making approach that combines the Bayesian Strong Stackelberg and the
APA, Harvard, Vancouver, ISO, and other styles
10

Dr.R.Venkatesh, Kavitha S, Dr Uma Maheswari N,. "Network Anomaly Detection for NSL-KDD Dataset Using Deep Learning." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (2021): 821–27. http://dx.doi.org/10.17762/itii.v9i2.419.

Full text
Abstract:
Deep learning based intrusion detection cyber security methods gained increased popularity. The essential element to provide protection to the ICT infrastructure is the intrusion detection systems (IDSs). Intelligent solutions are necessary to control the complexity and increase in the new attack types. The intelligent system (DL/ML) has been widely used with its benefits to effectively deal with complex and great dimensional data. The IDS has various attack types like known, unknown, zero day attacks are attractive to and detected using unsupervised machine learning techniques. A novel method
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Method of "intelligent attack""

1

Ratnayake, Deepthi N. "Probe request attack detection in wireless LANs using intelligent techniques." Thesis, London Metropolitan University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590106.

Full text
Abstract:
This work demonstrates a new intelligent approach to recognise probe request attacks in Wireless Local Area Networks (WLAN). In WLANs, management frames facilitate wireless stations (STA) to establish and maintain communications. In infrastructure WLANs, any mobile STA can send a probe request management frame when it needs information from an Access Point CAP). AP replies to any probe request from a STA with a known Medium Access Control (MAC) address, with a probe response management frame with capability information, and supported data rates. The next step is to establish its identity with
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Rongrong. "A Novel Attack Method Against Split Manufactured Circuits." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1573812230926837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O, Kit Hong. "Intelligent Web pre-fetching method." Thesis, University of Macau, 1999. http://umaclib3.umac.mo/record=b1636985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.

Full text
Abstract:
This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In-band, out of band, hidden wormhole attack, active wormhole attack) in both uniformly and non-uniformly distributed sensor networks. Furthermore, the proposed research does not require any special hardware and causes no significant network overhead throughout the network. Most importantly, the probable location of the wormhole nodes ca
APA, Harvard, Vancouver, ISO, and other styles
6

Josyula, Sai Prashanth. "On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10820.

Full text
Abstract:
Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. The attacks that target an implementation of a cryptosystem are known as side-channel attacks. The Flush+Reload attack is a cache side-channel attack that relies on cache hits/misses to recover secret information from the target program execution. In elliptic curve cryptosystems, side-channel attacks are particularly targeted towards the po
APA, Harvard, Vancouver, ISO, and other styles
7

Harayama, Tomohiro. "A method of Weil sum in multivariate quadratic cryptosystem." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5938.

Full text
Abstract:
A new cryptanalytic application is proposed for a number theoretic tool Weil sum to the birthday attack against multivariate quadratic trapdoor function. This new customization of the birthday attack is developed by evaluating the explicit Weil sum of the underlying univariate polynomial and the exact number of solutions of the associated bivariate equation. I designed and implemented new algorithms for computing Weil sum values so that I could explicitly identify some class of weak Dembowski- Ostrom polynomials and the equivalent forms in the multivariate quadratic trapdoor function. This cus
APA, Harvard, Vancouver, ISO, and other styles
8

Mella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.

Full text
Abstract:
La tesi di laurea presentata si inserisce nell’ampio contesto della Sicurezza Informatica, in particolare tratta il problema del testing dei sistemi di sicurezza concepiti per contrapporsi alle odierne minacce: gli attacchi mirati (Targeted Attacks) ed in generale le minacce avanzate persistenti (Advanced Persistent Threats). Il principale obiettivo del lavoro svolto è lo sviluppo e la discussione di una metodologia di test per sistemi di sicurezza focalizzati su questo genere di problemi. Le linee guida proposte hanno lo scopo di aiutare a colmare il divario tra quello che viene testato e qu
APA, Harvard, Vancouver, ISO, and other styles
9

Mondoloni, Stéphane Lucien. "A numerical method for modelling wings with sharp edges maneuvering at high angles of attack." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/49922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Chongyang, and 刘重阳. "A distinct region based method for visual object tracking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Method of "intelligent attack""

1

Wilson, Robert Mills. Programmed word attack for teachers. 6th ed. Merrill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilson, Robert Mills. Programmed word attack for teachers. 5th ed. Macmillan, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

L, Rogers James. DeMAID: A design manager's aide for intelligent decomposition user's guide. National Aeronautics and Space Administration, Langley Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Honeker, Kenneth S. An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN). Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hwang, Danny P. A numerical analysis applied to high angle of attack three-dimensional inlets. National Aeronautics and Space Administration, Lewis Research Center, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

B, Davidson John, Murphy Patrick C, and Langley Research Center, eds. A method for integrating thrust-vectoring and actuated forebody strakes with conventional aerodynamic controls on a high-performance fighter airplane. National Aeronautics and Space Administration, Langley Research Center, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

B, Davidson John, Murphy Patrick C, and Langley Research Center, eds. A method for integrating thrust-vectoring and actuated forebody strakes with conventional aerodynamic controls on a high-performance fighter airplane. National Aeronautics and Space Administration, Langley Research Center, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kang, Shu Gang. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control: Method, Software and Industrial Application. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

H, Sharaf El-Din Hazem, Liu C. H. 1941-, and United States. National Aeronautics and Space Administration., eds. Three dimensional solution of pneumatic active control of forebody vortex asymmetry. American Institute of Aeronautics and Astronautics, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Center, Langley Research, and United States. National Aeronautics and Space Administration., eds. Euler technology assessment: SPLITFLOW code applications for stability and control analysis on an advanced fighter model employing innovative control concepts. National Aeronautics and Space Administration, Langley Research Center, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Method of "intelligent attack""

1

Sharma, Swedika, and Vishal Bharti. "Misdirection Attack in Wireless Sensor Network Using Threshold Method." In Intelligent Systems Design and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64650-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rohini, K., K. Kasturi, and R. Vignesh. "Method for Simulating SQL Injection and DOS Attack." In Intelligent Computing and Innovation on Data Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3284-9_91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Diamah, Aodah, Masoud Mohammadian, and Bala M. Balachandran. "Network Security Evaluation Method via Attack Graphs and Fuzzy Cognitive Maps." In Intelligent Decision Technologies. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29920-9_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Kai, Liyun Chen, and Xingkai Chen. "Website Fingerprinting Attack Method Based on DNS Resolution Sequence." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98776-7_151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Jieren, Jianping Yin, Chengkun Wu, Boyun Zhang, and Yun Liu. "DDoS Attack Detection Method Based on Linear Prediction Model." In Emerging Intelligent Computing Technology and Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04070-2_106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Le, Chengli, and Xiufeng Gao. "Attack Net Modeling Method for Mobile Ad Hoc Network." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bingbing, Xu, Meng Guanglei, Wang Yingnan, and Zhao Runnan. "Guidance Method for UAV to Occupy Attack Position at Close Range." In Intelligent Robotics and Applications. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13835-5_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmad, Syed Jalal, V. S. K. Reddy, A. Damodaram, and P. Radha Krishna. "Detection of Black Hole Attack Using Code Division Security Method." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13731-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marathe, Nilesh R., and Subhash K. Shinde. "Improved ITCA Method to Mitigate Network-Layer Attack in MANET." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0132-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Talmale, Girish, and Urmila Shrawankar. "Multiple Clustering Method for Real-Time Distributed Denial-of-Service Attack Detection." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6307-6_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Method of "intelligent attack""

1

Li, Lu, Fengming Zhu, and Zichen Yang. "A transfer-based adversarial attack method." In 2024 6th International Conference on Robotics, Intelligent Control and Artificial Intelligence (RICAI). IEEE, 2024. https://doi.org/10.1109/ricai64321.2024.10911455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Yanhua, Yijie Xu, Yuting Han, and Zhihuang Liu. "An Intelligent Analysis Method for Multi-Stage Web Attack Forensics." In 2024 20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2024. http://dx.doi.org/10.1109/icnc-fskd64080.2024.10702307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Elsersy, Wael Farouk, Moataz Samy, and Ahmed ElShamy. "XSS Attack Detection Using Machine Learning." In 2024 Intelligent Methods, Systems, and Applications (IMSA). IEEE, 2024. http://dx.doi.org/10.1109/imsa61967.2024.10652622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liao, Fenggui, Yongli Wang, and Dongmei Liu. "Poisoning Attack Detection Method Based on Adaptive Statistical Features." In 2024 4th International Conference on Digital Society and Intelligent Systems (DSInS). IEEE, 2024. https://doi.org/10.1109/dsins64146.2024.10992065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mohamed, Saifeldin Nasser, Ahmed Amr Ahmed, and Wael Elsersy. "FGSM Adversarial Attack Detection On Deepfake Videos." In 2024 Intelligent Methods, Systems, and Applications (IMSA). IEEE, 2024. http://dx.doi.org/10.1109/imsa61967.2024.10652708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yan, Hongbo, Xing Yang, Haoqi Gao, Haiyuan Yu, Zhiyang Hu, and Hanpei Xiao. "A survey of physical-domain adversarial attack methods against object detection models." In Seventh Global Intelligent Industry Conference (GIIC 2024), edited by Xingjun Wang. SPIE, 2024. http://dx.doi.org/10.1117/12.3032331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhao, Liang, Haining Cai, Guoqing Fan, and Yulong Hu. "A Query-less Adversarial Attack Method Against Time Series Forecasting." In 2024 5th International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE). IEEE, 2024. http://dx.doi.org/10.1109/icbase63199.2024.10762166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Us Sholikha, Nia Nisa, Bety Hayat Susanti, and Sepha Siswantyo. "Fixed-Point and Multi-Collision Attack on 5-Round SLIM: Sparse Linear Method Algorithm with Davies Meyer-Scheme." In 2024 7th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2024. https://doi.org/10.1109/isriti64779.2024.10963405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Feng, Weidong, Chunjie Zhang, and Xiaolong Zheng. "Adversarial attack method with adaptive step size for ID card text recognition." In 2024 IEEE 4th International Conference on Digital Twins and Parallel Intelligence (DTPI). IEEE, 2024. https://doi.org/10.1109/dtpi61353.2024.10778639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Vikrant, N. T. Velusudha, Roopa Traisa, Vishwesh Deshmukh, N. V. Balaji, and Siddharth Sriram. "Denial-of-Service Attack Detection in Wireless Sensor Networks: A Simple Artificial Intelligence Method." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862270.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Method of "intelligent attack""

1

McInville, Roy M., and Frank G. Moore. A New Method for Calculating Wing Along Aerodynamics to Angle of Attack 180 deg. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada277965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.

Full text
Abstract:
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the netwo
APA, Harvard, Vancouver, ISO, and other styles
3

Iffat, Idris. Effectiveness of Different Methods to the Counter Financing of Terrorism. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.091.

Full text
Abstract:
Countering financing of terrorism (CFT) has been a core component of counter terrorism strategies since the 9/11 attacks on the US in 2001. Key CFT measures are criminalisation of terrorism financing; sanctions and assets freezing/seizure; and use of financial intelligence. CFT assessments focus on implementation of these measures, rather than on impact in terms of preventing terrorist activity. This rapid review therefore looks at the effectiveness of different CFT measures. It draws on a mixture of academic and grey literature, including policy papers and reports from agencies involved in CF
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
5

Acosta, Jaime C. From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks and Efficient Attack Survivability Analysis. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada564943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Blinov, D. O., A. I. Fomin, A. A. Chibin, I. A. Fedorov, I. A. Denisova, and A. S. Maslova. Software prototype of an intelligent method for automatic distribution of air objects between controlled facilities in a complex organizational and technical system. OFERNiO, 2021. http://dx.doi.org/10.12731/ofernio.2021.24805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kirichek, Galina, Vladyslav Harkusha, Artur Timenko, and Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3743.

Full text
Abstract:
In this article realization method of attacks and anomalies detection with the use of training of ordinary and attacking packages, respectively. The method that was used to teach an attack on is a combination of an uncontrollable and controlled neural network. In an uncontrolled network, attacks are classified in smaller categories, taking into account their features and using the self- organized map. To manage clusters, a neural network based on back-propagation method used. We use PyBrain as the main framework for designing, developing and learning perceptron data. This framework has a suffi
APA, Harvard, Vancouver, ISO, and other styles
8

Rosenblat, Sruly, Tim O'Reilly, and Ilan Strauss. Beyond Public Access in LLM Pre-Training Data: Non-public book content in OpenAI’s Models. AI Disclosures Project, Social Science Research Council, 2025. https://doi.org/10.35650/aidp.4111.d.2025.

Full text
Abstract:
Using a legally obtained dataset of 34 copyrighted O’Reilly Media books, we apply the DE-COP membership inference attack method to investigate whether OpenAI’s large language models were trained on copyrighted content without consent. Our AUROC scores show that GPT-4o, OpenAI’s more recent and capable model, demonstrates strong recognition of paywalled O’Reilly book content (AUROC = 82%), compared to OpenAI’s earlier model GPT-3.5 Turbo. In contrast, GPT-3.5 Turbo shows greater relative recognition of publicly accessible O’Reilly book samples. GPT-4o Mini, as a much smaller model, shows no kno
APA, Harvard, Vancouver, ISO, and other styles
9

Tsidylo, Ivan M., Serhiy O. Semerikov, Tetiana I. Gargula, Hanna V. Solonetska, Yaroslav P. Zamora, and Andrey V. Pikilnyak. Simulation of intellectual system for evaluation of multilevel test tasks on the basis of fuzzy logic. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4370.

Full text
Abstract:
The article describes the stages of modeling an intelligent system for evaluating multilevel test tasks based on fuzzy logic in the MATLAB application package, namely the Fuzzy Logic Toolbox. The analysis of existing approaches to fuzzy assessment of test methods, their advantages and disadvantages is given. The considered methods for assessing students are presented in the general case by two methods: using fuzzy sets and corresponding membership functions; fuzzy estimation method and generalized fuzzy estimation method. In the present work, the Sugeno production model is used as the closest
APA, Harvard, Vancouver, ISO, and other styles
10

Zhao, George, Grang Mei, Bulent Ayhan, Chiman Kwan, and Venu Varma. DTRS57-04-C-10053 Wave Electromagnetic Acoustic Transducer for ILI of Pipelines. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0012049.

Full text
Abstract:
In this project, Intelligent Automation, Incorporated (IAI) and Oak Ridge National Lab (ORNL) propose a novel and integrated approach to inspect the mechanical dents and metal loss in pipelines. It combines the state-of-the-art SH wave Electromagnetic Acoustic Transducer (EMAT) technique, through detailed numerical modeling, data collection instrumentation, and advanced signal processing and pattern classifications, to detect and characterize mechanical defects in the underground pipeline transportation infrastructures. The technique has four components: (1) thorough guided wave modal analysis
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!