To see the other types of publications on this topic, follow the link: Quick attack.

Journal articles on the topic 'Quick attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Quick attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Singh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.

Full text
Abstract:
Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers. There are several reports of DDoS attack incidences that have caused devastating effects on the user and web services in the Internet world. In the present digital world dominated by wireless, mobile and IoT devices, the numbers of users are increasing day by day. Most of the users are novice and therefore their devices either fell prey to DDoS attacks or unknowingly add themselves to the DDoS attack Army.
APA, Harvard, Vancouver, ISO, and other styles
2

Abdullayeva, Fargana, and Orkhan Valikhanli. "Development of a method for detecting GPS spoofing attacks on unmanned aerial vehicles." Problems of Information Technology 13, no. 1 (2022): 3–8. http://dx.doi.org/10.25045/jpit.v13.i1.01.

Full text
Abstract:
As in other vehicles, unmanned aerial vehicles (UAV) mainly use GPS (Global Positioning System) for the provision of navigation. Non-execution of necessary measures on UAV, availability of the devices used in the process of attack may cause GPS spoofing attack on UAV. The quick detection of the attack plays an important role in obtaining safety precautions. The use of artificial neural networks in the detection of such attacks is very convenient. Therefore, in the article new approach based on convolutional neural network (CNN) method is proposed in order to detect GPS spoofing attack. The new
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Zhe, Wenjie Zhang, Ying Ren, et al. "Speed Master: Quick or Slow Play to Attack Speaker Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 21 (2025): 22137–45. https://doi.org/10.1609/aaai.v39i21.34367.

Full text
Abstract:
Backdoor attacks pose a significant threat during the model's training phase. Attackers craft pre-defined triggers to break deep neural networks, ensuring the model accurately classifies clean samples during inference yet erroneously classifies samples added with these triggers. Recent studies have shown that speaker recognition systems trained on large-scale data are susceptible to backdoor attacks. Existing attackers employ unnoticed ambient sounds as triggers. However, these sounds are not inherently part of the training samples themselves. In essence, triggers can be designed to maintain a
APA, Harvard, Vancouver, ISO, and other styles
4

Doult, Bill. "NHS Direct under attack as a quick-fix gimmick." Nursing Standard 14, no. 2 (1999): 8. http://dx.doi.org/10.7748/ns.14.2.8.s20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Har Preet. "Survey of new attack models on Cloud Infrastructure." International Journal Of Engineering And Computer Science 7, no. 03 (2018): 23742–52. http://dx.doi.org/10.18535/ijecs/v7i3.15.

Full text
Abstract:
Cloud Computing is currently most useful technol- ogy around the globe which offers an innovative business models for infrastructure to the enterprise , software services to the end users and the easy to deploy platform to the developer on Internet using virtual machine , for the quick and easy accessibility. It is Internet driven technology, which gives pool of resources such as Storage , Network , Application on demand basis. As the technology is driven over the Internet and virtual machine and allow resource pooling their are various kind of security problem arise relate to the model archit
APA, Harvard, Vancouver, ISO, and other styles
6

Staddon, Edward, Valeria Loscri, and Nathalie Mitton. "Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey." Applied Sciences 11, no. 16 (2021): 7228. http://dx.doi.org/10.3390/app11167228.

Full text
Abstract:
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the speci
APA, Harvard, Vancouver, ISO, and other styles
7

Josephine Reenamary, S., and Rev Sr ArockiaValan Rani. "Heart Disease Detection -A Machine Learning Approach." Data Analytics and Artificial Intelligence 3, no. 2 (2023): 59–63. http://dx.doi.org/10.46632/daai/3/2/12.

Full text
Abstract:
One of the human body's most important organs is the heart. It helps the body's blood to circulate and become cleaner. The global leading cause of death is heart attack. Chest discomfort, a faster heartbeat, and breathing problems were a few indications. The accuracy of this data was regularly checked. This publication presented a broad summary of heart attacks and current treatments. Additionally, a quick overview of the important machine learning methods for heart attack prediction that are available in the literature is provided. The machine learning techniques described include Decision Tr
APA, Harvard, Vancouver, ISO, and other styles
8

Martins, Joao Bernardo, Jose Afonso, Patrícia Coutinho, Ricardo Fernandes, and Isabel Mesquita. "The Attack in Volleyball from the Perspective of Social Network Analysis: Refining Match Analysis through Interconnectivity and Composite of Variables." Montenegrin Journal of Sports Science and Medicine 10, no. 1 (2021): 45–54. http://dx.doi.org/10.26773/mjssm.210307.

Full text
Abstract:
This study aimed to develop an instrument for analysing the attack in high-level volleyball considering the refined variables adjacent to the attack action, the interconnection between direct and indirect actions, the impact of the previous action, and the formation of composite variables. The game complexes were approached as interacting subsystems. The primary goal was to understand the influence of game actions adjacent to the attack. Three matches of a National Women’s 1st Division 2018/2019 (nine sets, 415 plays) were analysed, considering all game complexes (except attack coverage due to
APA, Harvard, Vancouver, ISO, and other styles
9

MT, Suryadi, Achmad Eriza Aminanto, and Muhamad Erza Aminanto. "Empowering Digital Resilience: Machine Learning-Based Policing Models for Cyber-Attack Detection in Wi-Fi Networks." Electronics 13, no. 13 (2024): 2583. http://dx.doi.org/10.3390/electronics13132583.

Full text
Abstract:
In the wake of the COVID-19 pandemic, there has been a significant digital transformation. The widespread use of wireless communication in IoT has posed security challenges due to its vulnerability to cybercrime. The Indonesian National Police’s Directorate of Cyber Crime is expected to play a preventive role in supervising these attacks, despite lacking a specific cyber-attack prevention function. An Intrusion Detection System (IDS), employing artificial intelligence, can differentiate between cyber-attacks and non-attacks. This study focuses on developing a machine learning-based policing mo
APA, Harvard, Vancouver, ISO, and other styles
10

Yuliswar, Teddy, Ikhwana Elfitri, and Onno W purbo. "Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server." INOVTEK Polbeng - Seri Informatika 10, no. 1 (2025): 367–76. https://doi.org/10.35314/vem9da98.

Full text
Abstract:
This study develops an intrusion detection system optimized with machine learning techniques for efficient and effective detection of Distributed Denial-of-Service (DDoS) attacks. Using the Decision Tree algorithm, the system is designed to maximise accuracy in the identification and classification of DDoS attacks. The CIC-DDoS2019 dataset, which consists of various comprehensive simulated attack scenarios, is used as the basis for training and validation, providing the model with robust capabilities in recognizing DDoS attacks with high accuracy. This IDS successfully achieved a 100% detectio
APA, Harvard, Vancouver, ISO, and other styles
11

Dasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of DDoS Attacks Using Machine Learning Classification Algorithms." International Journal of Computer Network and Information Security 14, no. 6 (2022): 89–97. http://dx.doi.org/10.5815/ijcnis.2022.06.07.

Full text
Abstract:
The Internet is the most essential tool for communication in today's world. As a result, cyber-attacks are growing more often, and the severity of the consequences has risen as well. Distributed Denial of Service is one of the most effective and costly top five cyber attacks. Distributed Denial of Service (DDoS) is a type of cyber attack that prevents legitimate users from accessing network system resources. To minimize major damage, quick and accurate DDoS attack detection techniques are essential. To classify target classes, machine learning classification algorithms are faster and more accu
APA, Harvard, Vancouver, ISO, and other styles
12

Ghasabi, Mozhgan, and Mahmood Deypir. "Using optimized statistical distances to confront distributed denial of service attacks in software defined networks." Intelligent Data Analysis 25, no. 1 (2021): 155–76. http://dx.doi.org/10.3233/ida-194796.

Full text
Abstract:
Software-defined networks (SDN) are an emerging architecture that provides promising amends to put an end to current infrastructure constraints by optimized bandwidth utilization, flexibility in network management and configuration, and pulling down operating costs in traditional network structures. Despite the advantages of this architecture, SDNs may become the victim of a distributed denial of service (DDOS) attacks as the result of potential vulnerabilities in various layers. Therefore, the rapid detection of attack traffic in the early stages is very important. In this paper, we have prop
APA, Harvard, Vancouver, ISO, and other styles
13

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Full text
Abstract:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thre
APA, Harvard, Vancouver, ISO, and other styles
14

Yuni Fitriyah Ningsih, Andri Wahyu Utomo, and Himawan Fajar Arafat. "ANALISIS SERANGAN PERMAINAN BOLAVOLI (STUDI PADA TIM PUTRA KABUPATEN MAGETAN, KEJURPROV BOLAVOLI JUNIOR JAWA TIMUR TAHUN 2022)." Jurnal Kejaora (Kesehatan Jasmani dan Olah Raga) 8, no. 1 (2023): 103–10. http://dx.doi.org/10.36526/kejaora.v8i1.2704.

Full text
Abstract:
Tujuan dalam penelitian ini adalah memberikan informasi serangan/attack yang efektif dilakukan putra Kabupaten Magetan selama pertandingan dalam kejuaraan bolavoli junior Jawa Timur tahun 2022 di Kabupaten Gresik. Penelitian menggunakan pendekatan kuantitatif dengan jenis penelitian deskriptif, dalam teknik pengumpulan data menerapkan observasi nonpartisipan, sumber data yang digunakan adalah data sekunder diperoleh dari pengamatan video recording selama pertandingan-pertandingan berlangsung dengan jumlah 4 pertandingan. Instrumen penelitian adalah rekaman video recording putra Kabupaten Maget
APA, Harvard, Vancouver, ISO, and other styles
15

Utomo, Andri Wahyu, and Himawan Fajar Arafat. "Analisis serangan permainan bolavoli." Bima Loka: Journal of Physical Education 2, no. 1 (2023): 32–39. http://dx.doi.org/10.26740/bimaloka.v2i1.22283.

Full text
Abstract:
Tujuan dalam penelitian ini adalah memberikan informasi serangan/attack yang efektif dilakukan putra Kabupaten Magetan selama pertandingan dalam kejuaraan bolavoli junior Jawa Timur tahun 2022 di Kabupaten Gresik. Penelitian menggunakan pendekatan kuantitatif dengan jenis penelitian deskriptif, dalam teknik pengumpulan data menerapkan observasi nonpartisipan, sumber data yang digunakan adalah data sekunder diperoleh dari pengamatan video recording selama pertandingan-pertandingan berlangsung dengan jumlah 4 pertandingan. Instrumen penelitian adalah rekaman video recording putra Kabupaten Maget
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Ze, Chang Zhou, and Yiran Liu. "Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/8636379.

Full text
Abstract:
The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID
APA, Harvard, Vancouver, ISO, and other styles
17

Pratama, Budiman Agung, Sugito Sugito, Slamet Junaidi, Muhammad Akbar Husein Allsabah, and Mokhamad Firdaus. "Analisis serangan bolavoli." Jurnal SPORTIF : Jurnal Penelitian Pembelajaran 6, no. 2 (2020): 483–98. http://dx.doi.org/10.29407/js_unpgri.v6i2.14432.

Full text
Abstract:
Tujuan dalam penelitian ini adalah memberikan informasi tentang serangan yang paling efektif yang digunakan selama pertandingan tim proliga putra pada final four seri Kediri tahun 2019. Penelitian ini menggunakan pendekatan kuantitatif, jenis penelitian deskriptif, teknik pengumpulan data observasi nonpartisipan, sumber data sekunder diperoleh melalui video dari channel youtube PBVSI_OFFICIAL sejumlah 6 pertandingan Proliga Final Four Seri Kediri tahun 2019. Intrumen penelitian adalah rekaman pertandingan final four Seri Kediri tahun 2019 dan form statistik serangan open spike, quick, semi, ba
APA, Harvard, Vancouver, ISO, and other styles
18

Ofir, Anna, and Rafael Koren. "Cyber-shock and “digital withdrawal”: Organizational lLeadership and Crisis Management During a Hospital-wide Computer Shutdown Following a Ransomware Attack." Prehospital and Disaster Medicine 38, S1 (2023): s98. http://dx.doi.org/10.1017/s1049023x23002728.

Full text
Abstract:
Introduction:In October 2021, Hillel Yaffe, MC, suffered a ransomware attack which shutdown most hospital computer systems, including patient EMR, pharmacy, communications, administration and backup systems. Staff were left in a state of “cyber-shock” without access to essential information for maintaining safety, quality and continuity of care. The aim of this presentation is to share the hospitals' experience and insights of this cyber-attack, outlining preparedness and response strategies.Method:This attack required a multifaceted emergency response strategy, including: Immediate response a
APA, Harvard, Vancouver, ISO, and other styles
19

Sufardy, Devander Benaryanta, and Indrastanti Ratna Widiasari. "The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers." INOVTEK Polbeng - Seri Informatika 9, no. 2 (2024): 765–77. http://dx.doi.org/10.35314/shxy2045.

Full text
Abstract:
This research explores the effectiveness of PFSense and Suricata integration in detecting and preventing network security attacks on web servers. The experimental method was conducted by testing the performance of these two open-source tools in the face of four types of attacks: Ping of Death, SYN Flood, SQL Injection, and Brute Force Attack on SSH. The tests were conducted in an environment with hardware specifications such as [specify specifications, e.g. CPU, RAM, and device type], and software including [specify operating system and version of PFSense and Suricata]. The results showed that
APA, Harvard, Vancouver, ISO, and other styles
20

جبار, نور الهدى ستار, and أ. د. هدى شهاب جاري. "Comparative study of the two-shift fast break velocity index for the first three teams to qualify for the Golden Pistol of the Basketball Premier League (2016-2017)." Modren Sport Journal 20, no. 2 (2021): 0033. http://dx.doi.org/10.54702/msj.2021.20.2.0033.

Full text
Abstract:
The importance of the research is summarized in the study of comparing some of the kinematic variables of the quick attack with two shifts between the first three clubs of the golden pistol basketball in the Premier League (2016-2017), and the research problem is summarized in finding the strengths and weaknesses of the first three clubs of the golden pistol in the Premier League (2016-2017) in Basketball Therefore, the researcher decided to engage in a comparative study of some of the kinematic variables of the quick attack with two transfers to the top three clubs of the Golden Pistol of the
APA, Harvard, Vancouver, ISO, and other styles
21

Namiki, Akio, and Fumiyasu Takahashi. "Motion Generation for a Sword-Fighting Robot Based on Quick Detection of Opposite Player’s Initial Motions." Journal of Robotics and Mechatronics 27, no. 5 (2015): 543–51. http://dx.doi.org/10.20965/jrm.2015.p0543.

Full text
Abstract:
<div class=""abs_img""> <img src=""[disp_template_path]/JRM/abst-image/00270005/11.jpg"" width=""300"" /> Defensive motion against attack</div> In this paper, we discuss how to generate defensive motions for a sword-fighting robot based on quick detection of the opposite player’s initial motions. Our sword-fighting robot system, which has a stereo high-speed vision system, recognizes both the position of a human player and that of the sword grasped by the robot’s hand. Further, it detects the moment when the human player initiates a move using ChangeFinder, which is a method
APA, Harvard, Vancouver, ISO, and other styles
22

Al Afik, Yuni Sufyanti Arif, Abu Bakar, and Riza Fikriana. "Overcoming relapse experience in acute coronary syndrome patients." Bali Medical Journal 12, no. 1 (2023): 510–13. http://dx.doi.org/10.15562/bmj.v12i1.3738.

Full text
Abstract:
Introduction: Recurrence in patients with the acute coronary syndrome is still common. An appropriate strategy is needed for the patient to overcome the recurrence so that further complications do not occur. The purpose of this study was to explore the experience of acute coronary syndrome patients in dealing with recurrence during a heart attack. Methods: Qualitative design with a phenomenological approach is the method used in this study. Samples were 10 patients with acute coronary syndrome and were taken using purposive sampling technique. Data collection was carried out using semi-structu
APA, Harvard, Vancouver, ISO, and other styles
23

Ugalde-Ramírez, Jose Alexis, and Aldo Vasquez-Bonilla. "Comparison of goal-scoring patterns between the Euro and Copa América 2024 tournaments through a notational analysis." Scientific Journal of Sport and Performance 4, no. 4 (2025): 519–33. https://doi.org/10.55860/tgfb5139.

Full text
Abstract:
This study aimed to analyse the goal-scoring patterns in the Euro and Copa America 2024 tournaments through notational methods. A total of 187 goals scored (117 in the Euro and 70 in the Copa America) were analysed. The goal-scoring categories include type of play, type of attack, interval time, starting zone of attack, finishing zone, previous action for scoring, and scoring technique. The results indicated that more goals came from organized attacks and throw-ins in the Euro, while free kicks were more effective in the Copa America. Quick attacks predominated in both tournaments; in Euro, mo
APA, Harvard, Vancouver, ISO, and other styles
24

Liebergall, Michal H., Nava Braverman, Shmuel C. Shapira, Orly Picker Rotem, Irene Soudry, and Shlomo Mor-Yosef. "Role of Nurses in a University Hospital During Mass Casualty Events." American Journal of Critical Care 16, no. 5 (2007): 480–84. http://dx.doi.org/10.4037/ajcc2007.16.5.480.

Full text
Abstract:
Mass casualty events due to terror attacks have escalated throughout Israel since September 2000, with a high proportion of these events occurring in the Jerusalem area. Immediately after news of a large-scale terror attack is received, family/public information centers are set up in all local hospitals to meet the needs of members of the public who call or arrive at hospitals anxious to obtain information about relatives who may have been at the site of the attack. The most urgent task facing these centers is the quick and accurate identification of victims whose identity is in question. To d
APA, Harvard, Vancouver, ISO, and other styles
25

Luangtrongkit, Suriyon, Pitirat Kongtongkum, and K. Rangubhet. "Offensive Patterns Analysis of Thai Nation Team in Volleyball Women’s Nations League 2022." American Journal of Sports Science 12, no. 2 (2024): 12–19. http://dx.doi.org/10.11648/j.ajss.20241202.11.

Full text
Abstract:
Effective offensive patterns are crucial for volleyball athletes, enabling quick and forceful attacks to strategically place the ball and impact the game. This study aimed to analyze the offensive strategies and outcomes of the Thai national team during the 2022 Women's Volleyball Nations League (VNL), comparing them with the opposing teams. Using a specific match model from the 13 matches and 51 sets held between May 31 and July 14, 2022, a total of 3,151 attack results were examined. Results were reported through means, standard deviations, percentages, and independent sample t-test
APA, Harvard, Vancouver, ISO, and other styles
26

Bobrov, L. A. ""Among the troops he chose brave warriors, who were battling through ranks...". On Some Peculiar Aspects of Amir Timur's Tactical Art." Universum Humanitarium, no. 1 (July 13, 2021): 17–40. http://dx.doi.org/10.25205/2499-9997-2021-1-17-40.

Full text
Abstract:
This article revises the peculiarities of Amir Timur's army tactical peculiarities, as well as their influence on the development of martial art of the Muslim East. It is established that Timur effectively used the mobilization potential of his state. The sedentary population of Chorasa and Transoxiana formed the infantry archery units who were taught to fight under cover of large standing shields - chapars. At the same time, loyal nomad tribes were the source of horse cavalry for the Timur's army. The base of battle formation was represented by a tactical "skeleton" formed of forced kanbuls,
APA, Harvard, Vancouver, ISO, and other styles
27

Chinonso Mark, Kingsley. "Russia-United Kingdom Diplomatic Crisis over Salisbury Nerve Agent Attack: An Analysis." International Journal of Law and Public Administration 1, no. 1 (2018): 58. http://dx.doi.org/10.11114/ijlpa.v1i1.3357.

Full text
Abstract:
Russia-United Kingdom Diplomatic ties have been banter of ally-crises-ally relations and have not fared well since its first diplomatic contact in 1553 during the era of Tsardom of Russia, and currently at its most tensed point occasioned by the alleged poison attack on Sergei Skripal in Salisbury. While it remains unclear which exactly of the Novichok variants were used to poison Skripal and his daughter? The medical effect of the poison is well understood and Britain with their allies points at Russia as the culprit. This single act has turn sour the diplomatic relations of these great power
APA, Harvard, Vancouver, ISO, and other styles
28

Kawthar, Muhammad, and Senthil A. Kumar Dr. "Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations In Software Development: SLR Based Approach." SEKA : JOURNAL OF MULTIDISCIPLINARY STUDIES 1, no. 1 (2024): 1–9. https://doi.org/10.5281/zenodo.13944566.

Full text
Abstract:
<strong>Abstract---</strong>Security is the defense against many threats, and most businesses struggle with security, particularly with cyber-attacks. Because of the quick rise in threats, supervised and pattern-based detection algorithms used in cyber security are still the same and provide ongoing security. Noticing. Vendor firms face a variety of issues, including cyber theft, the most frequent form of cyber-attack. In order to help vendor firms, identify cyber security challenges during software development, this research study is establishing the Cyber Security Challenges Model (CSCM). By
APA, Harvard, Vancouver, ISO, and other styles
29

Kim, Si Wan, Hyun Yi Yi, Gun Il Ma, and Jeong Hyun Yi. "Shoulder-Surfing Resistant Smartphone Authentication Scheme Using Virtual Joystick." Applied Mechanics and Materials 284-287 (January 2013): 3497–501. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3497.

Full text
Abstract:
User authentication techniques such as the setting of passwords are gradually gaining importance as a means of managing important information stored in smartphones. Existing text–based password authentication schemes have the advantages of being quick and easy to use. However, they are problematic in that passwords are easily exposed to shoulder-surfing attack. In addition, a graphical password authentication scheme has the limitation of being difficult to apply to mobile device environments, in which a lot of information must be remembered and small-sized screens are provided. Therefore, in t
APA, Harvard, Vancouver, ISO, and other styles
30

Mrunal K. Pathak,. "Detecting Cyber-attacks in the Industrial Internet of Things using a Hybrid Deep Random Neural Network." Journal of Electrical Systems 20, no. 1s (2024): 165–74. http://dx.doi.org/10.52783/jes.762.

Full text
Abstract:
Critical infrastructure now faces greater vulnerabilities and a higher risk of cyberattacks as a result of the (IIoT) quick expansion. The security and dependability of industrial systems must be ensured by identifying and thwarting these threats. In this paper, we use a hybrid approach of deep learning and RNN called hybrid deep random neural network (HDRNN) to offer a novel method of identifying cyber-attacks in the IIoT.The proposed HDRNN model combines the benefits of random neural networks with deep learning to improve the detection of IIoT cyberattacks. The deep learning component makes
APA, Harvard, Vancouver, ISO, and other styles
31

Hriday Banerjee. "Design and Implementation of Security Technique for Selective Forwarding Attack in Wsn." Journal of Information Systems Engineering and Management 10, no. 27s (2025): 796–814. https://doi.org/10.52783/jisem.v10i27s.4555.

Full text
Abstract:
WSN is best recognized for monitoring network processing and physical metrics continuously. Self-organizing, infrastructure-less, fault-tolerant networks provide quick, scalable, low-cost, and easy-to-implement deployments in many applications. Nodes and data security assaults can harm WSNs. As WSN security is a challenge. Nodes in harsh and changing settings make it harder for a wireless sensor network to maintain security. WSN nodes with low resources face several security risks. Most such attacks are black hole, selective forwarding, and DoS. SF is one of the most hazardous WSN assaults. SF
APA, Harvard, Vancouver, ISO, and other styles
32

Badri, Sahar. "HO-CER: Hybrid-optimization-based convolutional ensemble random forest for data security in healthcare applications using blockchain technology." Electronic Research Archive 31, no. 9 (2023): 5466–84. http://dx.doi.org/10.3934/era.2023278.

Full text
Abstract:
&lt;abstract&gt; &lt;p&gt;The Internet of Things (IoT) plays a vital role in the rapid progression of healthcare diligence. In recent years, IoT has become one of the most significant sources in the medical domain, since physical devices collect essential patient information to share real-time data with medical practitioners via various sensors. Meanwhile, numerous existing intrusion detection techniques failed to meet the security needs to safeguard the patient data collected. If an attack or intrusion cannot be identified at a particular time, immeasurable damage will be developed, which wil
APA, Harvard, Vancouver, ISO, and other styles
33

Luo, Yuling, Yunqi Liu, Junxiu Liu, Xue Ouyang, Yi Cao, and Xuemei Ding. "ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks." International Journal of Bifurcation and Chaos 29, no. 09 (2019): 1950118. http://dx.doi.org/10.1142/s0218127419501189.

Full text
Abstract:
As a basic and crucial security requirement for Wireless Sensor Networks (WSNs), authentication is generally used to prevent various communication attacks such as Denial-of-Service (DoS) attack. A novel broadcast authentication framework is proposed in this paper, where an Identity-Based Signature scheme by using the Extended Chaotic Maps (ECM-IBS) is designed to authenticate all broadcast messages and specifically, a chaos-based hash function is used for message authentication in the WSNs. It is implemented using a WSN hardware device of CC2530 and its performance is analyzed under various me
APA, Harvard, Vancouver, ISO, and other styles
34

Yacovino, Dario A., and John B. Finlay. "Intra-Attack Vestibuloocular Reflex Changes in Ménière’s Disease." Case Reports in Otolaryngology 2016 (2016): 1–4. http://dx.doi.org/10.1155/2016/2427983.

Full text
Abstract:
Ménière’s attack has been shown to temporarily alter the vestibuloocular reflex (VOR). A patient with unilateral Ménière’s disease was serially evaluated with the video Head Impulse Test during single, untreated episodes of acute vertigo. Spontaneous nystagmus activity was concurrently recorded in order to establish the three typical phases of Ménière’s attack (irritative, paralytic, and recovery) and correlate them with VOR performance. The onset of attack was associated with a quick change in VOR gain on the side of the affected ear. While a rapidly progressive reduction of the VOR was evide
APA, Harvard, Vancouver, ISO, and other styles
35

Hassan, Karrar Falih, and Mehdi Ebady Manaa. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604–13. http://dx.doi.org/10.11591/eei.v11i3.3643.

Full text
Abstract:
The introduction of a new technology has aided the exponential growth of the internet of things (IoT), allowing for the connecting of more devices in the IoT network to be made possible by the availability of quicker connections and reduced latency. As IoT networks have become more prevalent and widely used, security has become one of the fundamental requirements, and a distributed denial of service (DDoS) attack poses a significant security threat due to the limited resources (CPU, memory, open source, persistent connection) that can be used to either intentionally or unintentionally increase
APA, Harvard, Vancouver, ISO, and other styles
36

Karrar, Falih Hassan, and Ebady Manaa Mehdi. "Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach." Bulletin of Electrical Engineering and Informatics 11, no. 3 (2022): 1604~1613. https://doi.org/10.11591/eei.v11i3.3643.

Full text
Abstract:
The introduction of a new technology has aided the exponential growth of the internet of things (IoT), allowing for the connecting of more devices in the IoT network to be made possible by the availability of quicker connections and reduced latency. As IoT networks have become more prevalent and widely used, security has become one of the fundamental requirements, and a distributed denial of service (DDoS) attack poses a significant security threat due to the limited resources (CPU, memory, open source, persistent connection) that can be used to either intentionally or unintentionally increase
APA, Harvard, Vancouver, ISO, and other styles
37

Stamm, Raini, Meelis Stamm, Doris Torilo, Kaivo Thomson, and Alexander Jairus. "Comparative analysis of the elements of attack and defence in men’s and women’s games in the Estonian volleyball highest league." Papers on Anthropology 25, no. 1 (2016): 37. http://dx.doi.org/10.12697/poa.2016.25.1.04.

Full text
Abstract:
The aim of this study was to analyse the differences between men’s and women’s teams of the Estonian highest league in attack, serve, block, defence and serve reception. The sample consisted of 5 men’s and 5 women’s teams of the Estonian volleyball highest league in the 2014/2015 season. To collect data, two game videos of each team were watched; from them tempo of attack, type of attack, block and serve, and the results of defence and cover were registered. In addition, statistics created by the Data Volley and Volleysoft 6–3 programs on the basis of expert assessments were used to estimate t
APA, Harvard, Vancouver, ISO, and other styles
38

Jawad, Muhammad N., Mahmood A. Al-Shareeda, Omar Yawez Mustafa Mustafa, Mohammed Amin Almaiah, and Rami Shehab. "Dynamic key revocation and hybrid cryptographic approaches for secure authentication in the social internet of vehicles." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 3135–51. https://doi.org/10.53894/ijirss.v8i2.5956.

Full text
Abstract:
Analysis of repeated attack signatures is important because of the rapid evolution of the Social Internet of Vehicles (SIoV). However, threats such as replay attacks, session hijacking, and key reuse make secure communication between vehicles, roadside units (RSUs), and the fog node difficult. Traditional models for authentication are limited by computational overhead and lack quick key revocation. In response to these challenges, we propose a hybrid cryptographic authentication scheme that combines a Zero-Knowledge Proof (ZKP) with AES-GCM encryption. Our protocol implements a dynamic key rev
APA, Harvard, Vancouver, ISO, and other styles
39

Maleeva, G. А. "Analysis of security of post-quantum algorithm of Rainbow electronic signature against potential attacks." Radiotekhnika, no. 205 (July 2, 2021): 85–93. http://dx.doi.org/10.30837/rt.2021.2.205.08.

Full text
Abstract:
Multidimensional public key cryptography is a candidate for post-quantum cryptography, and it makes it possible to generate particularly short signatures and quick verification. The Rainbow signature scheme proposed by J. Dean and D. Schmidt is such a multidimensional cryptosystem and it is considered to be protected against all known attacks. The need for research on Rainbow ES is justified by the fact that there is a need to develop and adopt a post-quantum national securities standard, and that in the process of the US NIST competition on the mathematical basis of cryptographic transformati
APA, Harvard, Vancouver, ISO, and other styles
40

Yu, Wen-Kai, Ying Yang, Ya-Xin Li, Ning Wei, and Shuo-Fei Wang. "Multi-Party Cryptographic Key Distribution Protocol over a Public Network Based on a Quick-Response Code." Sensors 22, no. 11 (2022): 3994. http://dx.doi.org/10.3390/s22113994.

Full text
Abstract:
In existing cryptographic key distribution (CKD) protocols based on computational ghost imaging (CGI), the interaction among multiple legitimate users is generally neglected, and the channel noise has a serious impact on the performance. To overcome these shortcomings, we propose a multi-party interactive CKD protocol over a public network, which takes advantage of the cascade ablation of fragment patterns (FPs). The server splits a quick-response (QR) code image into multiple FPs and embeds different “watermark” labels into these FPs. By using a CGI setup, the server will acquire a series of
APA, Harvard, Vancouver, ISO, and other styles
41

Niu, Quan Lin, and Nai Qian Feng. "Inhibiting Effect of Mineral Powder on Sulfate Attack of Cement Mortar." Key Engineering Materials 302-303 (January 2006): 73–78. http://dx.doi.org/10.4028/www.scientific.net/kem.302-303.73.

Full text
Abstract:
ASTM C1012 and GB2420 method were employed to evaluate the inhibiting effect of different mineral admixtures on sulfate attack of cement mortar, and the mass loss of mortar specimens after drying-wetting cycles was measured for comparison. It is shown that all the mineral admixtures, including ground blast furnace slag (SL), fly ash (FA), natural zeolite (NZ) and metakaolin (MK) were effective in decreasing the 15-week expansion and increasing the corrosion resistance coefficient of the specimens immersed in Na2SO4 solution. The wetting and drying test however, showed inconsistent result, as b
APA, Harvard, Vancouver, ISO, and other styles
42

Martín-Ruiz, Julio, Jorge Alarcón-Jiménez, Nieves de Bernardo, Ignacio Tamarit-Grancha, Xavier Iglesias, and Laura Ruiz-Sanchis. "Muscle Changes during Direct Attack under Different Conditions in Elite Wheelchair Fencing." Sports 12, no. 7 (2024): 188. http://dx.doi.org/10.3390/sports12070188.

Full text
Abstract:
Wheelchair fencing is a medium-distance combat sport in which the wheelchair is fixed to the floor. This requires a maximum concentration and gestational speed. Refined techniques and fatigue tolerance are essential to achieve competitive results. Aim: The main objective of this study was to measure the speed and muscular participation of a direct attack gesture with and without fatigue in a sample of elite wheelchair fencers. Methods: The maximal isometric force, gestural speed, and resistance to gestural velocity were estimated in 10 elite performed direct fencers. Results: The results revea
APA, Harvard, Vancouver, ISO, and other styles
43

Zheng, Wei, Chunpu Zhang, Dapeng Hou, and Chunguang Cao. "Comparison on different strategies for treatments of hypertensive hemorrhage in the basal ganglia region with a volume of 25 to 35ml." Acta Cirurgica Brasileira 27, no. 10 (2012): 727–31. http://dx.doi.org/10.1590/s0102-86502012001000010.

Full text
Abstract:
PURPOSE: To compare curative effect of different treatments for hypertensive cerebral hemorrhage of 25 to 35ml. METHODS: In this study, 595 cases were enrolled and grouped regarding treatments including conservative treatment, evacuation with microinvasive craniopuncture technique within 6h and 6-48h after the attack. RESULTS: After follow up for three months after the attack, the assessment based on the Activity of Daily Living (ADL) indicated no significant difference among conservative treatment and surgical interventions (p&gt;0.05). However, surgical interventions showed advantages of sho
APA, Harvard, Vancouver, ISO, and other styles
44

Iwano, Yuki, Koichi Osuka, and Hisanori Amano. "Development of Rescue Support Stretcher System with Stair-Climbing." Journal of Robotics and Mechatronics 25, no. 3 (2013): 567–74. http://dx.doi.org/10.20965/jrm.2013.p0567.

Full text
Abstract:
A sarin gas attack on the Tokyo subway system on March 20, 1995, sickened many passengers. Since the attack was made underground, the main job of rescue personnel was to transport victims on stretchers to a ground-level first-aid station. We therefore conducted research on the development of a rescue support stretcher system for handling serious casualties in a quick and effective manner in underground areas or at stations. The stretcher system is expected to help rescue personnel such as fire fighters achieve efficient rescue operations. In this paper, we introduce a rescue support stretcher
APA, Harvard, Vancouver, ISO, and other styles
45

Zhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.

Full text
Abstract:
Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wirele
APA, Harvard, Vancouver, ISO, and other styles
46

Partyka, Olha, Bohdan Fihol, and Taras Nakonechnyi. "INTEGRATED APPROACH TO DETECTING BLUETOOTH THREATS USING WIRESHARK AND SPLUNK SIEM." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 223–34. https://doi.org/10.28925/2663-4023.2024.26.684.

Full text
Abstract:
In the modern world, the Bluetooth protocol is one of the most widespread wireless communication technologies used to transfer data between various devices, ensuring their mobility and functionality. Despite its numerous advantages, the Bluetooth protocol remains vulnerable to cyber threats such as DoS attacks, spoofing, and malicious file transfer. These threats pose risks to data confidentiality, integrity, and availability. They can also lead to device failures and hazards in critical systems such as medical equipment or IoT infrastructure. This article focuses on an integrated approach to
APA, Harvard, Vancouver, ISO, and other styles
47

Dai, Xuan, Jian Mao, Jiawei Li, Qixiao Lin, and Jianwei Liu. "HomeGuardian: Detecting Anomaly Events in Smart Home Systems." Wireless Communications and Mobile Computing 2022 (June 13, 2022): 1–11. http://dx.doi.org/10.1155/2022/8022033.

Full text
Abstract:
As a typical application of Internet of Things (IoT), home automation systems, namely, smart homes, provide a more convenient and intelligent life experience through event recognition, automation control, and remote device access. However, smart home systems have also given rise to new complications for security issues. As an event-driven IoT system, smart home environments are vulnerable to security attacks, and vulnerable devices are far-spread due to the quick development cycles. Attack vectors to smart homes inevitably manifest in abnormal event contexts. In this paper, we propose HomeGuar
APA, Harvard, Vancouver, ISO, and other styles
48

Ehsanpour, Seyed Reza, and Nafiseh Hashempour. "Agroterrorism; Iranian Criminal Policy." International Journal of Multicultural and Multireligious Understanding 5, no. 6 (2019): 232. http://dx.doi.org/10.18415/ijmmu.v5i6.1048.

Full text
Abstract:
Background and Aim: This article presents some perspective on bioterrorism by focuses on Agroterrorism cases. This study focuses attention on the issue of Agroterrorismand discusses criminal response against it in Iranian Criminal law. Materials and Methods: A handful of studies and researches have been reviewed for preparing this study.Ethical Considerations:Honesty in the literature and citation analysis and reporting were considered.Findings: Agroterrorism attack may results in the agricultural and food industries, loss of confidence in government, and possibly human casualties. The fear of
APA, Harvard, Vancouver, ISO, and other styles
49

Niu, Xinyu, Jiandao Zhao, and Bo Tian. "The Security Threat and Precautionary Measures of QR Code of Internet of Things Technology." Advances in Engineering Technology Research 11, no. 1 (2024): 775. http://dx.doi.org/10.56028/aetr.11.1.775.2024.

Full text
Abstract:
The Internet of Things (IoT) is the expansion and extension of the traditional network. It is a network that connects goods and objects, which has been widely used in today's social development process. It occupies an important position in various industries. The emergence of the Internet of Things has greatly improved the refinement level of human management. The QR code (Quick Response Code) is a part of the perception layer of the IoT, which belongs to the perception and recognition technology of the IoT. The QR code not only brings convenience to users but also becomes the carrier and diss
APA, Harvard, Vancouver, ISO, and other styles
50

Yang, Ming-Hour, Jia-Ning Luo, Murugesan Vijayalakshmi, and Selvaraj Mercy Shalinie. "Contactless Credit Cards Payment Fraud Protection by Ambient Authentication." Sensors 22, no. 5 (2022): 1989. http://dx.doi.org/10.3390/s22051989.

Full text
Abstract:
In recent years, improvements to the computational ability of mobile phones and support for near-field-communication have enabled transactions to be performed by using mobile phones to emulate a credit card or by using quick response codes. Thus, users need not carry credit cards but can simply use their mobile phones. However, the Europay MasterCard Visa (EMV) protocol is associated with a number of security concerns. In contactless transactions, attackers can make purchases by launching a relay attack from a distance. To protect message transmission and prevent relay attacks, we propose a tr
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!