Search results for "attack"

showing 10 items of 221 documents

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

New client puzzle approach for DoS resistance in ad hoc Networks

2010

In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.

business.industryWireless ad hoc networkComputer scienceServerMathematicsofComputing_GENERALCryptographyDenial-of-service attackComputational problemLatency (engineering)businessQA76Computer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

Five-to-Six Membered Ring-rearrangements in the Reaction of 5-Perfluoroalkyl-1,2,4-oxadiazoles with Hydrazine and Methylhydrazine

2006

The hydrazinolysis reaction of 5-perfluoroalkyl-1,2,4-oxadiazoles with hydrazine or methylhydrazine as bidentate nucleophiles has been investigated. The reaction occurred through the addition of the bidentate nucleophile to the C(5)-N(4) double bond of the 1,2,4-oxadiazole followed by ring-opening and ring-closure (ANRORC) involving the second nucleophilic site of the reagent. This ring-closure step could involve either the original C(3) of the 1,2,4-oxadiazole (giving a five-to-five membered ring rearrangement) or an additional electrophilic center linked to it (exploiting a five-to-six membered ring rearrangement). An alternative initial nucleophilic attack may involve the additional elec…

chemistry.chemical_classificationMethylhydrazineKetoneDouble bondChemistryStereochemistryTRANSFORMATIONS15N-NMR SPECTROSCOPYCHEMICAL SHIFT CALCULATIONSOrganic ChemistryFLUORINATED HETEROCYCLIC-COMPOUNDSHydrazoneRegioselectivityBKR REARRANGEMENTRing (chemistry)EXPEDIENT ROUTEMOLECULAR-REARRANGEMENTSNucleophileAROMATICITY INDEXElectrophileATTACKFIVE TO SIX REAGGANGEMENT
researchProduct

On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…

2022

Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…

cybersecurityATClentokoneetUAT978availabilitylentoliikennecodesaerospace electronicsattackstransceiversaircraft navigationcomputer crashesATMsurveillanceDoSlennonjohtokyberturvallisuusaircraftverkkohyökkäyksetlennonvarmistusADS-B1090EStietojärjestelmät
researchProduct

Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems

2020

Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…

defence mechanismsComputerApplications_COMPUTERSINOTHERSYSTEMStekoälypilvipalvelutadversarial attacksmachine learningkoneoppiminenArtificial Intelligencecloud data platformälytekniikkaesineiden internettietoturvakyberturvallisuusverkkohyökkäykset
researchProduct

Reduced Admissions for Cerebrovascular Events during COVID-19 Outbreak in Italy

2020

Supplemental Digital Content is available in the text.

disease outbreakMalemedicine.medical_treatment030204 cardiovascular system & hematologyItaly; cerebral hemorrhage; disease outbreaks; incidence; ischemic attack transient0302 clinical medicineEpidemiology80 and overMedicineischemic attack transientThrombolytic Therapy10178Acute ischemic stroke10177ThrombectomyAged 80 and overIschemic AttackTransientIncidence (epidemiology)Endovascular ProceduresMiddle AgedHospitalization1006210183ItalyComputingMethodologies_DOCUMENTANDTEXTPROCESSINGSettore MED/26 - NeurologiaFemaleCardiology and Cardiovascular Medicinecerebral hemorrhage; disease outbreaks; incidence; ischemic attack transient; Italy; Aged; Aged 80 and over; COVID-19; Cerebral Hemorrhage; Endovascular Procedures; Female; Hospitalization; Humans; Ischemic Attack Transient; Ischemic Stroke; Italy; Male; Middle Aged; Thrombectomy; Thrombolytic Therapymedicine.medical_specialty2019-20 coronavirus outbreakCoronavirus disease 2019 (COVID-19)Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2)RevascularizationSettore MED/261015203 medical and health sciencesHumansAgedIschemic StrokeAdvanced and Specialized Nursingcerebral hemorrhagebusiness.industryOutbreakCOVID-19Emergency medicinedisease outbreaksincidenceBrief ReportsNeurology (clinical)business030217 neurology & neurosurgery
researchProduct

O início de uma nova era: teste sistemático para patógenos causadores de infecções agudas das vias aéreas superiores (IVAS) em crianças

2007

On average humans get sick ten times per year. About six times the illness is due to an acute respiratory tract infection (ARI). Morbidity is especially high in children since they usually encounter the offending organism for the first time in their life; the lack of immunity results in shedding of the offending organisms in high numbers of prolonged time as compared to adults; their airways are smaller than those of adults and thus the inflammatory response leads to a more significant narrowing of the airways resulting in more severe disease; on average they have a high number of social contacts and also a more intimate contact with peers and caregivers alike resulting in a higher attack r…

education.field_of_studyPediatricsmedicine.medical_specialtyRespiratory tract infectionsbusiness.industrymedia_common.quotation_subjectPopulationAttack rateSevere diseaseSystematic testingImmunityHygienePediatrics Perinatology and Child HealthMedicineeducationbusinessAcute respiratory tract infectionmedia_commonJornal de Pediatria
researchProduct

Drones in cyber security environment

2019

Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…

elektroninen sodankäyntikybersodankäyntiintelligence and reconnaissancecyber securitysurveillancedroonittiedusteluunmanned aerial vehiclesmiehittämättömät ilma-aluksettarkkailucyber attacks
researchProduct

Propagation of Bankruptcy Risk over Scale-Free Economic Networks.

2022

The propagation of bankruptcy-induced shocks across domestic and global economies is sometimes very dramatic; this phenomenon can be modelled as a dynamical process in economic networks. Economic networks are usually scale-free, and scale-free networks are known to be vulnerable with respect to targeted attacks, i.e., attacks directed towards the biggest nodes of the network. Here we address the following question: to what extent does the scale-free nature of economic networks and the vulnerability of the biggest nodes affect the propagation of economic shocks? We model the dynamics of bankruptcies as the propagation of financial contagion across the banking sector over a scale-free network…

financial contagion; bankruptcy risk; scale-free networks; targeted attacks; Shannon entropyscale-free networkShannon entropyGeneral Physics and Astronomytargeted attackfinancial contagionbankruptcy riskEntropy (Basel, Switzerland)
researchProduct

Emerging Economies Faced With The Downside Of Financial Globalization: Hedges And Way Outs

2009

The underlining assumption of this paper is that developing countries are in a fragile state nowadays. Economically, they have been seriously harmed by the 2008 crisis1 but this is not the end of the story: the future still has pitfalls in which these economies might get trapped, due to their enhanced vulnerability to exogenous shocks generated by financial globalization. Ideologically, the recent events have triggered a serious backlash against capitalism, particularly the Anglo-Saxon template. Getting an insight into the causes and implications of global economic crises is therefore critical for policy-makers in emerging economies. History might be a good adviser in this respect. Lessons …

financial globalizationcurrency criseslcsh:HB71-74international reservesspeculative attackslcsh:Economics as a scienceregulationcapital controlsjel:F41money mercantilismfinancial globalization money mercantilism currency crises international reserves speculative attacks capital controls regulationReview of Economic and Business Studies
researchProduct