To see the other types of publications on this topic, follow the link: Synchronized attack.

Journal articles on the topic 'Synchronized attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Synchronized attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.

Full text
Abstract:
With the rising cyber-physical power systems and emerging danger of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber communications can be broken to cause material damage. Therefore, adjustment needs to be made in the present control scheme plan methods to moderate the impact of possible attacks on service quality. This paper, focuses on the service of synchronized source-load contribution in main frequency regulation, a weakness study is performed with model the attack intrusion process, and the risk review of the serv
APA, Harvard, Vancouver, ISO, and other styles
2

Manaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Full text
Abstract:
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.

Full text
Abstract:
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processi
APA, Harvard, Vancouver, ISO, and other styles
4

O'Connell, Michael, and Aaron Bernard. "A Serious Cause of Panic Attack." Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.

Full text
Abstract:
We report on a case of a patient with atrial fibrillation in the setting of Wolff-Parkinson-White syndrome. The patient underwent synchronized electrical cardioversion, typically considered safe and effective, which resulted in a dangerous complication for the patient (degeneration into ventricular fibrillation). Discussion of common rhythm disturbances in WPW and management strategies are reviewed.
APA, Harvard, Vancouver, ISO, and other styles
5

Butcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide." Journal of Genocide Research 15, no. 3 (2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lisova, Elena, Marina Gutiérrez, Wilfried Steiner, et al. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.

Full text
Abstract:
Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to
APA, Harvard, Vancouver, ISO, and other styles
7

Manaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.

Full text
Abstract:
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at the same time , using an centralized command and control system, the attacked client then sends the information to a centralized command and control server which will distribute the attack information to all of the integrated clients connected to it. The distributed information contains all of the attack information including
APA, Harvard, Vancouver, ISO, and other styles
8

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Full text
Abstract:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thre
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time del
APA, Harvard, Vancouver, ISO, and other styles
10

Ullah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard, and Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1." Cancers 12, no. 9 (2020): 2661. http://dx.doi.org/10.3390/cancers12092661.

Full text
Abstract:
Cancer is a result of “aggressive” division and uncontrolled proliferation of the abnormal cells that survive attack by immune cells. We investigated the expression of HLA-G and PD-L1 with the different stages of cancer cell division along with their role in the interaction of immune cells in vitro. Ovarian cancer (OVCAR-3) and chronic myeloid leukemia cell line (K-562) are used for this study. The correlation of protein expression with percentage of cells in each phase (G1, S and G2 phase) was evaluated through FACS. Cells were synchronized in G1, G2 and mitotic phase to evaluate gene (RT-qPC
APA, Harvard, Vancouver, ISO, and other styles
11

Radziukevich, M. L., та V. F. Golikov. "Combined formаtion of a cryptographic key using synchronized artificial neural networks". Doklady BGUIR 19, № 1 (2021): 79–87. http://dx.doi.org/10.35596/1729-7648-2021-19-1-79-87.

Full text
Abstract:
А combined method for forming a cryptographic key is proposed in the article. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimination of mismatched bits by open comparison of the parities of bit pairs. In this paper, possible vulnerabilities of the basic method of forming a cryptographic key using synchronized artificial neural networks are considered, their danger is assessed, and a correction of the method is proposed to ensure the required confidentiality of the generated
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Li, Xinru Mao, and Lin Ding. "Influence of attack angle on vortex-induced vibration and energy harvesting of two cylinders in side-by-side arrangement." Advances in Mechanical Engineering 11, no. 1 (2019): 168781401882259. http://dx.doi.org/10.1177/1687814018822598.

Full text
Abstract:
The vortex-induced vibration and energy harvesting of two cylinders in side-by-side arrangement with different attack angles are numerically investigated using two-dimensional unsteady Reynolds-Averaged Navier–Stokes simulations. The Reynolds number ranges from 1000 to 10,000, and the attack angle of free flow is varied from 0° to 90°. Results indicate that the vortex-induced vibration responses with attack angle range of 0°≤ α ≤ 30° are stronger than other attack angle cases. The parallel vortex streets are clearly observed with synchronized vortex shedding. Relatively large attack angle lead
APA, Harvard, Vancouver, ISO, and other styles
13

Thangarathinam, P., N. Suganya, T. Praddeep, and S. Vignesh. "Synchrophasor Technology for Cyber Security in Smart Grid." International Journal of Students' Research in Technology & Management 3, no. 7 (2015): 436. http://dx.doi.org/10.18510/ijsrtm.2015.378.

Full text
Abstract:
Smart grid is controlled by an authority personnel who uses LAN or the internet to control it. By knowing this information any one from outside can control the smart grid using LAN or the internet. This process of hacking the smart grid control is known as aurora attack. The Aurora attack may pose a risk to rotating machinery operating under certain conditions on the electrical grid. The Aurora attack involves opening and closing one or more circuit breakers, resulting in an out-of-synchronism condition that may damage rotating equipment connected to the power grid.This paper focuses on the Au
APA, Harvard, Vancouver, ISO, and other styles
14

Truong, Victor, Alexandre Vervisch-Picois, Jose Rubio Hernan, and Nel Samama. "Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias." Sensors 23, no. 5 (2023): 2735. http://dx.doi.org/10.3390/s23052735.

Full text
Abstract:
The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implemented and used in many everyday applications. For this reason, it is still a topical issue, especially for receivers that only have access to high-level data (PVT,CN0). To address this important issue, after conducting a study of the receiver clock polarization calculation process, this led to the d
APA, Harvard, Vancouver, ISO, and other styles
15

Huang, Xiaojie, Yunxia Xia, and Da-Wei Ding. "Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks." Applied Sciences 13, no. 3 (2023): 1716. http://dx.doi.org/10.3390/app13031716.

Full text
Abstract:
With the continuous development of the networked society, the ability of cyber attackers is becoming increasingly intelligent, posing a huge threat to complex cyber–physical networks (CCPNs). Therefore, how to design a security strategy for CCPNs under attack has become an urgent problem to be solved, which promotes our work. The problem of the distributed event-triggered synchronization of CCPNs in the presence of denial-of-service (DoS) attacks is investigated in this paper. Firstly, a distributed event-triggered controller is designed such that all nodes of networks are synchronized without
APA, Harvard, Vancouver, ISO, and other styles
16

Chiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.

Full text
Abstract:
Data transmission in a mobile ad hoc network is performed within an untrusted wireless environment. It is subjected to many kinds of security attacks. In a wormhole attack, two malicious nodes work together to tunnel packets from one to the other, making other nodes perceive a path to have a smaller hop count. We identify two types of wormhole attacks. In the first type, malicious nodes do not expose themselves in route finding process and legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the exist
APA, Harvard, Vancouver, ISO, and other styles
17

Albert Lusiola, Musoma. "Multi Agency Response to International Terrorism in Kenya: A Comparison of Dusit D2 and Westgate Terror Attacks." African Journal of Empirical Research 2, no. 2 (2021): 68–84. http://dx.doi.org/10.51867/ajer.v2i2.23.

Full text
Abstract:
This study sets out to assess responses to international terrorism in Kenya. This stems out of the fact that the terrorism menace has had been a major security challenge facing the country. The study draws a comparison of the Dusit D2 and Westgate terror attacks. Data was collected from a purposive sample of academics as well as serving and retired diplomats, senior police officers and military personnel. Primary data was collected from the respondents using interviews. The findings show that the West gate shopping mall in 2013 and the DusitD2 Hotel attack in January 2019 are replete with majo
APA, Harvard, Vancouver, ISO, and other styles
18

Dass, Prajnamaya, Pranay Kumar Saha, and Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks." International Journal of Business Data Communications and Networking 12, no. 2 (2016): 28–61. http://dx.doi.org/10.4018/ijbdcn.2016070103.

Full text
Abstract:
Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols must be streamlined to combat with these abnormal conditions. In this paper, the authors provide a review of an existing protocol by Lee et al. They found that the protocol proposed by Lee et al., Enhanced two factor key exchange protocol in public wireless LANs is vulnerable to traceable attack. It is a
APA, Harvard, Vancouver, ISO, and other styles
19

Matsuzono, Kosuke, Takao Yoshiki, Yosuke Wakutani, et al. "Synchronized Babinski and Chaddock Signs Preceded the MRI Findings in a Case of Repetitive Transient Ischemic Attack." Internal Medicine 52, no. 18 (2013): 2127–29. http://dx.doi.org/10.2169/internalmedicine.52.0190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.

Full text
Abstract:
In wireless communication, wormhole attack is a crucial threat that deteriorates the normal functionality of the network. Invasion of wormholes destroys the network topology completely. However, most of the existing solutions require special hardware or synchronized clock or long processing time to defend against long path wormhole attacks. In this work, we propose a wormhole detection method using range-based topology comparison that exploits the local neighbourhood subgraph. The Round Trip Time (RTT) for each node pair is gathered to generate neighbour information. Then, the network is recon
APA, Harvard, Vancouver, ISO, and other styles
21

Eslahi, Ali, Shahryar Zeighami, Faisal Ahmed, Seyed Hossein Hosseini, Bahareh Ebrahimi, and Mohammad Hossein Anbardar. "Synchronized Laparoscopic Bilateral Adrenalectomy for Pheochromocytoma in Multiple Endocrine Neoplasia Syndrome: A Case Report." Journal of Kidney Cancer and VHL 9, no. 3 (2022): 24–28. http://dx.doi.org/10.15586/jkcvhl.v9i3.239.

Full text
Abstract:
Pheochromocytomas are tumors producing catecholamines that arise from chromaffin cells in the adrenal medulla. They are usually benign in multiple endocrine neoplasia type 2 (MEN2) syndrome, but they tend to present bilaterally in 50–80% of the patients. Few researchers have reported success with simultaneous laparoscopic bilateral adrenalectomy. Hence, we report a 48-year-old woman who presented with a panic attack, headache, and abdominal discomfort that had started 10 years ago. The computed tomography (CT) scan showed a large bilateral cystic lesion in both adrenal glands in favor of pheoc
APA, Harvard, Vancouver, ISO, and other styles
22

Winter, R. W., K. A. Cornell, L. L. Johnson, M. Ignatushchenko, D. J. Hinrichs, and M. K. Riscoe. "Potentiation of the antimalarial agent rufigallol." Antimicrobial Agents and Chemotherapy 40, no. 6 (1996): 1408–11. http://dx.doi.org/10.1128/aac.40.6.1408.

Full text
Abstract:
We have discovered a remarkable synergistic antimalarial interaction between rufigallol and the structurally similar compound exifone. The synergistic effects were produced in chloroquine-susceptible and chloroquine-resistant clones of Plasmodium falciparum. The degree of potentiation as estimated by standard isobolar analysis was approximately 60-fold for experiments initiated with asynchronous parasites. The most pronounced synergism was observed in experiments with synchronized trophozoite-infected erythrocytes, in which the degree of synergy was at least 300-fold. While the mechanism under
APA, Harvard, Vancouver, ISO, and other styles
23

Karthika, P., and Karmel Arockiasamy. "Simulation of SDN in mininet and detection of DDoS attack using machine learning." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1797–805. http://dx.doi.org/10.11591/eei.v12i3.5232.

Full text
Abstract:
Most contemporary businesses are embracing software defined networking (SDN), a developing architecture that enables an aerial-like perspective of the entire network. SDN operates by virtualizing the network and provides advantages including improved performance, visibility, speed, and scalability. SDN attempts to divide the network control plane from the forwarding plane. The control plane, which includes one or more controllers and incorporates complete intelligence, is thought of as the brain of the SDN. However, SDN has challenges with controller vulnerability, flexibility, and hardware se
APA, Harvard, Vancouver, ISO, and other styles
24

Marshall, David J. "Predatory and reproductive responses of the estuarine whelk Thais gradata (Caenogastropoda: Muricidae) to novel colonization by Musculista senhousia (Bivalvia: Mytilidae)." Journal of the Marine Biological Association of the United Kingdom 89, no. 7 (2009): 1387–93. http://dx.doi.org/10.1017/s0025315409000642.

Full text
Abstract:
Novel predator–prey interactions are becoming increasingly relevant to investigate in the context of current geographical range expansions and biological invasions. This study describes a vigorous attack by a muricid whelk, Thais gradata on a mud-inhabiting mytilid mussel, Musculista senhousia, following new colonization of the mussel in the Brunei estuarine system (Borneo, South-East Asia). This represents only the second reported attack by a gastropod on this globally important invasive mussel species, and the first such attack in its native environment. Whelks migrated from their typical ha
APA, Harvard, Vancouver, ISO, and other styles
25

Huang, Huihui, Xuyang Miao, Zehui Wu, and Qiang Wei. "An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network." Mathematical Problems in Engineering 2021 (February 2, 2021): 1–14. http://dx.doi.org/10.1155/2021/8811970.

Full text
Abstract:
With the rapid development of mobile communication technology, the spatial information networks (SIN) have been used for various space tasks’ coverage in commercial, meteorology, emergency, and military scenarios. In SIN, one basic issue is to achieve mutual authentication and secret communication among the participants. Although many researches have designed authentication schemes for SIN, they have not considered the situation where the clock is not synchronized as the broad coverage space in wireless environment. In this paper, we disclose several flaws of Altaf et al.’s scheme (2020), in w
APA, Harvard, Vancouver, ISO, and other styles
26

Hori, Michio, Masanori Kohda, Satoshi Awata, and Satoshi Takahashi. "Dynamics of Laterality in Lake Tanganyika Scale-Eaters Driven by Cross-Predation." Symmetry 11, no. 1 (2019): 119. http://dx.doi.org/10.3390/sym11010119.

Full text
Abstract:
Scale-eating cichlid fishes, Perissodus spp., in Lake Tanganyika have laterally asymmetrical bodies, and each population is composed of righty and lefty morphs. Righty morphs attack the right side of prey and lefty morphs do the opposite. This anti-symmetric dimorphism has a genetic basis. Temporal changes in the frequencies of morphs in two cohabiting scale-eating species (Perissodus microlepis and P. straeleni) were investigated over a 31-year period on a rocky shore at the southern end of the lake. Dimorphism was maintained dynamically during the period in both species, and the frequencies
APA, Harvard, Vancouver, ISO, and other styles
27

Leone, M., V. Lucini, D. D'Amico, et al. "Twenty-Four-Hour Melatonin and Cortisol Plasma Levels in Relation to Timing of Cluster Headache." Cephalalgia 15, no. 3 (1995): 224–29. http://dx.doi.org/10.1046/j.1468-2982.1995.015003224.x.

Full text
Abstract:
The cyclic recurrence of cluster periods and the regular timing of headache occurrence in cluster headache (CH) induced us to study the circadian secretion of melatonin and cortisol in 12 patients with episodic CH, during a cluster period, and compare them with 7 age- and sex-matched healthy controls. Blood was sampled every 2, h for 24 h. All subjects were confined to a dark room from 22.00 to 08.00. Plasma melatonin levels were significantly reduced in CH patients (repeated measures ANOVA p < 0.03; mesor p < 0.02), and the cortisol mesor was significantly increased ( p < 0.03). Ampl
APA, Harvard, Vancouver, ISO, and other styles
28

Régnière, Jacques, M. Lukas Seehausen, and Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 1: Tranosema rostrale (Hymenoptera: Ichneumonidae)." Forests 11, no. 8 (2020): 846. http://dx.doi.org/10.3390/f11080846.

Full text
Abstract:
Despite their importance as mortality factors of many insects, the detailed biology and ecology of parasitoids often remain unknown. To gain insights into the spatiotemporal biology of insect parasitoids in interaction with their hosts, modeling of temperature-dependent development, reproduction, and survival is a powerful tool. In this first article of a series of three, we modeled the biology of Tranosema rostrale at the seasonal level with a three-species individual-based model that took into account the temperature-dependent performance of the parasitoid and two of its hosts. The predicted
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Yufeng, Jianguo Kong, Xiuping Wang, and Gongbing Shan. "Biomechanical analysis of Yang’s spear turning-stab technique in Chinese martial arts." Physical Activity Review 8, no. 2 (2020): 16–22. http://dx.doi.org/10.16926/par.2020.08.17.

Full text
Abstract:
The Yang’s spear turning-stab was a legendary technique, applied in ancient battles in China. It resulted in numerous famous winnings. The mythical aspect of the technique is a victory in fleeing and back-facing a fighter. Now the skill is a spear technique of Chinese martial arts that is learned and excised by many Chinese Gungfu practitioners. Due to a dearth of scientific study on the skill, the uniqueness and its winning secretes are still unknown. The aim of this study is to demystify the skill by using a synchronized measurement of 3D motion capture (VICON 12 camera system), stab-force m
APA, Harvard, Vancouver, ISO, and other styles
30

Qu, Zhengwei, Xinran Zhang, Yuchen Gao, Chao Peng, Yunjing Wang, and Popov Maxim Georgievitch. "Detection of False Data Injection Attack in AGC System Based on Random Forest." Machines 11, no. 1 (2023): 83. http://dx.doi.org/10.3390/machines11010083.

Full text
Abstract:
False data injection attacks change the control effect of automatic generation control systems, which may cause a destructive impact on power systems. In this paper, the data from the regular operation of a system and the data from false data injection attacks in the historical data are studied and classified. The normal operating parameters and abnormal operation parameters under various attack scenarios are collected as samples for training the detection model based on time series. The random forest algorithm model is selected for detection through the comparison of detection effects, and va
APA, Harvard, Vancouver, ISO, and other styles
31

Régnière, Jacques, Rémi Saint-Amant, Jean-Claude Thireau, Pierre Therrien, Christian Hébert, and Véronique Martel. "Modeling Climatic Influences on Three Parasitoids of Low-Density Spruce Budworm Populations. Part 2: Meteorus trachynotus (Hymenoptera: Braconidae)." Forests 12, no. 2 (2021): 155. http://dx.doi.org/10.3390/f12020155.

Full text
Abstract:
This is the second article of a series of three where we develop temperature-driven models to describe the seasonal interactions between parasitoids and their hosts which we use to explore the impact of climate on their spatiotemporal biology. Here, we model the biology of Meteorus trachynotus (Hymenoptera: Braconidae) with an individual-based model of its daily interactions with two host species. This model predicts the performance of the parasitoid in response to temperature affecting its seasonal development and that of the two hosts. We compare model output with an extensive set of field o
APA, Harvard, Vancouver, ISO, and other styles
32

Mironov, N. Yu, V. V. Vlodzyanovskiy, Yu A. Yuricheva, et al. "Safety and Effectiveness of Electrical and Pharmacological Cardioversion in Persistent Atrial Fibrillation. Part 2: Assessment of Safety." Rational Pharmacotherapy in Cardiology 14, no. 6 (2019): 826–30. http://dx.doi.org/10.20996/1819-6446-2018-14-6-826-830.

Full text
Abstract:
Aim. To compare safety of new class III antiarrhythmic drug Refralon with direct current cardioversion (DCC) in patients with persistent atrial fibrillation (AF). Material and methods. 60 patients with persistent AF were randomized to groups of DCC (n=30) and pharmacologic conversion (PCV; n=30). There were no significant differences in age, sex, AF duration, concomitant cardiovascular diseases, CHA2DS2-VASc score and echocardiographic parameters between the groups compared. Initial assessment excluded contraindications to restore sinus rhythm (SR). In DCC group two attempts using biphasic syn
APA, Harvard, Vancouver, ISO, and other styles
33

Barenghi, Alessandro, Gioele Falcetti, and Gerardo Pelosi. "Locating Side Channel Leakage in Time through Matched Filters." Cryptography 6, no. 2 (2022): 26. http://dx.doi.org/10.3390/cryptography6020026.

Full text
Abstract:
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices. One of the crucial steps for a side channel attack to succeed is the capability to locate the time instant in which the cryptographic primitive being attacked is effectively leaking information on the side channel itself, and synchronize the data obtained from the measurements on that instant. In this work, we propose an efficient and effective solution relying on the digital signal processing technique known as matched filters. We de
APA, Harvard, Vancouver, ISO, and other styles
34

Alfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.

Full text
Abstract:
The Network Time Protocol (NTP) is used to synchronize clocks of various computer devices such as personal computers, tablets, and phones based their set time zones. The network of devices that use these NTP servers form a huge distributed network that attracted a number of attacks from late 2013 towards early 2014. This paper presents a hands-on test of the Distributed Reflection Denial of Service (DRDoS) attack by the monlist command, provides more vulnerability in the protocol, and offers mitigation to these vulnerabilities. A Kali Linux server was used to test the monlist command on its lo
APA, Harvard, Vancouver, ISO, and other styles
35

Fujimura, T., Y. Takahagi, H. Nagashima, S. Miyagawa, T. Shigehisa, and H. Murakami. "33 PRODUCTION OF TRANSGENIC-CLONED PIGS CARRYING HDAF, GnT-III AND HETEROZYGOUSLY DISRUPTED ±-1,3-GALACTOSYLTRANSFERASE GENES." Reproduction, Fertility and Development 17, no. 2 (2005): 166. http://dx.doi.org/10.1071/rdv17n2ab33.

Full text
Abstract:
In pig-to-human xenotransplantation, transplants are rapidly rejected by binding of human natural antibodies to porcine xenoantigen, mostly Gal α-1-3Gal oligosaccharides, and subsequent complement attack. To overcome this rejection, we so far have produced transgenic pigs expressing both human CD55/DAF (decay-accelerating factor, a complement-regulatory protein) and GnT-III (N-acetylglucosaminyltransferase III, a sugar chain modifying enzyme). In the present study, we heterozygously disrupted the α-1,3-galactosyltransferase (GT) gene, which catalyses the biosynthesis of Gal α-1-3Gal epitopes,
APA, Harvard, Vancouver, ISO, and other styles
36

Quadir, Md Abdul, J. Christy Jackson, J. Prassanna, et al. "An efficient algorithm to detect DDoS amplification attacks." Journal of Intelligent & Fuzzy Systems 39, no. 6 (2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.

Full text
Abstract:
Domain name system (DNS) plays a critical part in the functioning of the Internet. But since DNS queries are sent using UDP, it is vulnerable to Distributed Denial of Service (DDoS) attacks. The attacker can take advantage of this and spoof the source IP address and direct the response towards the victim network. And since the network does not keep track of the number of requests going out and responses coming in, the attacker can flood the network with these unwanted DNS responses. Along with DNS, other protocols are also exploited to perform DDoS. Usage of Network Time Protocol (NTP) is to s
APA, Harvard, Vancouver, ISO, and other styles
37

He, Xing, and Michael S. Scordilis. "Efficiently Synchronized Spread-Spectrum Audio Watermarking with Improved Psychoacoustic Model." Research Letters in Signal Processing 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/251868.

Full text
Abstract:
This paper presents an audio watermarking scheme which is based on an efficiently synchronized spread-spectrum technique and a new psychoacoustic model computed using the discrete wavelet packet transform. The psychoacoustic model takes advantage of the multiresolution analysis of a wavelet transform, which closely approximates the standard critical band partition. The goal of this model is to include an accurate time-frequency analysis and to calculate both the frequency and temporal masking thresholds directly in the wavelet domain. Experimental results show that this watermarking scheme can
APA, Harvard, Vancouver, ISO, and other styles
38

Yeniçeri, Ramazan, Selçuk Kilinç, and Müştak E. Yalçin. "Attack on a Chaos-Based Random Number Generator Using Anticipating Synchronization." International Journal of Bifurcation and Chaos 25, no. 02 (2015): 1550021. http://dx.doi.org/10.1142/s0218127415500212.

Full text
Abstract:
Chaotic systems have been used in random number generation, owing to the property of sensitive dependence on initial conditions and hence the possibility to produce unpredictable signals. Within the types of chaotic systems, those which are defined by only one delay-differential equation are attractive due to their simple model. On the other hand, it is possible to synchronize to the future states of a time-delay chaotic system by anticipating synchronization. Therefore, random number generator (RNG), which employs such a system, might not be immune to the attacks. In this paper, attack on a c
APA, Harvard, Vancouver, ISO, and other styles
39

Klymiuk, N., A. Baehr, B. Kessler, et al. "425 HIGH-LEVEL EXPRESSION OF LEA29Y IN PANCREATIC ISLETS OF TRANSGENIC PIGS." Reproduction, Fertility and Development 22, no. 1 (2010): 370. http://dx.doi.org/10.1071/rdv22n1ab425.

Full text
Abstract:
Among the candidate organs or tissues for pig-to-primate xenotransplantation, pancreatic islets are probably closest to clinical application. Rejection of islet xenografts occurs mainly by cellular mechanisms; that is, T cells. A candidate molecule to protect porcine islets against the attack by human T cells is CTLA-4Ig, which represents the T-cell-inactivating extracellular domain of the human CTLA-4 protein linked to a region of the human immunoglobulin (Ig). This recombinant soluble fusion protein binds to CD80 and CD86, blocking their interaction with CD28 and thereby inhibiting T-cell pr
APA, Harvard, Vancouver, ISO, and other styles
40

Gupta, Tanvi, Sumit Kumar, Ankit Tomar, and KamalKant Verma. "DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks." International Journal of Security and Its Applications 10, no. 8 (2016): 395–406. http://dx.doi.org/10.14257/ijsia.2016.10.8.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Pan, Shengyi, Thomas Morris, and Uttam Adhikari. "Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data." IEEE Transactions on Industrial Informatics 11, no. 3 (2015): 650–62. http://dx.doi.org/10.1109/tii.2015.2420951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kumar, Gulshan, Rahul Saha, Mandeep Singh, and Mritunjay Kumar Rai. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN." International Journal of Information Security and Privacy 12, no. 1 (2018): 53–62. http://dx.doi.org/10.4018/ijisp.2018010105.

Full text
Abstract:
Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruder's activities by using snooping agents and honeypot on the network. The idea behind using snooping agents and honeypot is to provide network management in term of monitoring. Honey pot is placed just after the Firewall and intrusion system have strongly coupled synchronize with snooping agents Monitoring is considered at packet level and pattern level of the traffic. Simulation fi
APA, Harvard, Vancouver, ISO, and other styles
43

Gupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, and Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids." Energies 14, no. 16 (2021): 4941. http://dx.doi.org/10.3390/en14164941.

Full text
Abstract:
The integration of variable distributed generations (DGs) and loads in microgrids (MGs) has made the reliance on communication systems inevitable for information exchange in both control and protection architectures to enhance the overall system reliability, resiliency and sustainability. This communication backbone in turn also exposes MGs to potential malicious cyber attacks. To study these vulnerabilities and impacts of various cyber attacks, testbeds play a crucial role in managing their complexity. This research work presents a detailed study of the development of a real-time co-simulatio
APA, Harvard, Vancouver, ISO, and other styles
44

SOLAK, ERCAN. "CRYPTANALYSIS OF OBSERVER BASED DISCRETE-TIME CHAOTIC ENCRYPTION SCHEMES." International Journal of Bifurcation and Chaos 15, no. 02 (2005): 653–58. http://dx.doi.org/10.1142/s0218127405012260.

Full text
Abstract:
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic systems. It is shown that known plaintext and chosen plaintext attacks can successfully be launched against such cryptosystems to recover the system parameters and subsequently eavesdrop on the message transmission. The methods employed rely only on the basic mathematical relations that exist between the output sequence and the message sequence of the transmitter system and require very less computations.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhu, Baoshan, Jun Lei, and Shuliang Cao. "Numerical Simulation of Vortex Shedding and Lock-in Characteristics for a Thin Cambered Blade." Journal of Fluids Engineering 129, no. 10 (2007): 1297–305. http://dx.doi.org/10.1115/1.2776964.

Full text
Abstract:
In this paper, vortex-shedding patterns and lock-in characteristics that vortex-shedding frequency synchronizes with the natural frequency of a thin cambered blade were numerically investigated. The numerical simulation was based on solving the vorticity-stream function equations with the fourth-order Runge–Kutta scheme in time and the Chakravaythy–Oscher total variation diminishing (TVD) scheme was used to discretize the convective term. The vortex-shedding patterns for different blade attack angles were simulated. In order to confirm whether the vortex shedding would induce blade self-oscill
APA, Harvard, Vancouver, ISO, and other styles
46

Legett, Henry D., Ikkyu Aihara, and X. E. Bernal. "The dual benefits of synchronized mating signals in a Japanese treefrog: attracting mates and manipulating predators." Philosophical Transactions of the Royal Society B: Biological Sciences 376, no. 1835 (2021): 20200340. http://dx.doi.org/10.1098/rstb.2020.0340.

Full text
Abstract:
In dense mating aggregations, such as leks and choruses, acoustic signals produced by competing male conspecifics often overlap in time. When signals overlap at a fine temporal scale the ability of females to discriminate between individual signals is reduced. Yet, despite this cost, males of some species deliberately overlap their signals with those of conspecifics, synchronizing signal production in the chorus. Here, we investigate two hypotheses of synchronized mating signals in a Japanese treefrog ( Buergeria japonica ): (1) increased female attraction to the chorus (the beacon effect hypo
APA, Harvard, Vancouver, ISO, and other styles
47

Youssef, El-Nasser S., Fabrice Labeau, and Marthe Kassouf. "Detection of Load-Altering Cyberattacks Targeting Peak Shaving Using Residential Electric Water Heaters." Energies 15, no. 20 (2022): 7807. http://dx.doi.org/10.3390/en15207807.

Full text
Abstract:
The rapid adoption of the smart grid’s nascent load-management capabilities, such as demand-side management and smart home systems, and the emergence of new classes of controllable high-wattage loads, such as energy storage systems and electric vehicles, magnify the smart grid’s exposure to load-altering cyberattacks. These attacks aim at disrupting power grid services by staging a synchronized activation/deactivation of numerous customers’ high-wattage appliances. A proper defense plan is needed to respond to such attacks and maintain the stability of the grid, and would include prevention, d
APA, Harvard, Vancouver, ISO, and other styles
48

Sang, D.-K., and M.-J. Tahk. "Guidance law switching logic considering the seeker's field-of-view limits." Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering 223, no. 8 (2009): 1049–58. http://dx.doi.org/10.1243/09544100jaero614.

Full text
Abstract:
The impact time control guidance (ITCG) method, which has been proposed recently, can be applied successfully to a salvo attack of multiple missiles. Compared to the proportional navigation guidance law, this guidance method makes additional manoeuvres to synchronize the impact times. However, such manoeuvres do not consider the manoeuvrability and the seeker's field-of-view (FOV) of a missile and may cause the target to move out of the missile seeker's FOV; maintaining the seeker lock-on condition during the engagement is critical for missile guidance. To solve this problem, two methods are p
APA, Harvard, Vancouver, ISO, and other styles
49

Radziukevich, M. L. "A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks." «System analysis and applied information science», no. 3 (October 4, 2021): 51–58. http://dx.doi.org/10.21122/2309-4923-2021-3-51-58.

Full text
Abstract:
This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two stages: the formation of partially coinciding binary sequences using synchronized artificial neural networks and the elimination of mismatched bits by open comparison of the parities of bit pairs. The purpose of this article is to increase the cryptographic strength of this method in relation to a cryptanalyst. In this regard, it is proposed to pr
APA, Harvard, Vancouver, ISO, and other styles
50

Gopinath, S., A. Pillai, A. G. Diwan, J. V. Pattisapu, and K. Radhakrishnan. "Reiterating the role of corpus callosum in generalization of interictal and ictal epileptiform discharges: a case report with post-callosotomy intracranial electroencephalography in Lennox–Gastaut syndrome." Epilepsy and paroxysmal conditions 13, no. 3 (2021): 249–53. http://dx.doi.org/10.17749/2077-8333/epi.par.con.2021.086.

Full text
Abstract:
Lennox–Gastaut syndrome (LGS) is an epileptic encephalopathy characterized by delayed mental development and intractable multiple seizure types, predominantly tonic. Drop attacks are the commonest and the most disabling type of seizures. Resective surgery is often not possible in LGS as the electroencephalogram (EEG) abnormalities are usually multifocal and generalized, and magnetic resonance image is often either normal or multilesional. We report a case of LGS with bilateral parieto-occipital gliosis where EEG before and after callosotomy demonstrated synchronized bilateral interictal epilep
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!