Добірка наукової літератури з теми "Synchronized attack"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Synchronized attack".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Synchronized attack"

1

Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 22, 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.

Повний текст джерела
Анотація:
With the rising cyber-physical power systems and emerging danger of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber communications can be broken to cause material damage. Therefore, adjustment needs to be made in the present control scheme plan methods to moderate the impact of possible attacks on service quality. This paper, focuses on the service of synchronized source-load contribution in main frequency regulation, a weakness study is performed with model the attack intrusion process, and the risk review of the service is made by further model the attack impacts on the service’s bodily things. On that basis, the customary synchronized reserve allotment optimization model is adapted and the allocation scheme is correct according to the cyber-attack impact. The proposed alteration methods are validating through a case study, showing efficiency in defensive alongside the cyber-attack impacts.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Manaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Повний текст джерела
Анотація:
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Wu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.

Повний текст джерела
Анотація:
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

O'Connell, Michael, and Aaron Bernard. "A Serious Cause of Panic Attack." Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.

Повний текст джерела
Анотація:
We report on a case of a patient with atrial fibrillation in the setting of Wolff-Parkinson-White syndrome. The patient underwent synchronized electrical cardioversion, typically considered safe and effective, which resulted in a dangerous complication for the patient (degeneration into ventricular fibrillation). Discussion of common rhythm disturbances in WPW and management strategies are reviewed.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Butcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide." Journal of Genocide Research 15, no. 3 (September 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.

Повний текст джерела
Анотація:
Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM) attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP) poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Manaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (September 29, 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.

Повний текст джерела
Анотація:
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at the same time , using an centralized command and control system, the attacked client then sends the information to a centralized command and control server which will distribute the attack information to all of the integrated clients connected to it. The distributed information contains all of the attack information including the type of attack, the IP address of the attacker, and the time of attack. The process of receiving the attacker's information and distributing it through the centralized web firewall is done automatically and immediately at the time of the attack. And all of the receiving clients will take actions against the threat depending on the distributed information such as banning the IP address of the attacker. The main process aims to protect multiple clients from any possible attack from the same attacker or the same type of attack. The system has been implemented to protect a real web application. Experiments showed that the attacks has been successfully prevented on multiple hosts at the time. This paper came to provide a centralized web firewall system that connect different web firewalls in order to detect and prevent different types of web attacks and work as a fully integrated system with the different clients.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Повний текст джерела
Анотація:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Повний текст джерела
Анотація:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ullah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard, and Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1." Cancers 12, no. 9 (September 18, 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.

Повний текст джерела
Анотація:
Cancer is a result of “aggressive” division and uncontrolled proliferation of the abnormal cells that survive attack by immune cells. We investigated the expression of HLA-G and PD-L1 with the different stages of cancer cell division along with their role in the interaction of immune cells in vitro. Ovarian cancer (OVCAR-3) and chronic myeloid leukemia cell line (K-562) are used for this study. The correlation of protein expression with percentage of cells in each phase (G1, S and G2 phase) was evaluated through FACS. Cells were synchronized in G1, G2 and mitotic phase to evaluate gene (RT-qPCR) and protein expression (FACS). Real-time immune cell attack (RTICA) analysis with PBMCs (peripheral blood mono-nuclear cells) and cancer cells were performed. We found that cells expressing higher levels of HLA-G and PD-L1 are mainly in G2 phase and those expressing lower levels are mainly in G1 phase. Evidently, the higher expression of the two proteins was observed when synchronized in mitotic phase as compared to low expression when synchronized in G1 phase. RTICA analysis showed the presence of HLA-G delayed the lysis of the cells. In conclusion, the cancer cell can escape from immune cells in division stage that suggests the impact of mitosis index for cancer immunotherapy.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Synchronized attack"

1

Gomes, Lara Elena. "Comparação entre forças propulsivas efetivas calculadas e medida durante um palmateio de sustentação." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2010. http://hdl.handle.net/10183/27677.

Повний текст джерела
Анотація:
A força propulsiva gerada durante o palmateio é resultado do somatório das forças de arrasto e de sustentação, sendo que a componente que atua na direção do movimento desejado é igual à força propulsiva efetiva. Essas forças podem ser estimadas a partir de equações hidrodinâmicas, porém essas equações não consideram todos os mecanismos que contribuem para a propulsão. Dessa forma, o objetivo geral do presente estudo foi comparar a força propulsiva efetiva calculada a partir das equações hidrodinâmicas e a força propulsiva efetiva medida durante o palmateio de sustentação (na posição vertical, de cabeça para cima) em cada fase do palmateio. Para isso, uma praticante de nado sincronizado realizou palmateio na posição vertical de cabeça para cima durante 15 segundos, enquanto que dados cinemáticos e cinéticos foram obtidos por viodeogrametria 3D e dinamometria respectivamente. A análise gráfica de Bland e Altman foi usada para comparar as forças propulsivas efetivas medida e calculada durante o palmateio. As forças propulsivas efetivas calculada e medida foram diferentes, sendo a medida maior que a calculada. Ainda, os resultados indicaram que o palmateio executado não foi simétrico, isto é, a orientação e a força propulsiva entre a mão direita e a esquerda foram diferentes. Portanto, o achado do presente trabalho destaca a importância de mecanismos instáveis para a propulsão durante o palmateio, já que as forças estimadas por meio das equações hidrodinâmicas apresentaram resultados inferiores, sendo isso observado ao longo de todo o palmateio.
Propulsive force generated during sculling motion results from drag and lift propulsive forces, and the component acting in the direction of motion is the effective propulsive force. These forces may be calculated using hydrodynamic equations, but these equations do not consider all mechanisms that contribute to the propulsion. Thus, the main purpose of this study was to compare the calculated effective propulsive force using the hydrodynamic equations and the measured effective propulsive force during a support sculling motion (vertical position with the head above the water‟s surface) in each phase of sculling. For this, a practitioner of synchronized swimming performed sculling motion in a vertical position with the head above the water‟s surface during 15 seconds, while kinematic and kinetic data were obtained by 3D videogrammetry and dynamometry respectively. Graphical techniques from Bland and Altman were used to compare the measured effective propulsive force and calculated effective propulsive force during sculling motion. The calculated effective propulsive force and the measured effective propulsive force were different, the measured being greater than the calculated. Moreover, the results indicated sculling motion performed was not symmetric, that is, the orientation and propulsive forces between the right and left hands were different. Therefore, the result of this study highlights the importance of the unsteady mechanisms for the propulsion during sculling motion, because the calculated forces using the hydrodynamic equations presented low values throughout the sculling motion.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.

Повний текст джерела
Анотація:
Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a general theory that takes into account the impact that the presence of an adversary has on the design of effective signal processing tools. By focusing on the application side of Adversarial Signal Processing, namely adversarial information fusion in distributed sensor networks, and adopting a game-theoretic approach, this thesis contributes to the above mission by addressing four issues. First, we address decision fusion in distributed sensor networks by developing a novel soft isolation defense scheme that protects the network from adversaries, specifically, Byzantines. Second, we develop an optimum decision fusion strategy in the presence of Byzantines. In the next step, we propose a technique to reduce the complexity of the optimum fusion by relying on a novel nearly-optimum message passing algorithm based on factor graphs. Finally, we introduce a defense mechanism to protect decentralized networks running consensus algorithm against data falsification attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Synchronized attack"

1

Government, U. S. Planning Considerations: Complex Coordinated Terrorist Attacks - Homeland Security Threat Background and Characteristics, Synchronized and Independent Teams at Multiple Locations. Independently Published, 2019.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Synchronized attack"

1

Barbu, Guillaume, and Hugues Thiebeauld. "Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -." In Smart Card Research and Advanced Applications, 18–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27257-8_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Singh, Shreya, Rimjhim Kanaujia, and Shivaprakash M Rudramurthy. "Immunopathogenesis of Aspergillosis." In The Genus Aspergillus - Pathogenicity, Mycotoxin Production and Industrial Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.98782.

Повний текст джерела
Анотація:
Aspergillus species are ubiquitous saprophytes and opportunistic pathogens causing wide spectrum of diseases in humans depending on the host immune status. Following pathogen entry, various soluble bronchopulmonary factors enhance conidial clearance. However, due to virulence factors and poor host immune response Aspergillus conidia bind and damage the airway epithelium. The host immune cells like neutrophils and macrophages recognise Aspergillus spp. through various pathogen recognition receptors and form reactive oxygen species which mediate conidial killing. Neutrophils also attack extracellular hyphae by oxidative attack, non-oxidative granule proteins and neutrophil extracellular traps. In case of adaptive immunity, Th1 cells are crucial sources of IFN-γ mediated protective immunity. The Th17 also display a highly pro-inflammatory which is counterbalanced by a Treg cell. B cells and antibodies also enhance fungal clearance although excessive IgE production may result in atopy. The immune responses are influenced by changes in production of short-chain fatty acids by the gut microbiome which primes cells toward Th2 responses, and this is synchronized by the Innate lymphoid cells. This review provides comprehensive knowledge of various virulence factors of Aspergillus, antifungal host defences including innate and humoral immune response and regulation of host immunity by microbiome.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Söyleyici, Gülin Tuğçe, and Adnan Kalkan. "A New Problem Emerging With the Internet and Digital Media." In Advances in Social Networking and Online Communities, 420–32. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5426-8.ch025.

Повний текст джерела
Анотація:
Today, with the developing technology, online social media and social network have emerged as a cultural reality. With the increase in the use of digital media, in the modern age where the real world and the virtual world can be experienced in a synchronized way, digital media offers many opportunities. However, the increase in the time spent on the internet also brings with it undesirable situations such as cyberbullying. Cyberbullying is an act of cyber aggression aimed at harassing or humiliating. Cyberbullying is the behavior that disrupts the social relations of those chosen as victims and aims to arouse negative emotions. Understanding how cyberbullying occurs is very important for the development of strategies to prevent and respond to this attack. In this chapter, the concepts of cyber violence, cyber bullying, traditional bullying, and cyber victimization are explained.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 74–94. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch004.

Повний текст джерела
Анотація:
Internet usage has increased significantly across developing economies in last decade and most of the enterprises are extensively reliable on computer networks for electronic mails to payment gateways. But, the scenario we live in today has become more and more connected, sophisticated and risk-prone to our network-delivered society. Nevertheless, it remains critical for enterprises to exploit the full potential of available technologies such as mobile computing, smart computing and cloud computing. A cyber security related gaffe in any of these rapidly emerging domains may lead to lost productivity and grave concerns to the enterprise. The chapter highlights the various concerns associated to cyber security, viz., how an attack may be operated and offered measures to secure the network and information technology resources within and outside the enterprise. In most of the developing economies no synchronized activities in this regard are taking place which opens the opportunity to cyber criminals intrude into the system and compromise the resources.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies." In Cyber Security and Threats, 1044–59. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch051.

Повний текст джерела
Анотація:
Internet usage has increased significantly across developing economies in last decade and most of the enterprises are extensively reliable on computer networks for electronic mails to payment gateways. But, the scenario we live in today has become more and more connected, sophisticated and risk-prone to our network-delivered society. Nevertheless, it remains critical for enterprises to exploit the full potential of available technologies such as mobile computing, smart computing and cloud computing. A cyber security related gaffe in any of these rapidly emerging domains may lead to lost productivity and grave concerns to the enterprise. The chapter highlights the various concerns associated to cyber security, viz., how an attack may be operated and offered measures to secure the network and information technology resources within and outside the enterprise. In most of the developing economies no synchronized activities in this regard are taking place which opens the opportunity to cyber criminals intrude into the system and compromise the resources.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Conde, Maite. "Toward New Cinematic Foundations." In Foundational Films, 242–46. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520290983.003.0012.

Повний текст джерела
Анотація:
Adalberto Kemeny and Rodolfo Lustig’s dependency on São Paulo’s industrial and political elite to produce São Paulo, Symphony of a Metropolis was not exceptional. By the late 1920s American films occupied 80 percent of the Brazilian market, leaving little space for local production. Without full access to the domestic market, producers could not achieve adequate returns on their investments, and consequently the process of capital accumulation within the industry was stifled, as was production. Even the temporary disruption of the coming of sound did not end Hollywood’s ubiquity in Brazil. In fact, the arrival of the talkies further entrenched US cinema’s presence. The high costs of acquiring synchronized equipment meant that local investment lagged behind Hollywood and allowed the North American industry to maintain its hegemony. By the early 1930s, North American dubbing and subtitling techniques had proved popular among Brazilian audiences, and Hollywood increased its presence in the country. In the face of North America’s dominance, domestic production was unstable and unprofitable, and local producers were mostly unable to attain a sufficient return on their investments to allow them to develop on a larger scale. ...
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Legeżyńska, Joanna, Claude De Broyer, and Jan Marcin Węsławski. "Invasion of the Poles." In Evolution and Biogeography, 216–46. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190637842.003.0009.

Повний текст джерела
Анотація:
Polar Crustacea show high taxonomic and functional diversity and hold crucial roles within regional food webs. Despite the differences in the evolutionary history of the two Polar regions, present data suggest rather similar species richness, with over 2,250 taxa recorded in the Antarctic and over 1,930 noted in the Arctic. A longer duration of isolated evolution resulted in a high percentage of endemic species in the Antarctic, while the relatively young Arctic ecosystem, subjected to advection from adjacent seas, shows a very low level of endemism. Low temperatures and seasonal changes of food availability have a strong impact on polar crustacean life histories, resulting in their slow growth and development, extended life cycles, and reproduction well synchronized with annual peaks of primary production. Many species, Antarctic amphipods in particular, exhibit a clear tendency to attain large size. In both regions, abundant populations of pelagic grazers play a pivotal role in the transport of energy and nutrients to higher trophic levels. The sea-ice habitat unique to polar seas supports a wide range of species, with euphausiids and amphipods being the most important in terms of biomass in the Antarctic and Arctic, respectively. Deep sea fauna remains poorly studied, with new species being collected on a regular basis. Ongoing processes, namely a decline of sea-ice cover, increasing levels of ultraviolet radiation, and invasions of sub-polar species, are likely to reshape crustacean communities in both Polar regions.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Synchronized attack"

1

Wang, Hongxia, Mingquan Fan, and Qing Qian. "Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack." In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE, 2011. http://dx.doi.org/10.1109/cse.2011.66.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shah, Abdullah L., Ali T. Al-Awami, and Wessam Mesbah. "Attack Detection and Measurement Correction in Distribution Systems with Non-Synchronized Measurements." In 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2022. http://dx.doi.org/10.1109/isgt-europe54678.2022.9960624.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Prasad, Romesh, Matthew K. Swanson, and Young Moon. "Recovering From Cyber-Manufacturing Attacks by Reinforcement Learning." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-93982.

Повний текст джерела
Анотація:
Abstract A Cyber-Manufacturing systems (CMS) is an integration of informational and operational entities that are synchronized with manufacturing processes to increase productivity. However, this integration enlarges the scope for cyber attackers to intrude manufacturing processes, which are called cyber-manufacturing attacks. They can have significant impacts on physical operations within a CMS, such as shutting down plants, production interruption, premature failure of products, and fatal accidents. Although research activities in this emerging problem have been increased recently, existing research has been limited to detection and prevention solutions. However, these strategies cannot ensure a continuous function of an attacked CMS. To ensure continuous functioning of a CMS, a robust recovery strategy must be developed and employed. Current research in recovery has been limited to feedback controllers with an assumption of a complete knowledge of a system model. To overcome this limitation, a recovery agent augmented by reinforcement learning was developed. This is to utilize the ability of reinforcement learning to handle sequential decisions and to proceed even without a complete knowledge of a system model. A virtual environment for recovery agents has been developed to assist efforts needed to obtain sample data, experiment various scenarios, and explore with reinforcement learning. Two cyber-manufacturing attack scenarios have been developed: (i) spoofing a stepper motor controlling additive manufacturing processes, (ii) disrupting the sequence of the pick and place robot. The recovery agent takes random actions by exploring its environment and receives rewards from the actions. After many iterations, it learns proper actions to take.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ling, Yang, and Chu Weihua. "Research on movement relationship and synchronized motion control strategy for the attack angle device of the 2.4m transonic wind tunnel." In 2016 IEEE International Conference on Mechatronics and Automation. IEEE, 2016. http://dx.doi.org/10.1109/icma.2016.7558569.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Prier, Michael W., and James A. Liburdy. "Discrete Vortex Modeling of a Flapping Foil With Activated Leading Edge Motion." In ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/ajkfluids2019-4964.

Повний текст джерела
Анотація:
Abstract Energy harvesting performance for a flapping foil device is evaluated to determine how activated leading edge motion affects the aerodynamic forces and the cycle power generated. Results are obtained for a thin flat foil that pitches about the mid-chord and operates in the reduced frequency range of k = fc/U of 0.06–0.10 and Reynolds numbers of 20,000 and 30,000 with a pitching amplitude of 70° and heaving amplitude of h0 = 0.5c. Time resolved data are presented based on direct force measurements and are used to determine overall cycle efficiency and coefficient of power. These results are compared against a panel-based discrete vortex model to predict power production. The model incorporates a leading edge suction parameter predictor for vortex shedding and empirical adjustments to circulatory forces. It is found that the leading edge motions that reduce the effective angle of attack early in a flapping stroke generate larger forces later in the stroke. Consequently, the energy harvesting efficiencies and power coefficients are increased since the generated aerodynamic loads are better synchronized with the foil motion. The efficiency gains are reduced with increasing reduced frequencies.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Riedel, Colton, Guoyu Fu, Donald Beyette, and Jyh-Charn Liu. "Measurement System Timing Integrity in the Presence of Faults and Malicious Attacks." In 2019 International Conference on Smart Grid Synchronized Measurements and Analytics (SGSMA). IEEE, 2019. http://dx.doi.org/10.1109/sgsma.2019.8784502.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jin, Chenglu, Lingyu Ren, Xubin Liu, Peng Zhang, and Marten van Dijk. "Mitigating Synchronized Hardware Trojan Attacks in Smart Grids." In CPS Week '17: Cyber Physical Systems Week 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3055386.3055394.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ammour, Rabah, Leonardo Brenner, Isabel Demongodin, Said Amari, and Dimitri Lefebvre. "Costs analysis of stealthy attacks with bounded output synchronized Petri nets." In 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). IEEE, 2021. http://dx.doi.org/10.1109/case49439.2021.9551583.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mattei, Andrew K., W. Mack Grady, P. Jay Caspary, and Scott A. McBride. "Detection of time spoofing attacks on GPS synchronized phasor measurement units." In 2016 69th Annual Conference for Protective Relay Engineers (CPRE). IEEE, 2016. http://dx.doi.org/10.1109/cpre.2016.7914884.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Blum, Ronny, Himanshu Sharma, and Thomas Pany. "Smartphone Behaviour under Sophisticated Time Synchronized and Record and Replay Spoofing Attacks." In 2022 International Technical Meeting of The Institute of Navigation. Institute of Navigation, 2022. http://dx.doi.org/10.33012/2022.18183.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії