Skip to Content

526 Results Found

  • Article
  • Open Access
1,598 Views
14 Pages

13 November 2025

Trauma is a major cause of morbidity and mortality in dogs and cats. While prognostic tools are well-established in human medicine, few guidelines exist in veterinary trauma care. The Animal Trauma Triage (ATT) score and modified Glasgow Coma Scale (...

  • Article
  • Open Access
62 Citations
15,871 Views
22 Pages

CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques

  • Octavian Grigorescu,
  • Andreea Nica,
  • Mihai Dascalu and
  • Razvan Rughinis

31 August 2022

Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has emerged as a means to prevent and fight cybercrime. Attempts already exist in this regard. The C...

  • Communication
  • Open Access
93 Citations
20,492 Views
14 Pages

Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework

  • Anna Georgiadou,
  • Spiros Mouzakitis and
  • Dimitris Askounis

9 May 2021

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures. Its innovative approach has been broadly welcomed by both vendors and...

  • Article
  • Open Access
20 Citations
10,808 Views
19 Pages

10 April 2024

Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the siz...

  • Article
  • Open Access
554 Views
21 Pages

Research on ATT-BiLSTM-Based Restoration Method for Deflection Monitoring Data of a Steel Truss Bridge

  • Yongjian Chen,
  • Rongzhen Liu,
  • Jianlin Wang,
  • Fan Pan,
  • Fei Lian and
  • Hui Cheng

4 August 2025

Given the intricate operating environment of steel truss bridges, data anomalies are frequently initiated by faults in the sensor monitoring system itself during the monitoring process. This paper utilizes a steel truss bridge as a case study in engi...

  • Article
  • Open Access
28 Citations
10,710 Views
18 Pages

Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Tirthankar Ghosh,
  • Russel Plenkers,
  • Tom McElroy,
  • Stephan Dulaney and
  • Sajida Shabanali

11 January 2023

With the rapid rate at which networking technologies are changing, there is a need to regularly update network activity datasets to accurately reflect the current state of network infrastructure/traffic. The uniqueness of this work was that this was...

  • Article
  • Open Access
18 Citations
7,425 Views
22 Pages

24 October 2022

With advances in cyber threats and increased intelligence, incidents continue to occur related to new ways of using new technologies. In addition, as intelligent and advanced cyberattack technologies gradually increase, the limit of inefficient malic...

  • Article
  • Open Access
5 Citations
4,317 Views
18 Pages

Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22

  • Sikha S. Bagui,
  • Dustin Mink,
  • Subhash C. Bagui,
  • Michael Plain,
  • Jadarius Hill and
  • Marshall Elam

There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA00...

  • Article
  • Open Access
270 Views
29 Pages

12 February 2026

In recent years, numerous Advanced Persistent Threats (APTs) have carried out cyber-physical attacks on critical infrastructures. Ukraine has been the victim of several advanced campaigns against its power grids, exemplifying a growing trend of disru...

  • Article
  • Open Access
24 Citations
6,283 Views
24 Pages

Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework

  • Aybars Oruc,
  • Ahmed Amro and
  • Vasileios Gkioulos

12 November 2022

Shipping performed by contemporary vessels is the backbone of global trade. Modern vessels are equipped with many computerized systems to enhance safety and operational efficiency. One such system developed is the integrated navigation system (INS),...

  • Article
  • Open Access
41 Citations
10,419 Views
18 Pages

Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework

  • Yonghyun Jo,
  • Oongjae Choi,
  • Jiwoon You,
  • Youngkyun Cha and
  • Dong Hoon Lee

26 February 2022

Cybersecurity is important on ships that use information and communication technology. On such ships, the work, control, and sensor systems are connected for steering, navigation, and cargo management inside the hull, and a cyberattack can have physi...

  • Article
  • Open Access
5 Citations
4,375 Views
20 Pages

Recognition of ATT Triplex and DNA:RNA Hybrid Structures by Benzothiazole Ligands

  • Iva Zonjić,
  • Lidija-Marija Tumir,
  • Ivo Crnolatac,
  • Filip Šupljika,
  • Livio Racané,
  • Sanja Tomić and
  • Marijana Radić Stojković

27 February 2022

Interactions of an array of nucleic acid structures with a small series of benzothiazole ligands (bis-benzothiazolyl-pyridines—group 1, 2-thienyl/2-benzothienyl-substituted 6-(2-imidazolinyl)benzothiazoles—group 2, and three 2-aryl/hetero...

  • Article
  • Open Access
4 Citations
2,036 Views
26 Pages

12 February 2025

Geophysical logging curves are crucial for oil and gas field exploration and development, and curve reconstruction techniques are a key focus of research in this field. This study proposes an inversion model for deep resistivity curves in marine carb...

  • Article
  • Open Access
2 Citations
1,908 Views
20 Pages

Flow-Induced Motion and Energy Conversion of the Cir-T-Att Oscillator in a Flow Field with a High Reynolds Number

  • Danjie Ran,
  • Jijian Lian,
  • Xiang Yan,
  • Fang Liu,
  • Nan Shao,
  • Xu Yang and
  • Lingfan Li

The present study aims to systematically investigate the effects of a high Reynolds number on the flow-induced motion and energy conversion of the Cir-T-Att oscillator. Experiments are conducted in six Reynolds number ranges (2.89 × 104~6.51 &t...

  • Article
  • Open Access
2,027 Views
9 Pages

(1) Background: This study sought to assess the appropriateness of a five-item scale to measure attitudes towards IPV (ATT-IPV) among married adolescent girls and their husbands in Niger, a population in which this scale has not yet been tested. (2)...

  • Article
  • Open Access
9 Citations
5,390 Views
22 Pages

As the Industrial Internet of Things (IIoT) increasingly integrates with traditional networks, advanced persistent threats (APTs) pose significant risks to critical infrastructure. Traditional Intrusion Detection Systems (IDSs) and Anomaly Detection...

  • Article
  • Open Access
1,141 Views
31 Pages

13 November 2025

Cyber Threat Intelligence (CTI) reports are essential resources for identifying the Tactics, Techniques, and Procedures (TTPs) of hackers and cyber threat actors. However, these reports are often lengthy and unstructured, which limits their suitabili...

  • Article
  • Open Access
1,628 Views
23 Pages

Introduction: Diethyl nitrosamine (DEN), a known carcinogen, has been used for validating the RasH2 and P53 transgenic models in chemical testing and has been shown to enhance primary liver tumor growth in the ATT-Myc transgenic mouse model of liver...

  • Article
  • Open Access
13 Citations
6,973 Views
13 Pages

23 January 2022

In recent years, cyber attacks against critical infrastructure have been increasing and are becoming stealthy and persistent. Attackers or malware may be hiding in the system after penetration to collect system information. They would further make la...

  • Article
  • Open Access
640 Views
23 Pages

A Virtual Power Plant Load Forecasting Approach Using COM Encoding and BiLSTM-Att-KAN

  • Yong Zhu,
  • Liangyi Pu,
  • Di Yang,
  • Tun Kang,
  • Chao Liang,
  • Mingzhi Peng and
  • Chao Zhai

24 October 2025

Virtual Power Plant (VPP) is capable of aggregating and intelligently coordinating diverse distributed energy resources, among which the accuracy of load forecasting is a key factor in ensuring their regulation capability. To address the periodicity...

  • Data Descriptor
  • Open Access
4 Citations
4,178 Views
28 Pages

Introducing UWF-ZeekData24: An Enterprise MITRE ATT&CK Labeled Network Attack Traffic Dataset for Machine Learning/AI

  • Marshall Elam,
  • Dustin Mink,
  • Sikha S. Bagui,
  • Russell Plenkers and
  • Subhash C. Bagui

25 April 2025

This paper describes the creation of a new dataset, UWF-ZeekData24, aligned with the Enterprise MITRE ATT&CK Framework, that addresses critical shortcomings in existing network security datasets. Controlling the construction of attacks and meticu...

  • Article
  • Open Access
1 Citations
2,457 Views
19 Pages

The continuous increase in the penetration rate of autonomous vehicles in highway traffic flow has become an irreversible development trend; in this paper, a novel hybrid prediction model of deep sequence learning and an integrated decision tree is p...

  • Article
  • Open Access
132 Views
40 Pages

A Hybrid Time Series Forecasting Model Combining ARIMA and Decision Trees to Detect Attacks in MITRE ATT&CK Labeled Zeek Log Data

  • Raymond Freeman,
  • Sikha S. Bagui,
  • Subhash C. Bagui,
  • Dustin Mink,
  • Sarah Cameron and
  • Germano Correa Silva De Carvalho

19 February 2026

Intrusion detection systems face challenges in processing high-volume network traffic while maintaining accuracy across diverse low volume attack types. This study presents a hybrid approach combining ARIMA time series forecasting with Decision Tree...

  • Article
  • Open Access
21 Citations
7,400 Views
25 Pages

Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework

  • Sikha Bagui,
  • Dustin Mink,
  • Subhash Bagui,
  • Tirthankar Ghosh,
  • Tom McElroy,
  • Esteban Paredes,
  • Nithisha Khasnavis and
  • Russell Plenkers

20 October 2022

While computer networks and the massive amount of communication taking place on these networks grow, the amount of damage that can be done by network intrusions grows in tandem. The need is for an effective and scalable intrusion detection system (ID...

  • Article
  • Open Access
550 Views
21 Pages

Efficient Real-Time Row Detection and Navigation Using LaneATT for Greenhouse Environments

  • Ricardo Navarro Gómez,
  • Joel Milla,
  • Paolo Alfonso Reyes Ramírez,
  • Jesús Arturo Escobedo Cabello and
  • Alfonso Gómez-Espinosa

31 December 2025

This study introduces an efficient real-time lane detection and navigation system for greenhouse environments, leveraging the LaneATT architecture. Designed for deployment on the Jetson Xavier NX edge computing platform, the system utilizes an RGB ca...

  • Article
  • Open Access
17 Citations
4,049 Views
15 Pages

Text Emotion Recognition Based on XLNet-BiGRU-Att

  • Tian Han,
  • Zhu Zhang,
  • Mingyuan Ren,
  • Changchun Dong,
  • Xiaolin Jiang and
  • Quansheng Zhuang

Text emotion recognition (TER) is an important natural language processing (NLP) task which is widely used in human–computer interaction, public opinion analysis, mental health analysis, and social network analysis. In this paper, a deep learni...

  • Article
  • Open Access
12 Citations
2,037 Views
15 Pages

Wind Power Prediction Based on EMD-KPCA-BiLSTM-ATT Model

  • Zhiyan Zhang,
  • Aobo Deng,
  • Zhiwen Wang,
  • Jianyong Li,
  • Hailiang Zhao and
  • Xiaoliang Yang

26 May 2024

In order to improve wind power utilization efficiency and reduce wind power prediction errors, a combined prediction model of EMD-KPCA-BilSTM-ATT is proposed, which includes a data processing method combining empirical mode decomposition (EMD) and ke...

  • Article
  • Open Access
3 Citations
3,765 Views
18 Pages

SG-ATT: A Sequence Graph Cross-Attention Representation Architecture for Molecular Property Prediction

  • Yajie Hao,
  • Xing Chen,
  • Ailu Fei,
  • Qifeng Jia,
  • Yu Chen,
  • Jinsong Shao,
  • Sanjeevi Pandiyan and
  • Li Wang

19 January 2024

Existing formats based on the simplified molecular input line entry system (SMILES) encoding and molecular graph structure are designed to encode the complete semantic and structural information of molecules. However, the physicochemical properties o...

  • Article
  • Open Access
3 Citations
1,944 Views
29 Pages

A Hybrid GAS-ATT-LSTM Architecture for Predicting Non-Stationary Financial Time Series

  • Kevin Astudillo,
  • Miguel Flores,
  • Mateo Soliz,
  • Guillermo Ferreira and
  • José Varela-Aldás

18 July 2025

This study proposes a hybrid approach to analyze and forecast non-stationary financial time series by combining statistical models with deep neural networks. A model is introduced that integrates three key components: the Generalized Autoregressive S...

  • Article
  • Open Access
17 Citations
5,688 Views
16 Pages

Flight Delay Regression Prediction Model Based on Att-Conv-LSTM

  • Jingyi Qu,
  • Min Xiao,
  • Liu Yang and
  • Wenkai Xie

8 May 2023

Accurate prediction results can provide an excellent reference value for the prevention of large-scale flight delays. Most of the currently available regression prediction algorithms use a single time series network to extract features, with less con...

  • Article
  • Open Access
242 Views
21 Pages

29 January 2026

Wind turbine (WT) misalignment fault diagnosis is constrained by critical signal processing challenges: weak fault features, intense background noise, and poor generalization. This study proposes a lightweight method for high-precision fault diagnosi...

  • Article
  • Open Access
31 Citations
9,116 Views
14 Pages

9 October 2021

Deep learning models have been widely used in prediction problems in various scenarios and have shown excellent prediction effects. As a deep learning model, the long short-term memory neural network (LSTM) is potent in predicting time series data. H...

  • Article
  • Open Access
1 Citations
8,997 Views
17 Pages

To improve the accuracy of detecting small and long-distance objects while self-driving cars are in motion, in this paper, we propose a 3D object detection method, Att-BEVFusion, which fuses camera and LiDAR data in a bird’s-eye view (BEV). Fir...

  • Article
  • Open Access
21 Citations
4,309 Views
13 Pages

16 February 2023

In order to improve the accuracy of tool wear prediction, an attention-based composite neural network, referred to as the ConvLSTM-Att model (1DCNN-LSTM-Attention), is proposed. Firstly, local multidimensional feature vectors are extracted with the h...

  • Article
  • Open Access
8 Citations
2,569 Views
19 Pages

31 May 2023

In this investigation, purified attapulgite (ATT) and polyvinyl alcohol (PVA) were utilized to fabricate nanocomposite hydrogels and a xerogel, with a focus on studying the impact of minor additions of ATT on the properties of the PVA nanocomposite h...

  • Article
  • Open Access
8 Citations
2,828 Views
25 Pages

20 July 2019

When solving multiple attribute decision making (MADM) problems, the 2-tuple linguistic variable is an effective tool that can not only express complex cognitive information but also prevent loss of information in calculation. The picture fuzzy set (...

  • Article
  • Open Access
986 Views
16 Pages

Package Positioning Based on Point Registration Network DCDNet-Att

  • Juan Zhu,
  • Chunrui Yang,
  • Guolyu Zhu,
  • Xiaofeng Yue and
  • Qingming Zhao

The application of robot technology in the automatic transportation process of packaging bags is becoming increasingly common. Point cloud registration is the key to applying industrial robots to automatic transportation systems. However, current poi...

  • Article
  • Open Access
4 Citations
4,207 Views
11 Pages

ФC31 Integrase-Mediated Isolation and Characterization of Novel Safe Harbors for Transgene Expression in the Pig Genome

  • Yanzhen Bi,
  • Zaidong Hua,
  • Hongyan Ren,
  • Liping Zhang,
  • Hongwei Xiao,
  • Ximei Liu,
  • Wenjun Hua,
  • Shuqi Mei,
  • Adrian Molenaar and
  • Xinmin Zheng
  • + 1 author

Programmable nucleases have allowed the rapid development of gene editing and transgenics, but the technology still suffers from the lack of predefined genetic loci for reliable transgene expression and maintenance. To address this issue, we used ФC3...

  • Communication
  • Open Access
32 Citations
5,648 Views
12 Pages

29 September 2021

During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or s...

  • Article
  • Open Access
4 Citations
2,053 Views
16 Pages

Identification Method of Stuck Pipe Based on Data Augmentation and ATT-LSTM

  • Xiaocheng Zhang,
  • Pinghua Dong,
  • Yanlong Yang,
  • Qilong Zhang,
  • Yuan Sun,
  • Xianzhi Song and
  • Zhaopeng Zhu

22 June 2024

Stuck pipe refers to the accidental phenomenon whereby drilling tools are stuck in a well during the drilling process and cannot move freely due to various reasons. As a result, the stuck pipe can consume a lot of manpower and material resources. Wit...

  • Article
  • Open Access
15 Citations
3,415 Views
13 Pages

Assessment of Arterial Transit Time and Cerebrovascular Reactivity in Moyamoya Disease by Simultaneous PET/MRI

  • Kenji Takata,
  • Hirohiko Kimura,
  • Shota Ishida,
  • Makoto Isozaki,
  • Yoshifumi Higashino,
  • Ken-Ichiro Kikuta,
  • Hidehiko Okazawa and
  • Tetsuya Tsujikawa

16 February 2023

We investigated the relationship between MRI-arterial spin labeling (ASL) parameters and PET-cerebral blood flow (CBF)/cerebrovascular reactivity (CVR) simultaneously obtained by PET/MRI in Moyamoya disease. Twelve patients underwent 15O-water PET/MR...

  • Article
  • Open Access
8 Citations
3,848 Views
20 Pages

Analysis of Cyber-Intelligence Frameworks for AI Data Processing

  • Alberto Sánchez del Monte and
  • Luis Hernández-Álvarez

17 August 2023

This paper deals with the concept of cyber intelligence and its components as a fundamental tool for the protection of information today. After that, the main cyber-intelligence frameworks that are currently applied worldwide (Diamond Model, Cyberkil...

  • Article
  • Open Access
14 Citations
4,387 Views
15 Pages

20 October 2023

The state-of-health (SOH) of lithium-ion batteries has a significant impact on the safety and reliability of electric vehicles. However, existing research on battery SOH estimation mainly relies on laboratory battery data and does not take into accou...

  • Article
  • Open Access
1,101 Views
26 Pages

Robust Adaptive Cascade Trajectory Tracking Control for an Aircraft Towing and Taxiing System

  • Weining Huang,
  • Pengjie Xu,
  • Tianrui Zhao,
  • Wei Zhang and
  • Yanzheng Zhao

20 February 2025

With the rapid growth of the civil aviation industry, the aircraft towing and taxiing (ATT) system has gained significant attention in the literature. Due to its nonlinear and underactuated characteristics, the path tracking and control of the ATT sy...

  • Article
  • Open Access
10 Citations
3,052 Views
34 Pages

Short-Medium-Term Solar Irradiance Forecasting with a CEEMDAN-CNN-ATT-LSTM Hybrid Model Using Meteorological Data

  • Max Camacho,
  • Jorge Maldonado-Correa,
  • Joel Torres-Cabrera,
  • Sergio Martín-Martínez and
  • Emilio Gómez-Lázaro

26 January 2025

In recent years, the adverse effects of climate change have increased rapidly worldwide, driving countries to transition to clean energy sources such as solar and wind. However, these energies face challenges such as cloud cover, precipitation, wind...

  • Article
  • Open Access
1 Citations
1,520 Views
23 Pages

30 December 2024

Monitoring lake area changes with a higher spatial and temporal resolution can facilitate a more detailed analysis of climate-related changes in the Tibetan Plateau. In the Landsat era, optical remote sensing observation with water body index-based m...

  • Article
  • Open Access
17 Citations
4,635 Views
23 Pages

In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment of cyber risks in a...

  • Article
  • Open Access
2 Citations
2,646 Views
17 Pages

As cyberattacks become increasingly sophisticated and frequent, it is crucial to develop robust cybersecurity measures that can withstand adversarial attacks. Adversarial simulation is an effective technique for evaluating the security of systems aga...

  • Article
  • Open Access
694 Views
40 Pages

19 December 2025

Conventional machine-learning-based defenses are unable to generalize well to novel chains of ATT&CK actions. Being inefficient with low telemetry budgets, they are also unable to provide causal explainability and auditing. We propose a knowledge...

  • Article
  • Open Access
11 Citations
4,530 Views
10 Pages

Differential Effects of Fkbp4 and Fkbp5 on Regulation of the Proopiomelanocortin Gene in Murine AtT-20 Corticotroph Cells

  • Kazunori Kageyama,
  • Yasumasa Iwasaki,
  • Yutaka Watanuki,
  • Kanako Niioka and
  • Makoto Daimon

The hypothalamic-pituitary-adrenal axis is stimulated in response to stress. When activated, it is suppressed by the negative feedback effect of glucocorticoids. Glucocorticoids directly inhibit proopiomelanocortin (Pomc) gene expression in the pitui...

of 11