Skip to Content
You are currently on the new version of our website. Access the old version .

49 Results Found

  • Article
  • Open Access
3 Citations
3,094 Views
24 Pages

Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol

  • Sultan M. Almeghlef,
  • Abdullah AL-Malaise AL-Ghamdi,
  • Muhammad Sher Ramzan and
  • Mahmoud Ragab

21 June 2023

This paper discusses the Internet of Things (IoT) and the security challenges associated with it. IoT is a network of interconnected devices that share information. However, the low power and resources of IoT devices make them vulnerable to attacks....

  • Article
  • Open Access
1 Citations
3,146 Views
29 Pages

Domain Name Server (DNS) amplification Distributed Reflection Denial of Service (DRDoS) attacks are a Distributed Denial of Service (DDoS) attack technique in which multiple IT systems forge the original IP of the target system, send a request to the...

  • Article
  • Open Access
5 Citations
6,494 Views
22 Pages

Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications

  • Nivedita Mishra,
  • Sharnil Pandya,
  • Chirag Patel,
  • Nagaraj Cholli,
  • Kirit Modi,
  • Pooja Shah,
  • Madhuri Chopade,
  • Sudha Patel and
  • Ketan Kotecha

2 December 2021

Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and A...

  • Article
  • Open Access
22 Citations
7,025 Views
14 Pages

Cable Capacitance Attack against the KLJN Secure Key Exchange

  • Hsien-Pu Chen,
  • Elias Gonzalez,
  • Yessica Saez and
  • Laszlo B. Kish

30 October 2015

The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealit...

  • Article
  • Open Access
12 Citations
5,267 Views
18 Pages

DDoS Cyber-Incident Detection in Smart Grids

  • Jorge C. Merlino,
  • Mohammed Asiri and
  • Neetesh Saxena

25 February 2022

The smart grid (SG) offers potential benefits for utilities, electric generators, and customers alike. However, the prevalence of cyber-attacks targeting the SG emphasizes its dark side. In particular, distributed denial-of-service (DDoS) attacks can...

  • Article
  • Open Access
6 Citations
6,062 Views
21 Pages

14 September 2020

The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions...

  • Article
  • Open Access
6 Citations
3,960 Views
24 Pages

Quantum Key Distillation Using Binary Frames

  • Luis A. Lizama-Perez and
  • J. Mauricio López

24 June 2020

We introduce a new integral method for Quantum Key Distribution to perform sifting, reconciliation and amplification processes to establish a cryptographic key through the use of binary matrices called frames which are capable to increase quadratical...

  • Article
  • Open Access
5,194 Views
13 Pages

Obtaining accurate information from social media during a crisis can be difficult, but should all information really be disseminated? Social media platforms actively filter out terrorist and violent extremist content (TVEC), but how are users themsel...

  • Article
  • Open Access
12 Citations
7,982 Views
12 Pages

Molecular Modeling of Prion Transmission to Humans

  • Etienne Levavasseur,
  • Nicolas Privat,
  • Juan-Carlos Espinosa Martin,
  • Steve Simoneau,
  • Thierry Baron,
  • Benoit Flan,
  • Juan-Maria Torres and
  • Stéphane Haïk

2 October 2014

Using different prion strains, such as the variant Creutzfeldt-Jakob disease agent and the atypical bovine spongiform encephalopathy agents, and using transgenic mice expressing human or bovine prion protein, we assessed the reliability of protein m...

  • Article
  • Open Access
462 Views
31 Pages

3 January 2026

Distributed Denial-of-Service (DDoS) attacks represent a pervasive and critical threat to autonomous vehicles, jeopardizing their operational functionality and passenger safety. The ease with which these attacks can be launched contrasts sharply with...

  • Article
  • Open Access
1,458 Views
17 Pages

Current cloud computing expects to face huge traffic costs, data loads, and high latency due to the explosion of data from devices as the IoT and 5G technology evolve. Fog computing has emerged to overcome these issues. It deploys small fog servers a...

  • Article
  • Open Access
5 Citations
3,740 Views
11 Pages

28 January 2022

In response to pathogen attacks, plants activate a complex of defense mechanisms including an accumulation of the endogenous signaling compounds salicylic acid and jasmonic acid. The activity of pathogenesis-related genes (PRs) and coronatine-insensi...

  • Article
  • Open Access
1,267 Views
17 Pages

Boosting Clean-Label Backdoor Attacks on Graph Classification

  • Yadong Wang,
  • Zhiwei Zhang,
  • Ye Yuan and
  • Guoren Wang

13 September 2025

Graph Neural Networks (GNNs) have become a cornerstone for graph classification, yet their vulnerability to backdoor attacks remains a significant security concern. While clean-label attacks provide a stealthier approach by preserving original labels...

  • Article
  • Open Access
2 Citations
3,054 Views
9 Pages

27 June 2022

In most quantum key distribution (QKD) systems, a decoy-state protocol is implemented for preventing potential quantum attacks and higher mean photon rates. An optical intensity modulator attenuating the signal intensity is used to implement it in a...

  • Article
  • Open Access
18 Citations
6,221 Views
14 Pages

26 December 2018

Neural networks are very vulnerable to adversarial examples, which threaten their application in security systems, such as face recognition, and autopilot. In response to this problem, we propose a new defensive strategy. In our strategy, we propose...

  • Article
  • Open Access
14 Citations
5,906 Views
7 Pages

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded

  • Tom Vergoossen,
  • Robert Bedington,
  • James A. Grieve and
  • Alexander Ling

10 April 2019

An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe f...

  • Article
  • Open Access
1 Citations
1,642 Views
14 Pages

Development of Heat-Dry RT-LAMP Bioassay for Rapid Latent Detection of Botrytis cinerea

  • Khadijah Ayarnah,
  • Danielle Duanis-Assaf,
  • Noam Alkan and
  • Evgeni Eltzov

1 December 2024

The global food security crisis is emphasized by the alarming amount of food waste, where about one-third of the world’s food production, roughly 1.3 billion metric tons, is lost annually. Pathogens, such as Botrytis cinerea, contribute signifi...

  • Article
  • Open Access
4 Citations
1,457 Views
23 Pages

An Architecture of Enhanced Profiling Assurance for IoT Networks

  • Nut Aroon,
  • Vicky Liu,
  • Luke Kane,
  • Yuefeng Li,
  • Aklilu Daniel Tesfamicael and
  • Matthew McKague

Attacks launched from IoT networks can cause significant damage to critical network systems and services. IoT networks may contain a large volume of devices. Protecting these devices from being abused to launch traffic amplification attacks is critic...

  • Article
  • Open Access
6 Citations
3,236 Views
19 Pages

19 November 2019

Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocol...

  • Article
  • Open Access
1,285 Views
27 Pages

6 August 2025

Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H...

  • Review
  • Open Access
15 Citations
3,864 Views
18 Pages

Membrane Attack Complex in Myocardial Ischemia/Reperfusion Injury: A Systematic Review for Post Mortem Applications

  • Cristina Mondello,
  • Elvira Ventura Spagnolo,
  • Luigi Cardia,
  • Daniela Sapienza,
  • Serena Scurria,
  • Patrizia Gualniera and
  • Alessio Asmundo

2 November 2020

The complement system has a significant role in myocardial ischemia/reperfusion injury, being responsible for cell lysis and amplification of inflammatory response. In this context, several studies highlight that terminal complement complex C5b-9, al...

  • Article
  • Open Access
1 Citations
977 Views
23 Pages

Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate....

  • Article
  • Open Access
8 Citations
4,534 Views
16 Pages

19 November 2021

Cardiovascular diseases (CVDs) are one of the foremost causes of mortality in intensive care units worldwide. The development of a rapid method to quantify cardiac troponin I (cTnI)—the gold-standard biomarker of myocardial infarction (MI) (or “heart...

  • Article
  • Open Access
1 Citations
2,240 Views
14 Pages

22 August 2022

In this paper, unsteady motion tests of a lateral jet adjusting an air vehicle’s attitude are carried out. Curves of pitch moment amplification factors (KM) for a lateral jet versus angle of attack (α) are obtained using a wind tunnel fre...

  • Review
  • Open Access
760 Views
15 Pages

Cardiorenal Syndrome and Autonomic Overactivity

  • Joseph Mannozzi,
  • Desiree Duncan,
  • Julian D. Johnson,
  • Andrew Kohrman and
  • Donal S. O’Leary

30 November 2025

Cardiorenal syndrome (CRS) is a term that describes the pathological interplay between the heart and kidney wherein either organ may be the originating stimulus that leads to acute and eventually chronic disease in the other. The mechanisms by which...

  • Article
  • Open Access
1 Citations
2,855 Views
25 Pages

Enhancing Syslog Message Security and Reliability over Unidirectional Fiber Optics

  • Alin-Adrian Anton,
  • Petra Csereoka,
  • Eugenia Ana Capota and
  • Răzvan-Dorel Cioargă

10 October 2024

Standard log transmission protocols do not offer a robust way of segregating the log network from potential threats. A secure log transmission system and the realization of a data diode using affordable components are proposed. Unidirectional data fl...

  • Communication
  • Open Access
25 Citations
6,593 Views
11 Pages

The Cotton Mealybug Is Spreading along the Mediterranean: First Pest Detection in Italian Tomatoes

  • Michele Ricupero,
  • Antonio Biondi,
  • Agatino Russo,
  • Lucia Zappalà and
  • Gaetana Mazzeo

27 July 2021

The cotton mealybug Phenacoccus solenopsis Tinsley (Hemiptera: Pseudococcidae) is an extremely polyphagous invasive pest that can cause serious damages to cultivated plants. The pest is native to America but invaded Asian and Mediterranean countries...

  • Article
  • Open Access
5 Citations
7,451 Views
29 Pages

30 October 2018

When a laminar boundary layer is subjected to an adverse pressure gradient, laminar separation bubbles can occur. At low Reynolds numbers, the bubble size can be substantial, and the aerodynamic performance can be reduced considerably. At higher Reyn...

  • Article
  • Open Access
1 Citations
675 Views
21 Pages

Terrain conditions may significantly affect the near-ground-layer wind speed in coastal areas. In this research, wind tunnel tests and computational fluid dynamics (CFD) were performed to investigate the impact of topographic changes on the local win...

  • Article
  • Open Access
15 Citations
5,042 Views
26 Pages

Resistance to the SDHI Fungicides Boscalid and Fluopyram in Podosphaera xanthii Populations from Commercial Cucurbit Fields in Spain

  • Alejandra Vielba-Fernández,
  • Álvaro Polonio,
  • Laura Ruiz-Jiménez,
  • Antonio de Vicente,
  • Alejandro Pérez-García and
  • Dolores Fernández-Ortuño

8 September 2021

Powdery mildew is caused by Podosphaera xanthii, and is one of the most important diseases that attacks Spanish cucurbit crops. Fungicide application is the primary control tool; however, its effectiveness is hampered by the rapid development of resi...

  • Article
  • Open Access
92 Citations
7,795 Views
15 Pages

IL7-IL12 Engineered Mesenchymal Stem Cells (MSCs) Improve A CAR T Cell Attack Against Colorectal Cancer Cells

  • Andreas A. Hombach,
  • Ulf Geumann,
  • Christine Günther,
  • Felix G. Hermann and
  • Hinrich Abken

3 April 2020

Chimeric antigen receptor (CAR) redirected T cells are efficacious in the treatment of leukemia/lymphoma, however, showed less capacities in eliminating solid tumors which is thought to be partly due to the lack of cytokine support in the tumor lesio...

  • Article
  • Open Access
14 Citations
4,489 Views
13 Pages

Curtobacterium flaccumfaciens pv. flaccumfaciens (Cff) is a Gram-positive phytopathogenic bacterium attacking leguminous crops and causing systemic diseases such as the bacterial wilt of beans and bacterial spot of soybeans. Since the early 20th cent...

  • Article
  • Open Access
1,650 Views
21 Pages

The root-lesion nematode, Pratylenchus penetrans, is a migratory endoparasite that attacks potato roots, causing necrotic lesions and yield losses of up to 73%. Traditional detection and quantification methods are labor-intensive, time-consuming, and...

  • Article
  • Open Access
1 Citations
2,388 Views
24 Pages

30 July 2025

Smart contracts and cryptocurrency wallets are foundational components of decentralized applications (dApps) on blockchain platforms such as Ethereum. While these technologies enable secure, transparent, and automated transactions, their integration...

  • Article
  • Open Access
25 Citations
5,363 Views
48 Pages

There is an increase in the utilization of the floating offshore structure (FOS) called Catenary Anchor Leg Mooring (CALM) buoys and the attached marine hoses due to the increasing demand for oil and gas products. These hoses are flexible and easier...

  • Article
  • Open Access
4 Citations
4,985 Views
12 Pages

Host plant protease inhibitors offer resistance to proteases from invading pathogens. Trypsin inhibitors (TIs), in particular, serve as protective agents against insect and pathogen attacks. In this study, we designed a pair of degenerate primers bas...

  • Article
  • Open Access
2,301 Views
14 Pages

Chimeric Antigen Receptor (CAR) T Cells Releasing Soluble SLAMF6 Isoform 2 Gain Superior Anti-Cancer Cell Functionality in an Auto-Stimulatory Fashion

  • Dennis Christoph Harrer,
  • Tim Schlierkamp-Voosen,
  • Markus Barden,
  • Hong Pan,
  • Maria Xydia,
  • Wolfgang Herr,
  • Jan Dörrie,
  • Niels Schaft and
  • Hinrich Abken

14 June 2025

T cells equipped with chimeric antigen receptors (CARs) have evolved into an essential pillar of lymphoma therapy, reaching second-line treatment. In solid cancers, however, a dearth of lasting CAR T cell activation poses the major obstacle to achiev...

  • Article
  • Open Access
15 Citations
3,288 Views
17 Pages

The Adaptive Evolution in the Fall Armyworm Spodoptera frugiperda (Lepidoptera: Noctuidae) Revealed by the Diversity of Larval Gut Bacteria

  • Yan-Ping Wang,
  • Xu Liu,
  • Chun-Yan Yi,
  • Xing-Yu Chen,
  • Chang-Hua Liu,
  • Cui-Cui Zhang,
  • Qing-Dong Chen,
  • Song Chen,
  • Hong-Ling Liu and
  • De-Qiang Pu

26 January 2023

Insect gut microbes have important roles in host feeding, digestion, immunity, development, and coevolution with pests. The fall armyworm, Spodoptera frugiperda (Smith, 1797), is a major migratory agricultural pest worldwide. The effects of host plan...

  • Article
  • Open Access
3 Citations
5,635 Views
11 Pages

A Rapid and Sensitive Detection of HIV-1 with a One-Pot Two-Stage Reverse Transcription Recombinase Aided Real-Time PCR Assay

  • Fengyu Tian,
  • Cong Jin,
  • Shangzhi Ji,
  • Yanqing Tie,
  • Guohao Fan,
  • Ruiqing Zhang,
  • Yehuan Zheng,
  • Xinxin Shen,
  • Xuejun Ma and
  • Zhishan Feng

Human immunodeficiency virus 1 (HIV-1) attacks the immune system, making people susceptible to various diseases, thus increasing their risk of death. Comprehensive detection of major HIV-1 strains circulating in China is vital for effective HIV-1 inf...

  • Review
  • Open Access
9 Citations
4,176 Views
29 Pages

Adaptation and response to environmental changes require dynamic and fast information distribution within the plant body. If one part of a plant is exposed to stress, attacked by other organisms or exposed to any other kind of threat, the information...

  • Article
  • Open Access
26 Citations
5,821 Views
13 Pages

Enhancing Extractable Quantum Entropy in Vacuum-Based Quantum Random Number Generator

  • Xiaomin Guo,
  • Ripeng Liu,
  • Pu Li,
  • Chen Cheng,
  • Mingchuan Wu and
  • Yanqiang Guo

24 October 2018

Information-theoretically provable unique true random numbers, which cannot be correlated or controlled by an attacker, can be generated based on quantum measurement of vacuum state and universal-hashing randomness extraction. Quantum entropy in the...

  • Article
  • Open Access
6 Citations
3,153 Views
11 Pages

Molecular-Based Reappraisal of a Historical Record of Dothistroma Needle Blight in the Centre of the Mediterranean Region

  • Chiara Aglietti,
  • Alessandra Benigno,
  • Edoardo Scali,
  • Paolo Capretti,
  • Luisa Ghelardini and
  • Salvatore Moricca

24 July 2021

In this work, we rechecked, using species-specific Loop mediated isothermal AMPlification (LAMP) diagnostic assays followed by sequencing of fungal isolates at the beta-2-tubulin (tub2) gene region, a historical and never confirmed report of Dothistr...

  • Article
  • Open Access
5 Citations
6,468 Views
19 Pages

Application of State of the Art Modeling Techniques to Predict Flooding and Waves for a Coastal Area within a Protected Bay

  • Malcolm L. Spaulding,
  • Annette Grilli,
  • Chris Damon,
  • Grover Fugate,
  • Tatsu Isaji and
  • Lauren Schambach

Flood Insurance Rate Maps (FIRMs) are developed by the Federal Emergency Management Agency (FEMA) to provide guidance in establishing the risk to structures and infrastructure from storm surge sand associated waves in the coastal zone. The maps are u...

  • Article
  • Open Access
2 Citations
5,121 Views
18 Pages

Defense Priming in Nicotiana tabacum Accelerates and Amplifies ‘New’ C/N Fluxes in Key Amino Acid Biosynthetic Pathways

  • Nils Hanik,
  • Marcel Best,
  • Michael J. Schueller,
  • Ryan Tappero and
  • Richard A. Ferrieri

6 July 2020

In the struggle to survive herbivory by leaf-feeding insects, plants employ multiple strategies to defend themselves. One mechanism by which plants increase resistance is by intensifying their responsiveness in the production of certain defense agent...

  • Article
  • Open Access
181 Citations
12,945 Views
13 Pages

Gut Microbiota-Dependent Trimethylamine-N-oxide and Serum Biomarkers in Patients with T2DM and Advanced CKD

  • Mohammed A. I. Al-Obaide,
  • Ruchi Singh,
  • Palika Datta,
  • Kathy A. Rewers-Felkins,
  • Maria V. Salguero,
  • Ibtisam Al-Obaidi,
  • Kameswara Rao Kottapalli and
  • Tetyana L. Vasylyeva

19 September 2017

Trimethylamine-N-oxide (TMAO) is a product of dietary, gut microbiome, and tissues metabolism. Elevated blood TMAO levels are associated with heart attack, stroke and chronic kidney disease (CKD). The purpose of our study was to investigate the gut m...

  • Article
  • Open Access
1 Citations
2,067 Views
28 Pages

Morphological, Physiological, Biochemical, and Molecular Characterization of Fungal Species Associated with Papaya Rot in Cameroon

  • Moussango Victor Davy,
  • Voundi Olugu Steve,
  • Tchabong Raymond Sammuel,
  • Marie Ampères Bedine Boat,
  • Ntah Ayong Moise,
  • Anna Cazanevscaia Busuioc,
  • Priscile Ebong Mbondi,
  • Andreea Veronica Dediu Botezatu,
  • Manz Koule Jules and
  • Sameza Modeste Lambert
  • + 2 authors

17 May 2025

Post-harvest decay of Carica papaya L. is the primary cause of deterioration in papaya quality and the low economic impact of this sector in Cameroon. Field surveys conducted by teams from the Ministry of Agriculture and Rural Development (MINADER) i...

  • Article
  • Open Access
5 Citations
1,785 Views
33 Pages

Experimental Study of Wind Characteristics at a Bridge Site in Mountain Valley Considering the Effect of Oncoming Wind Speed

  • Weikang Li,
  • Shengnan Cui,
  • Jian Zhao,
  • Luming An,
  • Chao Yu,
  • Yan Ding,
  • Hongmiao Jing and
  • Qingkuan Liu

17 November 2024

The topography of mountainous areas is characterized by large undulations, which lead to a very complex wind field at bridge sites in mountain valleys. The influence of oncoming wind speed on long-span bridges built in mountain valleys is quite prono...

  • Review
  • Open Access
706 Views
27 Pages

24 December 2025

Background: Hospital-acquired influenza remains a persistent threat that amplifies morbidity, mortality, length of stay, and operational strain, particularly among older and immunocompromised inpatients. The COVID-19 era reshaped control norms—...

  • Article
  • Open Access
24 Citations
3,971 Views
20 Pages

Grapes (Vitis vinifera L.) are an essential crop for fresh consumption and wine production. Vineyards are attacked by several economically important bacterial and fungal diseases that require regular pesticide treatment. Among them, Pseudomonas syrin...