Skip to Content

895 Results Found

  • Article
  • Open Access
760 Views
20 Pages

30 April 2025

Forests play a vital role in maintaining ecological balance, making accurate forest monitoring technologies essential. Remote sensing point cloud data always capture distinctive geometric features of forests, including the cylindrical symmetry of tre...

  • Article
  • Open Access
6 Citations
4,786 Views
15 Pages

11 August 2024

In recent research, there has been a significant focus on establishing robust quantum cryptography using the continuous-variable quantum key distribution (CV-QKD) protocol based on Gaussian modulation of coherent states (GMCS). Unlike more stable fib...

  • Article
  • Open Access
1 Citations
2,249 Views
25 Pages

30 April 2024

Bark beetle outbreaks damage forests and kill trees worldwide, but many aspects of their dynamics remain unexplained. Our aim was to identify predictors for individual tree deaths within the small (0.7 km2) Plešné Lake catchment in the...

  • Article
  • Open Access
27 Citations
21,737 Views
19 Pages

Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database

  • Zhongbei Li,
  • Xiangchun Li,
  • Chen Dong,
  • Fanfan Guo,
  • Fan Zhang and
  • Qi Zhang

7 July 2021

Terrorist attacks have become a serious source of risk affecting the security of the international community. Using the Global Terrorism Database (GTD), in order to quantitatively study past terrorist attacks and their temporal and spatial evolution...

  • Article
  • Open Access
1 Citations
2,998 Views
17 Pages

Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals

  • Pete Burnap,
  • Eirini Anthi,
  • Philipp Reineckea,
  • Lowri Williams,
  • Fengnian Cao,
  • Rakan Aldmoura and
  • Kevin Jones

Traditionally, cyber risk assessment considers system-level risk separately from individual component-level risk, i.e., devices, data, people. This separation prevents effective impact assessment where attack intelligence for a specific device can be...

  • Article
  • Open Access
25 Citations
9,670 Views
18 Pages

Investigation of Phishing Susceptibility with Explainable Artificial Intelligence

  • Zhengyang Fan,
  • Wanru Li,
  • Kathryn Blackmond Laskey and
  • Kuo-Chu Chang

17 January 2024

Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective...

  • Article
  • Open Access
2,320 Views
10 Pages

21 October 2022

We address minimization of information leakage from continuous-variable quantum channels. It is known, that regime of minimum leakage can be accessible for the modulated signal states with variance equivalent to a shot noise, i.e., vacuum fluctuation...

  • Article
  • Open Access
15 Citations
4,030 Views
21 Pages

Defense Strategies for Asymmetric Networked Systems with Discrete Components

  • Nageswara S. V. Rao,
  • Chris Y. T. Ma,
  • Kjell Hausken,
  • Fei He,
  • David K. Y. Yau and
  • Jun Zhuang

3 May 2018

We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The in...

  • Article
  • Open Access
19 Citations
4,592 Views
22 Pages

Smart Home IoT Network Risk Assessment Using Bayesian Networks

  • Miguel Flores,
  • Diego Heredia,
  • Roberto Andrade and
  • Mariam Ibrahim

10 May 2022

A risk assessment model for a smart home Internet of Things (IoT) network is implemented using a Bayesian network. The directed acyclic graph of the Bayesian network is constructed from an attack graph that details the paths through which different a...

  • Article
  • Open Access
2,134 Views
28 Pages

Signaling Security Games with Attack Planner Deception

  • Santing He,
  • Mingchu Li and
  • Runfa Zhang

16 August 2024

This paper studies a class of attack behavior in which adversaries assume the role of initiators, orchestrating and implementing attacks by hiring executors. We examine the dynamics of strategic attacks, modeling the initiator as an attack planner an...

  • Article
  • Open Access
9 Citations
3,477 Views
19 Pages

The security of the continuous-variable quantum key distribution (CVQKD) system is subject to various attacks by hackers. The traditional detection method of parameter estimation requires professionals to judge known attacks individually, so the gene...

  • Article
  • Open Access
8 Citations
3,549 Views
14 Pages

8 September 2021

Heartwood extracts of naturally durable wood species are often evaluated as alternatives to chemical wood preservatives, but field data from long-term performance testing are lacking. The current study evaluated the long-term (five-year) performance...

  • Review
  • Open Access
181 Citations
39,142 Views
37 Pages

30 September 2020

Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, whic...

  • Article
  • Open Access
31 Citations
4,210 Views
22 Pages

A New Approach to Privacy-Preserving Multiple Independent Data Publishing

  • A S M Touhidul Hasan,
  • Qingshan Jiang,
  • Hui Chen and
  • Shengrui Wang

14 May 2018

We study the problem of privacy preservation in multiple independent data publishing. An attack on personal privacy which uses independent datasets is called a composition attack. For example, a patient might have visited two hospitals for the same d...

  • Article
  • Open Access
3 Citations
2,962 Views
15 Pages

14 October 2022

The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols. The primary focus of defending agains...

  • Article
  • Open Access
19 Citations
6,507 Views
17 Pages

Face Presentation Attack Detection Using Deep Background Subtraction

  • Azeddine Benlamoudi,
  • Salah Eddine Bekhouche,
  • Maarouf Korichi,
  • Khaled Bensid,
  • Abdeldjalil Ouahabi,
  • Abdenour Hadid and
  • Abdelmalik Taleb-Ahmed

15 May 2022

Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face presentation attacks, in which a photo or video of an author...

  • Article
  • Open Access
12 Citations
4,530 Views
20 Pages

Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However...

  • Article
  • Open Access
1 Citations
2,898 Views
15 Pages

LTU Attacker for Membership Inference

  • Joseph Pedersen,
  • Rafael Muñoz-Gómez,
  • Jiangnan Huang,
  • Haozhe Sun,
  • Wei-Wei Tu and
  • Isabelle Guyon

20 July 2022

We address the problem of defending predictive models, such as machine learning classifiers (Defender models), against membership inference attacks, in both the black-box and white-box setting, when the trainer and the trained model are publicly rele...

  • Article
  • Open Access
4 Citations
2,257 Views
32 Pages

8 July 2024

In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks o...

  • Article
  • Open Access
4 Citations
9,999 Views
16 Pages

Who Is Concerned about Terrorist Attacks? A Religious Profile

  • Ângela Leite,
  • Ana Ramires,
  • Maria Alzira Pimenta Dinis and
  • Hélder Fernando Pedrosa e Sousa

16 November 2019

As part of the study on the psychological impact of terrorist acts on ordinary people, the objective of this study is to understand if religious identity protects individuals from feeling concerned about the possibility of terrorist attacks. The stud...

  • Article
  • Open Access
72 Citations
6,467 Views
14 Pages

An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach

  • Gori Mohamed,
  • J. Visumathi,
  • Miroslav Mahdal,
  • Jose Anand and
  • Muniyandy Elangovan

12 July 2022

Phishing is one of the biggest crimes in the world and involves the theft of the user’s sensitive data. Usually, phishing websites target individuals’ websites, organizations, sites for cloud storage, and government websites. Most users,...

  • Article
  • Open Access
3 Citations
2,016 Views
20 Pages

25 November 2024

The study of LiDAR-based 3D object detection and its robustness under adversarial attacks has achieved great progress. However, existing adversarial attack methods mainly focus on the targeted object, which destroys the integrity of the object and ma...

  • Article
  • Open Access
11 Citations
3,394 Views
17 Pages

2 November 2023

Planned and targeted attacks, such as the advanced persistent threat (APT), are highly sophisticated forms of attack. They involve numerous steps and are intended to remain within a system for an extended length of period before progressing to the ne...

  • Article
  • Open Access
1 Citations
2,014 Views
20 Pages

Improving Attack Graph Visual Syntax Configurations

  • Askhat Sherzhanov,
  • Hany F. Atlam,
  • Muhammad Ajmal Azad and
  • Harjinder Singh Lallie

As technology advances and cyber threats become increasingly sophisticated, the task of recognising and understanding malicious activities becomes more complex. This persistent issue is widely acknowledged and extensively documented within the cybers...

  • Article
  • Open Access
6 Citations
4,067 Views
13 Pages

After the events of 9/11, many police-responders developed post-traumatic stress disorder (PTSD) and were potentially vulnerable to developing depression and/or anxiety; in addition, nearly half of police with probable PTSD had comorbid depression an...

  • Article
  • Open Access
2 Citations
4,222 Views
25 Pages

14 December 2022

Recent efforts have shown that training data is not secured through the generalization and abstraction of algorithms. This vulnerability to the training data has been expressed through membership inference attacks that seek to discover the use of spe...

  • Article
  • Open Access
14 Citations
4,088 Views
20 Pages

Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems

  • Ivan Babić,
  • Aleksandar Miljković,
  • Milan Čabarkapa,
  • Vojkan Nikolić,
  • Aleksandar Đorđević,
  • Milan Ranđelović and
  • Dragan Ranđelović

27 March 2021

This paper presents a novel approach for an Intrusion Detection System (IDS) based on one kind of asymmetric optimization which use any three already well-known IDS algorithms and Triple Modular Redundancy (TMR) algorithm together. Namely, a variable...

  • Article
  • Open Access
17 Citations
5,112 Views
19 Pages

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks

  • Yahya Lambat,
  • Nick Ayres,
  • Leandros Maglaras and
  • Mohamed Amine Ferrag

29 September 2021

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated...

  • Article
  • Open Access
52 Citations
7,399 Views
17 Pages

Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS)

  • Sofia Azam,
  • Maryum Bibi,
  • Rabia Riaz,
  • Sanam Shahla Rizvi and
  • Se Jin Kwon

13 September 2022

Vehicular Ad-hoc network (VANET) is an imminent technology having both exciting prospects and substantial challenges, especially in terms of security. Due to its distributed network and frequently changing topology, it is extremely prone to security...

  • Feature Paper
  • Review
  • Open Access
400 Citations
92,388 Views
17 Pages

Social Engineering Attacks: A Survey

  • Fatima Salahdine and
  • Naima Kaabouch

The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the sec...

  • Case Report
  • Open Access
7 Citations
4,559 Views
7 Pages

A 30-year-old male diagnosed three years previously with reversible cerebral vasoconstriction syndrome (RCVS) presented to the department of neurology with an accumulation of attacks mimicking previous RCVS attacks and fulfilling the diagnostic crite...

  • Article
  • Open Access
1,977 Views
16 Pages

26 March 2025

The COVID-19 pandemic has significantly increased the incidence of post-infection cardiovascular events, particularly myocardial infarction, in individuals over 40. While the underlying mechanisms remain elusive, this study employs a hybrid machine l...

  • Review
  • Open Access
46 Citations
1,355 Views
20 Pages

Metabolomics of Disease Resistance in Crops

  • Vicent Arbona and
  • Aurelio Gómez-Cadenas

Plants are continuously exposed to the attack of invasive microorganisms, such as fungi or bacteria, and also viruses. To fight these attackers, plants develop different metabolic and genetic responses whose final outcome is the production of either...

  • Article
  • Open Access
8 Citations
36,012 Views
15 Pages

A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks

  • Hyeonsu Byun,
  • Jueun Kim,
  • Yunseok Jeong,
  • Byoungjin Seok,
  • Seonghyeon Gong and
  • Changhoon Lee

Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually. However, many studies focus on large-s...

  • Article
  • Open Access
11 Citations
5,084 Views
13 Pages

28 July 2023

The growing number of attacks on crucial cyber networks is one of humanity’s most significant security threats. Combining technological solutions with the convenient cybersecurity behavior of the human factor is necessary to reduce the effects...

  • Article
  • Open Access
20 Citations
11,470 Views
17 Pages

31 March 2001

Benzonorbornadiene 21, 7-spirocyclopropylbenzonorbornadiene 23, 7,7-dimethylbenzonorbornadiene 25, and 7-spirocyclopentylbenzonorbornadiene 27 have been reacted with 3,6-di(2-pyridyl)-s-tetrazine (rate: 21>23>25=27) to form symmetrical 4,5-dihydropyr...

  • Feature Paper
  • Article
  • Open Access
18 Citations
4,230 Views
18 Pages

An Approach for the Application of a Dynamic Multi-Class Classifier for Network Intrusion Detection Systems

  • Xavier Larriva-Novo,
  • Carmen Sánchez-Zas,
  • Víctor A. Villagrá,
  • Mario Vega-Barbas and
  • Diego Rivera

23 October 2020

Currently, the use of machine learning models for developing intrusion detection systems is a technology trend which improvement has been proven. These intelligent systems are trained with labeled datasets, including different types of attacks and th...

  • Article
  • Open Access
3 Citations
3,700 Views
24 Pages

BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks

  • Anastasios Papathanasiou,
  • George Liontos,
  • Georgios Paparis,
  • Vasiliki Liagkou and
  • Euripides Glavas

5 March 2024

In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods us...

  • Article
  • Open Access
4 Citations
5,260 Views
23 Pages

Broadcasting is one of the essential features in the Internet Protocol Ver 4 (IPv4). Attackers often exploit this feature of the IP protocol to launch several attacks against a network or an individual host. Attackers may either be a part of a Local...

  • Article
  • Open Access
10 Citations
3,571 Views
11 Pages

29 August 2022

Background: This research aimed to compare individual penalties by gender and weight categories in judo from the Judo World Championships (WC): Budapest—2017, Baku—2018, Tokyo—2019 and Budapest—2021 in all individual weight ca...

  • Article
  • Open Access
6 Citations
3,190 Views
20 Pages

13 November 2020

This paper studies an approach for detecting cyber attacks against networked cooperative systems (NCS) that are assumed to be working in a cyber-physical environment. NCS are prone to anomalies both due to cyber and physical attacks and faults. Cyber...

  • Feature Paper
  • Article
  • Open Access
3 Citations
5,373 Views
12 Pages

Disrupting Audio Event Detection Deep Neural Networks with White Noise

  • Rodrigo dos Santos,
  • Ashwitha Kassetty and
  • Shirin Nilizadeh

Audio event detection (AED) systems can leverage the power of specialized algorithms for detecting the presence of a specific sound of interest within audio captured from the environment. More recent approaches rely on deep learning algorithms, such...

  • Review
  • Open Access
5 Citations
4,721 Views
12 Pages

SUNCT/SUNA in Pediatric Age: A Review of Pathophysiology and Therapeutic Options

  • Carlo Alberto Cesaroni,
  • Jacopo Pruccoli,
  • Luca Bergonzini,
  • Giuseppe Quatrosi,
  • Luigi Vetri,
  • Michele Roccella and
  • Antonia Parmeggiani

21 September 2021

The International Classification of Headache Disorders, 3rd edition (ICHD3) defines Short-lasting Unilateral Neuralgiform Headache Attacks (SUNHA) as attacks of moderate or severe, strictly unilateral head pain lasting from seconds to minutes, occurr...

  • Review
  • Open Access
511 Citations
130,377 Views
42 Pages

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

  • Ömer Aslan,
  • Semih Serkant Aktuğ,
  • Merve Ozkan-Okay,
  • Abdullah Asim Yilmaz and
  • Erdal Akin

Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread...

  • Article
  • Open Access
14 Citations
6,567 Views
27 Pages

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection

  • Dominic Lightbody,
  • Duc-Minh Ngo,
  • Andriy Temko,
  • Colin C. Murphy and
  • Emanuel Popovici

This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B an...

  • Article
  • Open Access
13 Citations
3,282 Views
20 Pages

The design of existing machine-learning-based DoS detection systems in software-defined networking (SDN) suffers from two major problems. First, the proper time window for conducting network traffic analysis is unknown and has proven challenging to d...

  • Article
  • Open Access
2 Citations
3,139 Views
22 Pages

A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles

  • Tae Hoon Kim,
  • Moez Krichen,
  • Meznah A. Alamro and
  • Gabreil Avelino Sampedro

Adversarial attacks have received much attention as communication network applications rise in popularity. Connected and Automated Vehicles (CAVs) must be protected against adversarial attacks to ensure passenger and vehicle safety on the road. Never...

  • Article
  • Open Access
30 Citations
4,143 Views
27 Pages

An Intrusion Detection System for RPL-Based IoT Networks

  • Eric Garcia Ribera,
  • Brian Martinez Alvarez,
  • Charisma Samuel,
  • Philokypros P. Ioulianou and
  • Vassilios G. Vassilakis

5 December 2022

The Internet of Things (IoT) has become very popular during the last decade by providing new solutions to modern industry and to entire societies. At the same time, the rise of the industrial Internet of Things (IIoT) has provided various benefits by...

  • Article
  • Open Access
52 Citations
9,934 Views
17 Pages

Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis

  • Naya Nagy,
  • Malak Aljabri,
  • Afrah Shaahid,
  • Amnah Albin Ahmed,
  • Fatima Alnasser,
  • Linda Almakramy,
  • Manar Alhadab and
  • Shahad Alfaddagh

26 March 2023

In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies...

  • Article
  • Open Access
3 Citations
2,416 Views
16 Pages

Advanced Smartphone-Based Identification of Transport Modes: Resilience under GNSS-Based Attacks

  • Estefania Munoz Diaz,
  • Jose Manuel Rubio Hernan,
  • Francisco Jurado Romero,
  • Aicha Karite,
  • Alexandre Vervisch-Picois and
  • Nel Samama

One of the main challenges for ticketing in Mobility as a Service is the integration of the public and individual transport modes into a unified ticketing service. To realize this concept, a trustworthy identification of transport modes that is resil...

of 18