Zobrazeno 1 - 10
of 2 038
pro vyhledávání: '"Attack model"'
Publikováno v:
IEEE Access, Vol 12, Pp 163638-163653 (2024)
The increasing integration of cyber-physical systems (CPS) in critical infrastructures has heightened the importance of ensuring their security against various cyber threats. Game theory has emerged as a powerful analytical tool to model and analyze
Externí odkaz:
https://doaj.org/article/eb99d718db6d4eae97d85aa5e5aa2b54
Publikováno v:
Jisuanji kexue yu tansuo, Vol 17, Iss 7, Pp 1719-1728 (2023)
The double-spending attack against transactions in the blockchain is the focus of blockchain security research. As a large collection of computing power, mining pools are potential for malicious behavior, and the combination of multiple mining pools
Externí odkaz:
https://doaj.org/article/5cda3ac49561425997ef18702133c287
Publikováno v:
Entropy, Vol 26, Iss 7, p 580 (2024)
The controllability of complex networks is a core issue in network research. Assessing the controllability robustness of networks under destructive attacks holds significant practical importance. This paper studies the controllability of networks fro
Externí odkaz:
https://doaj.org/article/13c744495ca2451c8f3026deb57ef11d
Autor:
Junaid M. Qurashi, Kamal Mansur Jambi, Fathy E. Eassa, Maher Khemakhem, Fawaz Alsolami, Abdullah Ahmad Basuhail
Publikováno v:
IEEE Access, Vol 11, Pp 2652-2673 (2023)
Self-driving cars are going to be the main future mode of transportation. However, such systems like, any other cyber-physical system, are vulnerable to attack vectors and uncertainties. As a response, resilience-based approaches are being developed.
Externí odkaz:
https://doaj.org/article/07fd3916d240448c8d6955a35985ae9a
Autor:
Tao Feng, Bugang Zhang
Publikováno v:
Information, Vol 14, Iss 12, p 653 (2023)
The European Installation Bus(EIB) protocol, also known as KNX/EIB, is widely used in building and home automation. An extension of the KNX/EIB protocol, EIBsec, is primarily designed to meet the requirements for data transmission security in distrib
Externí odkaz:
https://doaj.org/article/438460840c6e4204bc0887221f3b69e7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Sensors, Vol 23, Iss 19, p 8174 (2023)
Cybersecurity is a critical issue in today’s internet world. Classical security systems, such as firewalls based on signature detection, cannot detect today’s sophisticated zero-day attacks. Machine learning (ML) based solutions are more attracti
Externí odkaz:
https://doaj.org/article/3676f82c8ff94da9a222a354c9bdd3ad
Autor:
Yean-Fu Wen, Chun-Yu Huang
Publikováno v:
IEEE Access, Vol 10, Pp 61159-61174 (2022)
We explored mined block temporarily holding (MBTH), MBTH with enforce fork (MBTH-EF), and intermittent MBTH-EF (iMBTH-EF) attacks to understand the effect of selfish mining on winning rate and fairness from the pool operation perspective. The tempora
Externí odkaz:
https://doaj.org/article/dec59b7e53e2404b8f26cd5f01a26389
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.