期刊文献+
共找到547,483篇文章
< 1 2 250 >
每页显示 20 50 100
A new horizon for neuroscience:terahertz biotechnology in brain research
1
作者 Zhengping Pu Yu Wu +2 位作者 Zhongjie Zhu Hongwei Zhao Donghong Cui 《Neural Regeneration Research》 SCIE CAS 2025年第2期309-325,共17页
Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biot... Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biotechnology and its applications in the field of neuropsychiatry.Available evidence indicates promising prospects for the use of terahertz spectroscopy and terahertz imaging techniques in the diagnosis of amyloid disease,cerebrovascular disease,glioma,psychiatric disease,traumatic brain injury,and myelin deficit.In vitro and animal experiments have also demonstrated the potential therapeutic value of terahertz technology in some neuropsychiatric diseases.Although the precise underlying mechanism of the interactions between terahertz electromagnetic waves and the biosystem is not yet fully understood,the research progress in this field shows great potential for biomedical noninvasive diagnostic and therapeutic applications.However,the biosafety of terahertz radiation requires further exploration regarding its two-sided efficacy in practical applications.This review demonstrates that terahertz biotechnology has the potential to be a promising method in the field of neuropsychiatry based on its unique advantages. 展开更多
关键词 biological effect brain NEURON NEUROPSYCHIATRY NEUROSCIENCE non-thermal effect terahertz imaging terahertz radiation terahertz spectroscopy terahertz technology
下载PDF
Diabetic foot attack:Managing severe sepsis in the diabetic patient
2
作者 Kisshan Raj Balakrishnan Dharshanan Raj Selva Raj +1 位作者 Sabyasachi Ghosh Gregory AJ Robertson 《World Journal of Critical Care Medicine》 2025年第1期1-13,共13页
Diabetic foot attack(DFA)is the most severe presentation of diabetic foot disease,with the patient commonly displaying severe sepsis,which can be limb or life threatening.DFA can be classified into two main categories... Diabetic foot attack(DFA)is the most severe presentation of diabetic foot disease,with the patient commonly displaying severe sepsis,which can be limb or life threatening.DFA can be classified into two main categories:Typical and atypical.A typical DFA is secondary to a severe infection in the foot,often initiated by minor breaches in skin integrity that allow pathogens to enter and proliferate.This form often progresses rapidly due to the underlying diabetic pathophysiology of neuropathy,microvascular disease,and hyperglycemia,which facilitate infection spread and tissue necrosis.This form of DFA can present as one of a number of severe infective pathologies including pyomyositis,necrotizing fasciitis,and myonecrosis,all of which can lead to systemic sepsis and multiorgan failure.An atypical DFA,however,is not primarily infection-driven.It can occur secondary to either ischemia or Charcot arthropathy.Management of the typical DFA involves prompt diagnosis,aggressive infection control,and a multidisciplinary approach.Treatment can be guided by the current International Working Group on the Diabetic Foot/Infectious Diseases Society of America guidelines on diabetic foot infections,and the combined British Orthopaedic Foot and Ankle Society-Vascular Society guidelines.This article highlights the importance of early recognition,comprehensive management strategies,and the need for further research to establish standardized protocols and improve clinical outcomes for patients with DFA. 展开更多
关键词 Diabetic foot attack Diabetic foot infection Diabetes mellitus SEPSIS Systemic sepsis
下载PDF
Mechanism and Preventive Technology of the Thaumasite Form of Sulfate Attack on Cement Mortars
3
作者 马保国 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2006年第z1期27-30,共4页
The deterioration mechanism of thaumasite towards cement or concrete structure and the deterioration pattern of in-situ construction caused by the formation of thaumasite were studied in this paper. To improve the TSA... The deterioration mechanism of thaumasite towards cement or concrete structure and the deterioration pattern of in-situ construction caused by the formation of thaumasite were studied in this paper. To improve the TSA (the thaumasite form of sulfate attack) resistance, the cement type, water to cement ratios, the mineral admixture and the circumstance factors should be taken into consideration. 展开更多
关键词 cement mortar sulfate attack THAUMASITE MECHANISM preventive technology
下载PDF
Attack Technology Research for Web Service
4
作者 SU Guangnan FENG Yongxin 《沈阳理工大学学报》 CAS 2014年第2期88-94,共7页
Web service is characterized by its isomerism and loose coupling;thus greatly facilitate the application of operation in distributed situation,but its disadvantages cause serious safety problems.The principium and cha... Web service is characterized by its isomerism and loose coupling;thus greatly facilitate the application of operation in distributed situation,but its disadvantages cause serious safety problems.The principium and characteristic of Web service classical attack technology are expatiated,classical attack techniques are classified,and attack technology is simulated,and then,the directions and the future of Web security are discussed. 展开更多
关键词 Web service attack technology SIMULATION SECURITY
下载PDF
Distributed Platooning Control of Automated Vehicles Subject to Replay Attacks Based on Proportional Integral Observers 被引量:1
5
作者 Meiling Xie Derui Ding +3 位作者 Xiaohua Ge Qing-Long Han Hongli Dong Yan Song 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1954-1966,共13页
Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issu... Secure platooning control plays an important role in enhancing the cooperative driving safety of automated vehicles subject to various security vulnerabilities.This paper focuses on the distributed secure control issue of automated vehicles affected by replay attacks.A proportional-integral-observer(PIO)with predetermined forgetting parameters is first constructed to acquire the dynamical information of vehicles.Then,a time-varying parameter and two positive scalars are employed to describe the temporal behavior of replay attacks.In light of such a scheme and the common properties of Laplace matrices,the closed-loop system with PIO-based controllers is transformed into a switched and time-delayed one.Furthermore,some sufficient conditions are derived to achieve the desired platooning performance by the view of the Lyapunov stability theory.The controller gains are analytically determined by resorting to the solution of certain matrix inequalities only dependent on maximum and minimum eigenvalues of communication topologies.Finally,a simulation example is provided to illustrate the effectiveness of the proposed control strategy. 展开更多
关键词 Automated vehicles platooning control proportional-integral-observers(PIOs) replay attacks TIME-DELAYS
下载PDF
Anti-Byzantine Attacks Enabled Vehicle Selection for Asynchronous Federated Learning in Vehicular Edge Computing 被引量:1
6
作者 Zhang Cui Xu Xiao +4 位作者 Wu Qiong Fan Pingyi Fan Qiang Zhu Huiling Wang Jiangzhou 《China Communications》 SCIE CSCD 2024年第8期1-17,共17页
In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amount... In vehicle edge computing(VEC),asynchronous federated learning(AFL)is used,where the edge receives a local model and updates the global model,effectively reducing the global aggregation latency.Due to different amounts of local data,computing capabilities and locations of the vehicles,renewing the global model with same weight is inappropriate.The above factors will affect the local calculation time and upload time of the local model,and the vehicle may also be affected by Byzantine attacks,leading to the deterioration of the vehicle data.However,based on deep reinforcement learning(DRL),we can consider these factors comprehensively to eliminate vehicles with poor performance as much as possible and exclude vehicles that have suffered Byzantine attacks before AFL.At the same time,when aggregating AFL,we can focus on those vehicles with better performance to improve the accuracy and safety of the system.In this paper,we proposed a vehicle selection scheme based on DRL in VEC.In this scheme,vehicle’s mobility,channel conditions with temporal variations,computational resources with temporal variations,different data amount,transmission channel status of vehicles as well as Byzantine attacks were taken into account.Simulation results show that the proposed scheme effectively improves the safety and accuracy of the global model. 展开更多
关键词 asynchronous federated learning byzantine attacks vehicle selection vehicular edge computing
下载PDF
Prospects for green steelmaking technology with low carbon emissions in China 被引量:2
7
作者 Zhang Fucheng Hong Lukuo Xu Ying 《Carbon Energy》 SCIE EI CAS CSCD 2024年第2期1-24,共24页
The steel industry is a major source of CO_(2) emissions,and thus,the mitigation of carbon emissions is the most pressing challenge in this sector.In this paper,international environmental governance in the steel indu... The steel industry is a major source of CO_(2) emissions,and thus,the mitigation of carbon emissions is the most pressing challenge in this sector.In this paper,international environmental governance in the steel industry is reviewed,and the current state of development of low-carbon technologies is discussed.Additionally,low-carbon pathways for the steel industry at the current time are proposed,emphasizing prevention and treatment strategies.Furthermore,the prospects of low-carbon technologies are explored from the perspective of transitioning the energy structure to a“carbon-electricity-hydrogen”relationship.Overall,steel enterprises should adopt hydrogen-rich metallurgical technologies that are compatible with current needs and process flows in the short term,based on the carbon substitution with hydrogen(prevention)and the CCU(CO_(2) capture and utilization)concepts(treatment).Additionally,the capture and utilization of CO_(2) for steelmaking,which can assist in achieving short-term emission reduction targets but is not a long-term solution,is discussed.In conclusion,in the long term,the carbon metallurgical process should be gradually supplanted by a hydrogen-electric synergistic approach,thus transforming the energy structure of existing steelmaking processes and attaining near-zero carbon emission steelmaking technology. 展开更多
关键词 carbon capture and utilization carbon emission hydrogen metallurgy low-carbon technology steel industry
下载PDF
Evaluating Privacy Leakage and Memorization Attacks on Large Language Models (LLMs) in Generative AI Applications 被引量:1
8
作者 Harshvardhan Aditya Siddansh Chawla +6 位作者 Gunika Dhingra Parijat Rai Saumil Sood Tanmay Singh Zeba Mohsin Wase Arshdeep Bahga Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期421-447,共27页
The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Infor... The recent interest in the deployment of Generative AI applications that use large language models (LLMs) has brought to the forefront significant privacy concerns, notably the leakage of Personally Identifiable Information (PII) and other confidential or protected information that may have been memorized during training, specifically during a fine-tuning or customization process. We describe different black-box attacks from potential adversaries and study their impact on the amount and type of information that may be recovered from commonly used and deployed LLMs. Our research investigates the relationship between PII leakage, memorization, and factors such as model size, architecture, and the nature of attacks employed. The study utilizes two broad categories of attacks: PII leakage-focused attacks (auto-completion and extraction attacks) and memorization-focused attacks (various membership inference attacks). The findings from these investigations are quantified using an array of evaluative metrics, providing a detailed understanding of LLM vulnerabilities and the effectiveness of different attacks. 展开更多
关键词 Large Language Models PII Leakage Privacy Memorization OVERFITTING Membership Inference attack (MIA)
下载PDF
Ensuring Secure Platooning of Constrained Intelligent and Connected Vehicles Against Byzantine Attacks:A Distributed MPC Framework 被引量:1
9
作者 Henglai Wei Hui Zhang +1 位作者 Kamal AI-Haddad Yang Shi 《Engineering》 SCIE EI CAS CSCD 2024年第2期35-46,共12页
This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control fram... This study investigates resilient platoon control for constrained intelligent and connected vehicles(ICVs)against F-local Byzantine attacks.We introduce a resilient distributed model-predictive platooning control framework for such ICVs.This framework seamlessly integrates the predesigned optimal control with distributed model predictive control(DMPC)optimization and introduces a unique distributed attack detector to ensure the reliability of the transmitted information among vehicles.Notably,our strategy uses previously broadcasted information and a specialized convex set,termed the“resilience set”,to identify unreliable data.This approach significantly eases graph robustness prerequisites,requiring only an(F+1)-robust graph,in contrast to the established mean sequence reduced algorithms,which require a minimum(2F+1)-robust graph.Additionally,we introduce a verification algorithm to restore trust in vehicles under minor attacks,further reducing communication network robustness.Our analysis demonstrates the recursive feasibility of the DMPC optimization.Furthermore,the proposed method achieves exceptional control performance by minimizing the discrepancies between the DMPC control inputs and predesigned platoon control inputs,while ensuring constraint compliance and cybersecurity.Simulation results verify the effectiveness of our theoretical findings. 展开更多
关键词 Model predictive control Resilient control Platoon control Intelligent and connected vehicle Byzantine attacks
下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
10
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach 被引量:1
11
作者 Muralitharan Krishnan Yongdo Lim +1 位作者 Seethalakshmi Perumal Gayathri Palanisamy 《Digital Communications and Networks》 SCIE CSCD 2024年第3期716-727,共12页
Existing web-based security applications have failed in many situations due to the great intelligence of attackers.Among web applications,Cross-Site Scripting(XSS)is one of the dangerous assaults experienced while mod... Existing web-based security applications have failed in many situations due to the great intelligence of attackers.Among web applications,Cross-Site Scripting(XSS)is one of the dangerous assaults experienced while modifying an organization's or user's information.To avoid these security challenges,this article proposes a novel,all-encompassing combination of machine learning(NB,SVM,k-NN)and deep learning(RNN,CNN,LSTM)frameworks for detecting and defending against XSS attacks with high accuracy and efficiency.Based on the representation,a novel idea for merging stacking ensemble with web applications,termed“hybrid stacking”,is proposed.In order to implement the aforementioned methods,four distinct datasets,each of which contains both safe and unsafe content,are considered.The hybrid detection method can adaptively identify the attacks from the URL,and the defense mechanism inherits the advantages of URL encoding with dictionary-based mapping to improve prediction accuracy,accelerate the training process,and effectively remove the unsafe JScript/JavaScript keywords from the URL.The simulation results show that the proposed hybrid model is more efficient than the existing detection methods.It produces more than 99.5%accurate XSS attack classification results(accuracy,precision,recall,f1_score,and Receiver Operating Characteristic(ROC))and is highly resistant to XSS attacks.In order to ensure the security of the server's information,the proposed hybrid approach is demonstrated in a real-time environment. 展开更多
关键词 Machine learning Deep neural networks Classification Stacking ensemble XSS attack URL encoding JScript/JavaScript Web security
下载PDF
A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks 被引量:1
12
作者 Abdullah Alsaleh 《Computer Systems Science & Engineering》 2024年第2期431-449,共19页
With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detectin... With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and alerting against malicious activity.IDS is important in developing advanced security models.This study reviews the importance of various techniques,tools,and methods used in IoT detection and/or prevention systems.Specifically,it focuses on machine learning(ML)and deep learning(DL)techniques for IDS.This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles.To speed up the detection of recent attacks,the proposed network architecture developed at the data processing layer is incorporated with a convolutional neural network(CNN),which performs better than a support vector machine(SVM).Processing data are enhanced using the synthetic minority oversampling technique to ensure learning accuracy.The nearest class mean classifier is applied during the testing phase to identify new attacks.Experimental results using the AWID dataset,which is one of the most common open intrusion detection datasets,revealed a higher detection accuracy(94%)compared to SVM and random forest methods. 展开更多
关键词 Internet of Vehicles intrusion detection machine learning unknown attacks data processing layer
下载PDF
A frequency servo SoC with output power stabilization loop technology for miniaturized atomic clocks 被引量:1
13
作者 Hongyang Zhang Xinlin Geng +3 位作者 Zonglin Ye Kailei Wang Qian Xie Zheng Wang 《Journal of Semiconductors》 EI CAS CSCD 2024年第6期13-22,共10页
A frequency servo system-on-chip(FS-SoC)featuring output power stabilization technology is introduced in this study for high-precision and miniaturized cesium(Cs)atomic clocks.The proposed power stabilization loop(PSL... A frequency servo system-on-chip(FS-SoC)featuring output power stabilization technology is introduced in this study for high-precision and miniaturized cesium(Cs)atomic clocks.The proposed power stabilization loop(PSL)technique,incorporating an off-chip power detector(PD),ensures that the output power of the FS-SoC remains stable,mitigating the impact of power fluctuations on the atomic clock's stability.Additionally,a one-pulse-per-second(1PPS)is employed to syn-chronize the clock with GPS.Fabricated using 65 nm CMOS technology,the measured phase noise of the FS-SoC stands at-69.5 dBc/Hz@100 Hz offset and-83.9 dBc/Hz@1 kHz offset,accompanied by a power dissipation of 19.7 mW.The Cs atomic clock employing the proposed FS-SoC and PSL obtains an Allan deviation of 1.7×10^(-11) with 1-s averaging time. 展开更多
关键词 CMOS technology atomic clock phase-locked loop output power stabilization 1PPS
下载PDF
Research on Cyberspace Attack and Defense Confrontation Technology
14
作者 Chengjun ZHOU 《International Journal of Technology Management》 2015年第3期11-14,共4页
This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa... This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development. 展开更多
关键词 Intrusion prevention system attack and defense confrontation attack tracing Active defense
下载PDF
Development and technology status of energy storage in depleted gas reservoirs 被引量:1
15
作者 Jifang Wan Yangqing Sun +4 位作者 Yuxian He Wendong Ji Jingcui Li Liangliang Jiang Maria Jose Jurado 《International Journal of Coal Science & Technology》 EI CAS CSCD 2024年第2期198-221,共24页
Utilizing energy storage in depleted oil and gas reservoirs can improve productivity while reducing power costs and is one of the best ways to achieve synergistic development of"Carbon Peak–Carbon Neutral"a... Utilizing energy storage in depleted oil and gas reservoirs can improve productivity while reducing power costs and is one of the best ways to achieve synergistic development of"Carbon Peak–Carbon Neutral"and"Underground Resource Utiliza-tion".Starting from the development of Compressed Air Energy Storage(CAES)technology,the site selection of CAES in depleted gas and oil reservoirs,the evolution mechanism of reservoir dynamic sealing,and the high-flow CAES and injection technology are summarized.It focuses on analyzing the characteristics,key equipment,reservoir construction,application scenarios and cost analysis of CAES projects,and sorting out the technical key points and existing difficulties.The devel-opment trend of CAES technology is proposed,and the future development path is scrutinized to provide reference for the research of CAES projects in depleted oil and gas reservoirs. 展开更多
关键词 Depleted gas reservoirs technology and development Siting analysis Safety evaluation Compressed air energy storage
下载PDF
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
16
作者 Nisreen Innab Ahmed Abdelgader Fadol Osman +4 位作者 Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh 《Computers, Materials & Continua》 SCIE EI 2024年第7期1325-1345,共21页
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise ... Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise in phishing attacks.Moreover,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to identify.Hence,it is imperative to utilize sophisticated algorithms to address this issue.Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors.Machine learning(ML)approaches can identify common characteristics in most phishing assaults.In this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing datasets.After that,we used the normalization technique on the dataset to transform the range of all the features into the same range.The findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best results.While in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction process.Also,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate. 展开更多
关键词 Social engineering attackS phishing attacks machine learning SECURITY artificial intelligence
下载PDF
EBCache:A Novel Cache-Based Mechanism for Mitigating the Spectre Attacks for RISC-V Processor
17
作者 Wu Dehua Xiao Wan’ang Gao Wanlin 《China Communications》 SCIE CSCD 2024年第12期166-185,共20页
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct... The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping function to translate memory address to the cache address,while the updated-based channel is still vulnerable.In addition,some mitigation strategies are also costly as it needs software and hardware modifications.In this paper,our objective is to devise low-cost,comprehensive-protection techniques for mitigating the Spectre attacks.We proposed a novel cache structure,named EBCache,which focuses on the RISC-V processor and applies the address encryption and blacklist to resist the Spectre attacks.The addresses encryption mechanism increases the difficulty of pruning a minimal eviction set.The blacklist mechanism makes the updated cache lines loaded by the malicious updates invisible.Our experiments demonstrated that the EBCache can prevent malicious modifications.The EBCache,however,reduces the processor’s performance by about 23%but involves only a low-cost modification in the hardware. 展开更多
关键词 cache structure out-of-order execution side-channel attacks the Spectre attacks
下载PDF
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks:An Empirical Study
18
作者 Shahad Alzahrani Hatim Alsuwat Emad Alsuwat 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1635-1654,共20页
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables.However,the reliability and integrity of learned Bayesian network models are highly dependent ... Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables.However,the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams.One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks,wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance.In this research paper,we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms.Our framework utilizes latent variables to quantify the amount of belief between every two nodes in each causal model over time.We use our innovative methodology to tackle an important issue with data poisoning assaults in the context of Bayesian networks.With regard to four different forms of data poisoning attacks,we specifically aim to strengthen the security and dependability of Bayesian network structure learning techniques,such as the PC algorithm.By doing this,we explore the complexity of this area and offer workablemethods for identifying and reducing these sneaky dangers.Additionally,our research investigates one particular use case,the“Visit to Asia Network.”The practical consequences of using uncertainty as a way to spot cases of data poisoning are explored in this inquiry,which is of utmost relevance.Our results demonstrate the promising efficacy of latent variables in detecting and mitigating the threat of data poisoning attacks.Additionally,our proposed latent-based framework proves to be sensitive in detecting malicious data poisoning attacks in the context of stream data. 展开更多
关键词 Bayesian networks data poisoning attacks latent variables structure learning algorithms adversarial attacks
下载PDF
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
19
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
下载PDF
Termite Attack and Damage in Cocoa Plantations in Daloa Department, Central-Western Côte d’Ivoire
20
作者 Yao Martin Siapo Ehui Joachim Ano +1 位作者 Yao Kan Séraphin Diby Annick Yamousso Tahiri 《American Journal of Plant Sciences》 CAS 2024年第10期996-1009,共14页
Cocoa farming faces numerous constraints that affect production levels. Among these constraints are termites, one of the biggest scourges in tropical agriculture and agroforestry. The aim of this study is to assess th... Cocoa farming faces numerous constraints that affect production levels. Among these constraints are termites, one of the biggest scourges in tropical agriculture and agroforestry. The aim of this study is to assess the level of damage caused by termites in cocoa plantations. To this end, 3 plantations were selected. In each of the 3 plantations, 18 plots containing an average of 47 ± 6 cocoa plants were delimited. Sampling was based on 25 cocoa plants per plot. The study consisted in sampling the termites observed on the plants and noting the type of damage caused by them, taking into account the density of the harvest veneers and, above all, the termites’ progress through the anatomical structures of the plant, i.e. the bark, sapwood and heartwood. A total of 8 termite species were collected from cocoa plants. These species are responsible for four types of damage (D1, D2, D3 and D4), grouped into minor damage (D1 and D2) and major damage (D3 and D4). D1 damage ranged from 24.67% ± 5.64% to 39.55% ± 7.43%. D2 damage ranged from 6.88% ± 1.31% to 9.33% ± 2.79%. D3 damage ranged from 2.88% ± 1.55% to 6.44% ± 1.55%. D4 damage ranged from 1.11% ± 1% to 3.11% ± 1.37%. Among the termite species collected, Microcerotermes sp, C. sjostedti, A. crucifer and P. militaris were the most formidable on cocoa trees in our study locality. In view of the extensive damage caused by termites, biological control measures should be considered, using insecticidal plants. 展开更多
关键词 TERMITES attackS DAMAGE Cocoa Trees Côte d’Ivoire
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部