|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Fahim Sufi
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October...
ver más
|
|
|
|
|
|
|
Haoyu Cheng, Dan Zhao, Nay Lin Oo, Xiran Liu and Xu Dong
Ice accretion is inevitable on fix-wing UAVs (unmanned aerial vehicles) when they are applied to surveillance and mapping over colder climates and arctic regions. Subsequent aerodynamic profile changes have caused the current interest in the better predi...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ...
ver más
|
|
|
|
|
|
|
Kongpei Wu, Huiqin Qu and Conggui Huang
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation...
ver más
|
|
|
|
|
|
|
Mehdi Sadi, Bashir Mohammad Sabquat Bahar Talukder, Kaniz Mishty and Md Tauhidur Rahman
Universal adversarial perturbations are image-agnostic and model-independent noise that, when added to any image, can mislead the trained deep convolutional neural networks into the wrong prediction. Since these universal adversarial perturbations can se...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Pengyue Zhao, Xifeng Gao, Bo Zhao, Huan Liu, Jianwei Wu and Zongquan Deng
The aerodynamic properties of rotor systems operating within low Reynolds number flow field conditions are profoundly influenced by their geometric and flight parameters. Precise estimation of optimal airfoil parameters at different angles of attack is i...
ver más
|
|
|
|
|
|
|
Yudi Xing, Weijie Chen, Xingyu Wang, Fan Tong and Weiyang Qiao
Among the several noise-generation mechanisms of airfoil self-noise, trailing-edge bluntness noise is an important noise source, which is caused by the vortex shedding at blunt trailing edges. A numerical study on airfoil trailing-edge bluntness noise co...
ver más
|
|
|
|
|
|
|
José Jiménez-Varona
Rolling motion is the motion where a body flies at a constant pitch angle a with respect to the freestream velocity vector, while undergoing a constant angular rotation p about its longitudinal axis. An effect of this motion is the appearance of a Magnus...
ver más
|
|
|
|