91   Artículos

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Fahim Sufi    
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October... ver más
Revista: Information    Formato: Electrónico

 
en línea
Haoyu Cheng, Dan Zhao, Nay Lin Oo, Xiran Liu and Xu Dong    
Ice accretion is inevitable on fix-wing UAVs (unmanned aerial vehicles) when they are applied to surveillance and mapping over colder climates and arctic regions. Subsequent aerodynamic profile changes have caused the current interest in the better predi... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Mazen Gazzan and Frederick T. Sheldon    
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kongpei Wu, Huiqin Qu and Conggui Huang    
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mehdi Sadi, Bashir Mohammad Sabquat Bahar Talukder, Kaniz Mishty and Md Tauhidur Rahman    
Universal adversarial perturbations are image-agnostic and model-independent noise that, when added to any image, can mislead the trained deep convolutional neural networks into the wrong prediction. Since these universal adversarial perturbations can se... ver más
Revista: Information    Formato: Electrónico

 
en línea
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang    
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Pengyue Zhao, Xifeng Gao, Bo Zhao, Huan Liu, Jianwei Wu and Zongquan Deng    
The aerodynamic properties of rotor systems operating within low Reynolds number flow field conditions are profoundly influenced by their geometric and flight parameters. Precise estimation of optimal airfoil parameters at different angles of attack is i... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Yudi Xing, Weijie Chen, Xingyu Wang, Fan Tong and Weiyang Qiao    
Among the several noise-generation mechanisms of airfoil self-noise, trailing-edge bluntness noise is an important noise source, which is caused by the vortex shedding at blunt trailing edges. A numerical study on airfoil trailing-edge bluntness noise co... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
José Jiménez-Varona    
Rolling motion is the motion where a body flies at a constant pitch angle a with respect to the freestream velocity vector, while undergoing a constant angular rotation p about its longitudinal axis. An effect of this motion is the appearance of a Magnus... ver más
Revista: Aerospace    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »