-
1
-
2
-
3
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
4
New collaborative DDoS defense technology based on NFV
Published 2019-04-01“…Simulation results show that the new collaborative DDoS attack defense technology outperforms existing solutions in terms of packet loss rate, cooperation, and resource allocation rate, improving the effectiveness of DDoS attack defense.…”
Get full text
Article -
5
Review of Artificial Intelligence Adversarial Attack and Defense Technologies
Published 2019-03-01“…This paper aims to comprehensively summarize the latest research progress on adversarial attack and defense technologies in deep learning. According to the target model’s different stages where the adversarial attack occurred, this paper expounds the adversarial attack methods in the training stage and testing stage respectively. …”
Get full text
Article -
6
Explaining the Role of Strategic Planning in Future Defense Technology Development
Published 2016-08-01“…Then by using the SWOT analysis, the competitive, adaptive and defensive strategies affecting the growth and development of future defense technology were explained and the position of the defense industry was analyzed in order to employ the most effective strategies.…”
Get full text
Article -
7
Roadmap Modeling and Assessment Approach for Defense Technology System of Systems
Published 2018-06-01Subjects: “…defense technology…”
Get full text
Article -
8
Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review
Published 2021-12-01Get full text
Article -
9
Computer Security Active Defense Technology Based on Bayesian Model
Published 2023-07-01“…The existing active defense technology based on game theory is mainly based on static games. …”
Get full text
Article -
10
U.S.-Japan Defense Technology Cooperation: Ten Guidelines to Make It Work
Published 2011Get full text
Working Paper -
11
5th International Conference OTEH 2012 - defense technology (Proceedings review)
Published 2013-02-01“…<p>This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI), from 18<sup>th</sup> to 19<sup>th</sup> September 2012.…”
Get full text
Article -
12
Analysis of future trends in defense technologies over a ten-year horizon
Published 2022-02-01Subjects: Get full text
Article -
13
Strategic foresight for defensive technologies in the field of Army Air Defense of the Islamic Republic of Iran on 1420 horizon
Published 2019-11-01“…This paper aims to review and analyze the foundations, concepts, definitions and models of foresight and strategic foresight provided by experts, in order to extract the dimensions, components and key items and finally intreduce steps of strategic foresight for defensive technology in the field of army air defense of the Islamic Republic of Iran. …”
Get full text
Article -
14
Designing a strategic foresight framework for defensive technologies in the field of air defense using interpretive structural modeling
Published 2020-05-01“…For this purpose, by using an interpretive structural modeling method, the opinion of 25 experts was received, and within seven steps of ISM method, each of the stages of the strategic foresight framework of air defense technologies were sorted. According to the output of interpretive structural models, The pre-foresight step includes Five levels and thirteen steps, the specifying inputs step includes nine levels and seventeen steps, the foresight step includes five levels and eleven steps, the output step includes two levels and seven steps and the step of developing strategies includes four levels and ten steps. …”
Get full text
Article -
15
-
16
-
17
The Mediating Effects of Adaptability Culture on the Relationship Between Transformational Leadership and Organizational Innovation (The Case of Selected Firms in Supply Chain of Defense Technologies
Published 2011-12-01“…Hence this study attempts to investigate the impact of transformational leadership and adaptability culture upon organizational innovation in the context of selected firms in supply chain of defense technologies. Using the structural equation modeling technique, results from the analysis of data from 217 collected questionnaires indicate that transformational leadership, beyond its direct influence, exerts indirect impact upon organizational innovation through the mediation of adaptability culture and that the extent of indirect effect is significantly higher than that of direct one. …”
Get full text
Article -
18
-
19
Strategic Role of Amphibious Assault Rifles in the Operating Environments of Maritime, Coastal, Underwater, and Land Areas in Advancing Defense Technology to Support National Resilience
Published 2023-12-01“…This study investigates their significance in advancing defense technology and contributing to national resilience. …”
Get full text
Article -
20