A fully featured command line tool for post-exploitation operations on Microsoft SQL Server instances. Provides RCE (Remote Code Execution), privilege escalation, persistence, evasion, and cleanup ...
Abstract: An incremental iterative Q-learning algorithm (IIQLA) is proposed to tackle the optimal secure control problem for cyber-physical systems under false data injection attacks. Within a ...
A popular WordPress quiz plugin can be abused to mount SQL injection attacks ...
Abstract: This article studies the energy management (EM) problem for smart grids subjected to false data injection attacks (FDIAs), in which line transmission losses are also considered. First, based ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results