Attacking the mainline

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacking the OutGuess

In this paper, we describe new methodology for developing steganalytic methods for JPEG images. The proposed framework can be applied to virtually all current methods for JPEGs including OutGuess, F5, and J-Steg. It also enables accurate estimation of the length of the embedded secret message. The methodology is demonstrated on OutGuess 0.2.

متن کامل

Attacking the system

A uto-immune diseases are a major health problem in both developed and developing countries: They cause as many deaths as the leading infectious diseases and exact an even greater toll on patients’ quality of life given their chronic nature (Box 1). Reliable data for all auto-immune diseases are hard to collect, but a 2011 study by the American Autoimmune Related Diseases Association (AARDA) re...

متن کامل

Inference on the Network Evolution in BitTorrent Mainline DHT

Network size is a fundamental statistic for a peer-to-peer system but is generally considered to contain too little information to be useful. However, most existing work only considers the metric by itself and does not explore what features could be extracted from this seemingly trivial metric. In this paper, we show that Fourier transform allows us to extract frequency features from such time ...

متن کامل

Towards a robust traffic timetable for the Swedish Southern Mainline

We identify the on-time performance as a key to evaluate a railway timetable’s robustness to disturbances and evaluate the on-time performance for two single services on the Swedish Southern Mainline for the autumn period 2011. We analyse the punctuality by studying how the performance develops en route. Typically the time spent in the stations is underestimated, which partly is compensated for...

متن کامل

Attacking the combination generator

We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to be resistant to other kinds of attacks. We use only classical tools, namely vectorial correlation, weight 4 multiples and Walsh transform.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1990

ISSN: 0028-0836,1476-4687

DOI: 10.1038/347322a0