Using Adversary Text to Detect Adversary Phase Changes
نویسندگان
چکیده
....................................................................................................................... v 1.0 INTRODUCTION ...................................................................................................... 1 1.1 What is Phase Change? ............................................................................................. 1 1.2 Other Work in this Area ........................................................................................... 1 1.3 Selection of Study Group ......................................................................................... 2 2.0 DATA COLLECTION ............................................................................................... 4 3.0 INITIAL ANALYSIS VIA SOM ............................................................................... 5 3.1 Data Sets .................................................................................................................. 5 3.2 Data Processing ........................................................................................................ 5 3.3 Results using Test Data Unseen by the SOM .......................................................... 8 3.4 What Can We Generalize From This? ..................................................................... 9 4.0 STATISTICAL ANALYSIS OF DATA SET AND SOM TECHNIQUE ............... 10 4.1 Bootstrapping ......................................................................................................... 10 4.2 Jackknifing ............................................................................................................. 14 5.0 SUMMARY AND CONCLUSIONS ....................................................................... 17 REFERENCES ................................................................................................................. 20 LIST OF ACRONYMS .................................................................................................... 2
منابع مشابه
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملMulti-robot adversarial patrolling: facing coordinated attacks
The use of robot teams is common for performing patrol tasks, in which the robots are required to repeatedly visit a target area (perimeter, in our case) controlled by an adversary, in order to detect penetrations. Previous work has focused on determining the optimal patrol algorithm when facing a general adversary that tries to penetrate once through the patrol path. There, the robots’ goal is...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کاملEfficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
In this paper, we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of which is under the influence of an all powerful mobile Byzantine adversary. We design a three phase bit optimal PSMT protocol tolerating mobile adversary, whose communication complexity ma...
متن کاملHow to Bypass Verified Boot Security in Chromium OS
Verified boot is an interesting feature of Chromium OS that should detect any modification in the firmware, kernel or the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware and still pass the verified boot process. The expl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011