نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :IJCWT 2012
Renier van Heerden Barry Irwin Ivan D. Burke Louise Leenen

Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly.The authors extend a previous, initial taxonomy of computer network attackswhichforms the b...

2010
Santosh Kumar Swain Durga Prasad Mohapatra C. Braganza N. Kawane A. Andrews O. Pilskalns

We propose an integrated approach to generate test cases from UML sequence and activity diagrams. We first transform these UML diagrams into a graph. Then, we propose an algorithm to generate test scenarios from the constructed graph. Next, the necessary information for test case generation, such as method-activity sequence, associated objects, and constraint conditions are extracted from test ...

2013
Waldo Rocha Flores Hannes Holm Gustav Svensson Göran Ericsson

Threats from social engineering can cause organisations severe damage if they are not considered and managed. In order to understand how to manage those threats, it is important to examine reasons why organisational employees fall victim to social engineering. In this paper, the objective is to understand security behaviours in practice by investigating factors that may cause an individual to c...

2018
V. Ugrinovskii

We consider the distributed $H_\infty$ estimation problem with additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. Using a dynamic modelling of biasing attack inputs, a novel distributed state estimation algorithm is proposed which involves feed...

2012
Marta Gomez-Barrero Javier Galbally Pedro Tome Julian Fiérrez

The vulnerabilities of a standard iris verification system to a novel indirect attack based on a binary genetic algorithm are studied. The experiments are carried out on the iris subcorpus of the publicly available BioSecure DB. The attack has shown a remarkable performance, thus proving the lack of robustness of the tested system to this type of threat. Furthermore, the consistency of the bits...

Journal: :Angewandte Chemie 2021

The inhibition of urease from Sporosarcina pasteurii (SPU) and Canavalia ensiformis (jack bean, JBU) by a class six aromatic poly-hydroxylated molecules, namely mono- dimethyl-substituted catechols, was investigated on the basis inhibitory efficiency catechol scaffold. aim to probe key step mechanism proposed for SPU catechol, sulfanyl radical attack ring, as well obtain critical information ef...

A new two-step implicit linear Obrechkoff twelfth algebraic order method with vanished phase-lag and its first, second, third and fourth derivatives is constructed in this paper. The purpose of this paper is to develop an efficient algorithm for the approximate solution of the one-dimensional radial Schrodinger equation and related problems. This algorithm belongs in the category of the multist...

Journal: :civil engineering infrastructures journal 0
madhuri rahul mulay r.k.n.e.c. engineering college, nagpur, india mahendra s kadu head and professor, r.k.n.e.c. engineering college, nagpur, india sanjay v dahasahasra former member secretary, maharashtra jeevan pradhikaran,(water supply department, government of maharashtra) mumbai, and former president, indian water works association, mumbai, india

water is the most essential component for sustaining lives of humans and other living creatures. supplying potable water with adequate residual pressure is a fundamental responsibility of city administration, which they do during normal conditions. but sometimes, abnormal conditions are formed resulting pressure deficient conditions during the daily operations of water distribution networks. th...

Journal: :IACR Cryptology ePrint Archive 2013
Liran Lerman Gianluca Bontempi Souhaib Ben Taieb Olivier Markowitch

The goal of a profiling attack is to challenge the security of a cryptographic device in the worst case scenario. Though template attack are reputed as the strongest power analysis attack, they effectiveness is strongly dependent on the validity of the Gaussian assumption. This led recently to the appearance of nonparametric approaches, often based on machine learning strategies. Though these a...

Journal: :IACR Cryptology ePrint Archive 2017
Andreas Wiemers Dominik Klein

Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that exploits leakage caused by collisions in between S-Box computations of AES. The attack yields observations from which the AES key can be inferred. Due to noise, an insufficient number of collisions, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید