نتایج جستجو برای: multistep attack scenario
تعداد نتایج: 176512 فیلتر نتایج به سال:
In this study, morphological analysis is used to develop a framework for proactively assessing the risk of a terrorist attack on the air transportation system. Morphological analysis, a first order method pioneered by Fritz Zwicky, is employed to exhaustively create possible attack scenarios. Morphological analysis is then used to assess the likelihood of each scenario. Given a consequence esti...
Attackers have come to leverage exploits precipitated by system vulnerabilities and lapses by using malware which otherwise tends to be noisy as it generates unusual network traffic and system calls. Such noise is usually captured by intrusion detection systems. Therefore, malware-free intrusions which generate little noise if any at all, are especially attractive to APT actors because they cov...
LBlock is a lightweight block cipher proposed in ACNS 2011. It has 64-bit block size and 80-bit key size which is the typical parameter setting accpeted by most of the recent proposed lightweight block ciphers. It has fast hardware implementation efficiency and it still remains rather secure considering the recent results and the security margin it provides. In this paper, we investigate the di...
Consider the well-known oracle attack: somehow one gets a certain computation result as a function of a secret key from the secret key owner and tries to extract some information on the secret key. This attacking scenario is well understood in the cryptographic community. However, there are many protocols based on the discrete logarithm problem that turn out to leak many of the secret key bits ...
Chain-growth and step-growth polymerizations are the two main mechanisms that classically used to synthesize polymers. In this article, a third approach is usually not listed in polymer textbooks described, namely multistep growth “polymerization.” This synthetic strategy does proceed one pot as aforementioned ones but relies on series of distinct chemical reactions. It includes different types...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
This paper presents a scheme for detecting anomalous power consumption patterns attack using wavelet transform and artificial neural network for smart grid. The main procedure of the proposed algorithm consists of following steps: I) Creating normal and anomaly patterns of power consumption to train the proposed method. II) Wavelet transform is applied on power consumption patterns to extract f...
Mobile Adhoc Networks have become a part and parcel of technology advancements due to its working as autonomous system. MANET networks are vulnerable to various types of attacks and threats due to its unique characteristics like dynamic topology, Shared physical medium, distributed operations and many more. There are many attacks which effect the functioning of MANETS’ such as denial of service...
The aim of the minimization analysis of network attack graphs (NAGs) is to nd a minimum critical set of exploits so that by preventing them an intruder cannot reach his goal using any attack scenario. This problem is, in fact, a constrained optimization problem. In this paper, a binary particle swarm optimization algorithm, called SwarmNAG, is presented for the minimization analysis of large-sc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید