نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

2012
Steven Myers Mona Sergi Abhi Shelat

We construct a Non-Malleable Chosen Ciphertext Attack (NM-CCA1) encryption scheme from any encryption scheme that is also plaintext aware and weakly simulatable. We believe this is the first construction of a NM-CCA1 scheme that follows strictly from encryption schemes with seemingly weaker or incomparable security definitions to NM-CCA1. Previously, the statistical Plaintext Awareness #1 (PA1)...

2018
Sujit Rokka Chhetri Mohammad Abdullah Al Faruque

Cyber-physical additive manufacturing systems consists of tight integration of cyber and physical domains. This union, however, induces new cross-domain vulnerabilities that pose unique security challenges. One of these challenges is preventing confidentiality breach, caused by physical-to-cyber domain attacks. In this form of attack, attackers utilize the sidechannels (such as acoustics, power...

Journal: :CoRR 2018
Ahmet Cetinkaya Kaito Kikuchi Tomohisa Hayakawa Hideaki Ishii

Multi-agent consensus under jamming attacks is investigated. Specifically, inter-agent communications over a network are assumed to fail at certain times due to jamming of transmissions by a malicious attacker. A new stochastic communication protocol is proposed to achieve finite-time practical consensus between agents. In this protocol, communication attempt times of agents are randomized and ...

2013
Mohammad Karami Damon McCoy

In this paper, we investigate the phenomenon of lowcost DDoS-As-a-Service also known as Booter services. While we are aware of the existence of the underground economy of Booters, we do not have much insight into their internal operations, including the users of such services, the usage patterns, the attack infrastructure, and the victims [6]. In this paper, we present a brief analysis on the o...

Journal: :J. Inf. Sci. Eng. 2011
Gu Hsin Lai Chen-Sen Ouyang Chia-Mei Chen

Wireless sensor networks consist of many tiny sensors with sensing and communication ability. The applications of wireless sensor networks are widely used today in battlefield guard, circumstance monitor, and traffic analysis. Sensor network often carries on mission-critical tasks. Thus, security in sensor network is vital. Wormhole attack may threat the availability of networks by dropping dat...

Journal: :CoRR 2017
Ashish Kundu Zhiqiang Lin Joshua Hammond

All mobile devices are energy-constrained. They use batteries that allows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of service (DoS) type of attacks. While previous studies have analyzed the energy attacks in servers, no existing work has analyzed the energy attacks on mobile devices. As such, in this paper, we present the first syste...

Journal: :Hong Kong medical journal = Xianggang yi xue za zhi 2004
S S W Chan

Authors’ reply: Transient ischaemic attack patients are often underevaluated To the Editor—I read with interest the article by Ng et al in the April 2004 issue of the Hong Kong Medical Journal. Its objective was to issue guidelines for the care of acute stroke patients in Hong Kong. The authors recommended that patients with transient ischaemic attack (TIA) should be referred for fast-track ass...

Journal: :The Israel Medical Association journal : IMAJ 2008
Yifat Linhart Ziva Amitai Matthew Lewis Sofia Katser Anat Sheffer Tamy Shohat

BACKGROUND Food-borne pharyngitis outbreaks causing substantial morbidity have been documented. OBJECTIVES To investigate an outbreak of food-borne Streptococcus beta hemolyticus group A pharyngitis among employees of a hitech company. METHODS We received a report on an unusually high rate of morbidity among employees of a company in September 2003. The Tel Aviv District Health Office condu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید