نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :Applications of Mathematics 1973

Journal: :Scholarpedia 2010

2012
Raja Sekhar L. S. S. Reddy U. J. Kameswari Jan van Leeuwen

Attack pattern system exhibits a unique property of pattern sequential cascading nature which can be identified during the design phase of an application system implementing security scenarios. In this paper a mathematical framework of secure system of attack patterns is presented to verify the stated design specification property along with theoretical back ground work. The framework defines 1...

2008
Gianni Tedesco Uwe Aickelin

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenari...

2010
Jörn-Marc Schmidt Marcel Medwed

Security-aware embedded devices which are likely to operate in hostile environments need protection against physical attacks. For the RSA public-key algorithm, protected versions of the Montgomery powering ladder have gained popularity as countermeasures for such attacks. In this paper, we present a general fault attack against RSA implementations which use the Montgomery powering ladder. In a ...

2010
Jim Lambers

All of the numerical methods that we have developed for solving initial value problems are onestep methods, because they only use information about the solution at time tn to approximate the solution at time tn+1. As n increases, that means that there are additional values of the solution, at previous times, that could be helpful, but are unused. Multistep methods are time-stepping methods that...

2004
Alefiya Hussain John Heidemann Christos Papadopoulos

Once an attacker has compromised a set of machines, typically, he will repeatedly deploy the same set of machines to attack different targets. In this paper, we propose a method to identify repeated attack scenarios, that is, the combination of a particular set of hosts and attack tool, by making use of pattern recognition techniques. While previous methods have focused on intrusion detection u...

Journal: :iranian journal of mathematical chemistry 2013
a. shokri abbas ali shokri

in this paper, we introduce the new class of implicit l-stable generalized hybrid methods forthe numerical solution of first order initial value problems. we generalize the hybrid methodswith utilize ynv directly in the right hand side of classical hybrid methods. the numericalexperimentation showed that our method is considerably more efficient compared to wellknown methods used for the numer...

2001
Dimitrios Psaltis

The illumination of an accretion disk around a black hole or neutron star by the central compact object or the disk itself often determines its spectrum, stability, and dynamics. The transport of radiation within the disk is in general a multi-dimensional, non-axisymmetric problem, which is challenging to solve. Here, I present a method of decomposing the two-dimensional radiative transfer equa...

2015
Harm Vanseijen Rich Sutton

In reinforcement learning, the notions of experience replay, and of planning as learning from replayed experience, have long been used to find good policies with minimal training data. Replay can be seen either as model-based reinforcement learning, where the store of past experiences serves as the model, or as a way to avoid a conventional model of the environment altogether. In this paper, we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید