نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
We provide an adversarial risk analysis framework for batch acceptance problems in which a decision maker relies exclusively on the size of to accept or reject its admission system, albeit being aware presence opponent. The adversary acts as data-fiddler attacker perturbing observations perceived by through injecting faulty items and/or modifying existing ones. develop optimal policies against ...
Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. While there are many types of security attacks in WSNs, we have decided to focus our analysis on a particularl...
With ever increasing application of information technologies in every day activities, organizations face the need for applications that provides better security. The existence of complex IT systems with multiple interdependencies creates great difficulties for Chief Security Officers to comprehend and be aware of all potential risks in such systems. Intelligent decision making for IT security i...
Recently a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high-profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from usi...
In On-demand routing protocols for wireless ad-hoc networks, whenever communication is needed, source discovers route for data delivery to destination. Blackhole attackers exploit the on demand route discovery process and data delivery by dropping the packets which are supposed to be forwarded by them. In this paper, we have proposed an enhanced AODV routing protocol, CAT-AODV-B (Context Aware ...
With a major change in the attack landscape, away from well known attack vectors towards unique and highly tailored attacks, limitations of common ruleand signature-based security systems become more and more obvious. Novel security mechanisms can provide the means to extend existing solutions in order to provide a more sophisticated security approach. As critical infrastructures get increasing...
Asthma is a disease of civilisation par excellence. Its increasing incidence is cause for concern and several teams working around the world are attempting to untangle the complexity of its causes. The University of Liège has made a small step towards this understanding by identifying a protease whose role may prove to be very interesting ... Asthma may be defined as a reversible obstruction of...
Developing a systematic understanding of the attack surface of emergent networks, such as software-defined networks (SDNs), is necessary and arguably the starting point toward making it more secure. Prior studies have largely relied on ad hoc empirical methods to evaluate the security of various SDN elements from different perspectives. However, they have stopped short of converging on a system...
-VANETs are the vehicular networks used to connect the vehicles together to share their information with each other in the cluster. The hackers are used to attack VANETs with various means of attacks. Many security techniques are used to mitigate the risks caused by the attacks to cause ill-effects to the traffic movement on the roads. VANETs are also being used for the automatically driven veh...
Ransomware attacks are emerging as a major source of malware intrusion in recent times. While so far ransomware has affected general-purpose adequately resourceful computing systems, there is visible shift towards low-cost Internet Things systems which tend to manage critical endpoints industrial systems. Many prediction techniques proposed but need for more suitable constrained heterogeneous I...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید