نتایج جستجو برای: malicious
تعداد نتایج: 12653 فیلتر نتایج به سال:
Abstract Everlasting security models the setting where hardness assumptions hold during execution of a protocol but may get broken in future. Due to strength this adversarial model, achieving any meaningful guarantees for composable protocols is impossible without relying on hardware (Müller-Quade and Unruh, JoC’10). For reason, rich line research has tried leverage physical construct well-know...
Federated learning enables clients to collaboratively learn a shared global model without sharing their local training data with cloud server. However, malicious can corrupt the predict incorrect labels for testing examples. Existing defenses against leverage Byzantine-robust federated methods. these methods cannot provably guarantee that predicted label example is not affected by clients. We b...
We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...
Cybercriminals misuse accounts on online services (e.g., webmails and online social networks) to perform malicious activity, such as spreading malicious content or stealing sensitive information. In this paper, we show that accounts that are accessed by botnets are a popular choice by cybercriminals. Since botnets are composed of a finite number of infected computers, we observe that cybercrimi...
Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note I/II and Galaxy Tab 10.1, etc. The malicious application can be distributed and installed on user’s mobile devices through open market after masquerading as a common normal application. An attacker inserts malicious code into an application...
Facebook is the world’s largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine d...
Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research is mainly focused on the study...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید