نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

2010
Deepak Singh Tomar S. C. Shrivastava

In Web environment a major challenge facing by the law enforcing agency is to collect accurate & effective evidences from the growing volumes of crime data. In cyber space multi-step attack involve group of action where some of these actions may be legitimate but when combine together constitute malicious activity. Code injection attack is a type of multi step attack which may be carried out by...

Journal: :CoRR 2016
Ming Pang Wei Gao Min Tao Zhi-Hua Zhou

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

Journal: :JCIT 2009
Mamoun Hussein Mamoun

The dynamic topology of Mobile ad hoc Network {MANET) allows nodes to join and leave the network at any point of time. This dynamic property of MANET has rendered it vulnerable to passive and active attacks by malicious nodes. In this paper we propose a new trust based relationship among the nodes to combat the packet dropping attack. In our scheme we considered the Dynamic Source Routing (DSR)...

Journal: :CoRR 2012
Jaydip Sen

A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, a...

Journal: :International Journal of Computer Applications 2010

2015
Taolue Chen Florian Kammüller Ibrahim Nemli Christian W. Probst

Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework fi...

2015
Chirag R. Desai Narendra M. Shekokar

Internet is a platform which is mostly used to spread malicious software and viruses on the network. The drive by download (DBD) is most successful and popular attack invented by web site attacker till date. Drive by download attack enables the victims to click coded malicious links and the browser will be redirected to malicious web sites to exploit vulnerabilities, and also it installs softwa...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

2011
Tak Man Desmond Lee David E. Keyes Xiangliang Zhang

Shilling Attack Prevention for Recommender Systems Using Social-based Clustering Tak Man Desmond Lee A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for reco...

2013
S. Krishnaveni

Malicious code is a way of attempting to acquire sensitive information by sending malicious code to the trustworthy entity in an electronic communication. JavaScript is the most frequently used command language in the web page environment. If the hackers misuse the JavaScript code there is a possibility of stealing the authentication and confidential information about an organization and user. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید