نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

2012
Frank Yeong-Sung Lin Pei-Yu Chen Quen-Ting Chen

In this paper, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contest success function with the DOD metric would be used to evaluate the damage degree of network. The larger value of the Average DOD, the more damage degree of the network would be. An attack-defense scenario as a math...

2005
Marco Bucci Raimondo Luzzi

In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for the proposed class of generators, the verification of a minimum entropy limit can be performed directly on the post-processed random numbers thus not requiring a good statistic quality for the noise source itself, provided that ...

Journal: :JDCTA 2010
Liming Fang Willy Susilo Yongjun Ren Chunpeng Ge Jiandong Wang

A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption schemes have been found useful in many applications, including e-mail forwarding, law-enforcement monitoring, and content distribution. Libert and Vergnaud presented the first construction of unidirectional proxy re-encryption scheme with chosen ciphertext security in the...

2015
Mevlut Turker Garip Mehmet Emre Gursoy Peter Reiher Mario Gerla

The increasing popularity and acceptance of VANETs will make the deployment of autonomous vehicles easier and faster since the VANET will reduce dependence on expensive sensors. However, these benefits are counterbalanced by possible security attacks. We demonstrate a VANET-based botnet attack in an autonomous vehicle scenario that can cause serious congestion by targeting hot spot road segment...

Journal: :IJDCF 2010
B. R. Matam David Lowe

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based waterm...

Journal: :acta medica iranica 0
j.lotfi

detection and modification of the risk factors of stroke may be the most effective strategy for preventing its often irreversible consequences. a longitudinal prospective study was implemented to evaluate the effect of several risk factors on the course of cerebrovascular disease. the study groups were composed of 3s8 normal volunteers, and 308 patients with transient ischemic attacks. the two ...

Journal: :Information Sciences 2023

Recently, 3D deep learning models have been shown to be susceptible adversarial attacks like their 2D counterparts. Most of the state-of-the-art (SOTA) perform perturbation point clouds. To reproduce these in physical scenario, a generated cloud needs reconstructed mesh, which leads significant drop its effect. In this paper, we propose strong attack named Mesh Attack address problem by directl...

Journal: :J. Internet Serv. Inf. Secur. 2016
Asem Kitana Issa Traoré Isaac Woungang

This paper studies the impact of a mobile botnet on a Long Term Evolution (LTE) network by implementing a mobile botnet architecture that initiates a Distributed Denial of Service (DDoS) attack. To understand the behavior of the mobile botnet, a correlation between the mobile devices’ mobility and the DDoS attack is established. Real traces of taxi cabs are used to simulate the mobile devices’ ...

Journal: :IJCNS 2009
Slim Rekhis Jihène Krichène Noureddine Boudriga

Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response...

2004
Nick Mathewson Roger Dingledine

We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis attacks against anonymous message systems, by describing how an eavesdropper can learn sender-receiver connections even when the substrate is a network of pool mixes, the attacker is non-global, and senders have complex behavior or generate padding messages. Additionally, we describe how an attack...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید