نتایج جستجو برای: malicious user

تعداد نتایج: 253175  

Journal: :JCIT 2010
Bae-Ling Chen Wen-Chung Kuo Yu-Shuan Chu

In 2009, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environments. They achieved user anonymity by using secure dynamic IDs instead of static IDs. Recently, Hsiang and Shih proposed an improved scheme to fix the security flaws found in Liao-Wang’s scheme. Hsiang and Shih claimed that their scheme maintains the benefits and increases the se...

2006
Jochen Kaiser Alexander Vitzthum Peter Holleczek Falko Dressler

Today, many end systems are infected with malicious software (malware). Often, infections will last for a long time due to missing (automated) detection or insufficient user knowledge. Even large organizations usually do not have the necessary security staff to handle all affected computers. Obviously, automated infections with malicious software cannot be handled by manual repair; new approach...

Journal: :amirkabir international journal of electrical & electronics engineering 2015
a.a. sharifi m. sharifi m.j. musevi niya

collaborative spectrum sensing (css) is an effective approach to improve the detection performance in cognitive radio (cr) networks. inherent characteristics of the cr have imposed some additional security threats to the networks. one of the common threats is primary user emulation attack (puea). in puea, some malicious users try to imitate primary signal characteristics and defraud the cr user...

2015
Sanjeev Kumar Amandeep kaur

In the domain of network security, many technologies and tools have been used throughout the years to create and test systems of network intrusion detection system and to test the strengthen of computer security system. One of these is the honeypot. A honeypot appears as a normal part of the network but in actual way it is an isolated environment which monitors the malicious activities in a net...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

Malicious Uniform Resource Locators (URLs), or malicious websites, are one of the most common threats to web security. They host unwanted content (spam, malware, inappropriate ads, scams, etc.) Your visit this website may have been prompted by emails, advertisements, searches links from other websites. Either way, user must click on URL. The growing prevalence phishing, spam, and malware has le...

2002
Miroslaw Zakrzewski Ibrahim Haddad

Currently implemented security mechanisms rely on discretionary access control mechanisms. These mechanisms, however, are inadequate to protect against the various kinds of attacks in today's complex environments. The access decisions are based on user identity and ownership. Consequently, these mechanisms are easy to bypass and malicious applications can easily cause failures and breaches in s...

2014
Prashanth Nayak Eric Eide John Regehr Jacobus Van der Merwe

System administrators use application-level knowledge to identify anomalies in virtual appliances (VAs) and to recover from them. This process can be automated through an anomaly detection and recovery system. In this thesis, we claim that application-level policies defined over kernel-level application state can be effective for automatically detecting and mitigating the effects of malicious s...

Journal: :International Journal For Multidisciplinary Research 2023

Malware detection plays a crucial role in cyber-security with the increase malware growth and advancements cyber-attacks. Malicious software applications, or malware, are primary source of many security problems. These intentionally manipulative malicious applications intend to perform unauthorized activities on behalf their originators host machines for various reasons such as stealing advance...

Journal: :IACR Cryptology ePrint Archive 2005
Jue-Sam Chou Chu-Hsing Lin Chia-Hung Chiu

In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol. Keyword: ID-based, Weil-paring, impersonation attack, tripartite authenticated key agreement, unknown key share attack.

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Ruggero Lanotte Andrea Maggiolo-Schettini Angelo Troina

We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm. By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید