نتایج جستجو برای: malicious user
تعداد نتایج: 253175 فیلتر نتایج به سال:
In 2009, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environments. They achieved user anonymity by using secure dynamic IDs instead of static IDs. Recently, Hsiang and Shih proposed an improved scheme to fix the security flaws found in Liao-Wang’s scheme. Hsiang and Shih claimed that their scheme maintains the benefits and increases the se...
Today, many end systems are infected with malicious software (malware). Often, infections will last for a long time due to missing (automated) detection or insufficient user knowledge. Even large organizations usually do not have the necessary security staff to handle all affected computers. Obviously, automated infections with malicious software cannot be handled by manual repair; new approach...
collaborative spectrum sensing (css) is an effective approach to improve the detection performance in cognitive radio (cr) networks. inherent characteristics of the cr have imposed some additional security threats to the networks. one of the common threats is primary user emulation attack (puea). in puea, some malicious users try to imitate primary signal characteristics and defraud the cr user...
In the domain of network security, many technologies and tools have been used throughout the years to create and test systems of network intrusion detection system and to test the strengthen of computer security system. One of these is the honeypot. A honeypot appears as a normal part of the network but in actual way it is an isolated environment which monitors the malicious activities in a net...
Malicious Uniform Resource Locators (URLs), or malicious websites, are one of the most common threats to web security. They host unwanted content (spam, malware, inappropriate ads, scams, etc.) Your visit this website may have been prompted by emails, advertisements, searches links from other websites. Either way, user must click on URL. The growing prevalence phishing, spam, and malware has le...
Currently implemented security mechanisms rely on discretionary access control mechanisms. These mechanisms, however, are inadequate to protect against the various kinds of attacks in today's complex environments. The access decisions are based on user identity and ownership. Consequently, these mechanisms are easy to bypass and malicious applications can easily cause failures and breaches in s...
System administrators use application-level knowledge to identify anomalies in virtual appliances (VAs) and to recover from them. This process can be automated through an anomaly detection and recovery system. In this thesis, we claim that application-level policies defined over kernel-level application state can be effective for automatically detecting and mitigating the effects of malicious s...
Malware detection plays a crucial role in cyber-security with the increase malware growth and advancements cyber-attacks. Malicious software applications, or malware, are primary source of many security problems. These intentionally manipulative malicious applications intend to perform unauthorized activities on behalf their originators host machines for various reasons such as stealing advance...
In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol. Keyword: ID-based, Weil-paring, impersonation attack, tripartite authenticated key agreement, unknown key share attack.
We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm. By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید