نتایج جستجو برای: masquerade syndrome
تعداد نتایج: 622609 فیلتر نتایج به سال:
Anaplastic large cell lymphoma accounts for less than 10% cases of all lymphomas. It is a distinct category of large cell lymphomas that shows strong expression of CD30. The reproducibility of ALCL on the morphological ground is poor and at times it may mimic other non-lymphoid malignancies. The cytomorphology of anaplastic large cell lymphoma (ALCL) is distinctive yet variable. Till date only ...
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can be very difficult to detect. Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior, as represented by user profiles based on users’ command histories...
We extend prior research on masquerade detection using UNIX commands issued by users as the audit source. Previous studies using multi-class training requires gathering data from multiple users to train specific profiles of self and non-self for each user. Oneclass training uses data representative of only one user. We apply one-class Naïve Bayes using both the multivariate Bernoulli model and ...
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Chang’s scheme to a forgery attack, where an attacker can easily masquerade other legal users to access the resources at a remote system and then presents an simple solution to isolate such a problem.
We report a 13-month-old girl with primary intrarenal neuroblastoma initially diagnosed as Wilms' tumor. Intrarenal neuroblastoma is exceedingly rare in pediatric age that may masquerade as Wilms' tumor clinically and radiographically and it is important to differentiate for management.
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by presenting one-class Hellinger distance-based and one-class SVM modeling techniques that use a set of novel featur...
In this paper, some typical wireless attacks are considered, such as masquerade attack, black hole attack and replay attacks. To against the attacks which threat seriously security of Ad Hoc network, a new authentication scheme is proposed. The proposed scheme involves three main stages. Some advantages and drawbacks are discussed compared with other solutions presented in previous researches.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید