نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

2007
Andrzej Pacut Adam Czajka Przemek Strzelczyk

We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-serv...

2014
Sujata Ramesh

Cloud computing provides shared resources to various cloud users. All the users share various computing resources e.g., being connected through the same switch, sharing the same data storage and the file systems. Hence the cloud security is the major concern in the cloud computing and has attracted lot of research activities. The most common issue with the cloud computing is the Distributed-Den...

Journal: :The Journal of rheumatology 1995
M B Ferraz B O'Brien

OBJECTIVE To determine in a Canadian health care setting the cost effectiveness of urate lowering drugs (ULD) in the treatment of nontophaceous gouty arthritis with recurrent attacks and to evaluate the least costly regimen among available ULD. METHODS A decision analysis model was designed using hypothetical cohort of patients who present 1 to 4 recurrent attacks/year. It incorporated costs ...

Journal: :CoRR 2015
Anjan K. N. K. Srinath Abraham Jibi

Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build rob...

Journal: :IACR Cryptology ePrint Archive 2010
Yongzhuang Wei Jiqiang Lu Yupu Hu

The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in 2005. In 2008, Demirci and Selçuk gave a meet-in-the-middle attack on 7-round AES under 192 key bits. In 2009, Demirci et al. (incorrectly) described a new meetin-the-middle attack on 7-round AES under 192 key bits. S...

2002
Jeffrey Undercoffer John Pinkston

We have produced an ontology specifying a model of computer attacks. Our ontology is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strategies, and is model is categorized according to: system component targeted, means of attack, consequence of attack and location of attacker. Our analysis indicates that non-kernel space applications are most lik...

Journal: :CoRR 2017
Yujia Liu Weiming Zhang Shaohua Li Nenghai Yu

Deep neural networks (DNNs) have achieved tremendous success in many tasks of machine learning, such as the image classification. Unfortunately, researchers have shown that DNNs are easily attacked by adversarial examples, slightly perturbed images which can mislead DNNs to give incorrect classification results. Such attack has seriously hampered the deployment of DNN systems in areas where sec...

Journal: :Algorithms 2022

Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where attacker is only allowed query trained model and receive an output. Existing methods for creating instances costly, often using gradient estimation or training replacement network. This paper introduces \textbf{Qu}ery-Efficient \textbf{E}volutiona\textbf{ry} \textbf{A...

2011
Mohamed Ahmed Abdelraheem Julia Borghoff Erik Zenner

At IEEE RFID 2011, David et al. proposed a new cryptographic primitive for use with RFID [2]. The design is a stream cipher called A2U2. Shortly afterwards, an attack was published on IACR Eprint by Chai et al. [1], claiming to break the cipher in a chosen-plaintext attack using extremely little computational resources. Regrettably, this attack is wrong since it works with an erroneous descript...

Journal: :Applied Energy 2023

The growing frequencies of extreme weather events and cyber-attacks give rise to a novel threat where malicious cyber actor aims disrupt stressed components critical infrastructure systems immediately before, during, or shortly after an event. In this paper, we initiate the study Compound Cyber–Physical Threats develop two-stage framework for analysis operational disruptions in electric power n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید