نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

Journal: :journal of research in medical sciences 0
ozge basaran nermin uncu banu acar celikel fatma ayd?n nilgun cakar

background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...

Journal: :Lecture Notes in Computer Science 2021

With the advent of deep learning era, Fingerprint-based Authentication Systems (FAS) equipped with Fingerprint Presentation Attack Detection (FPAD) modules managed to avoid attacks on sensor through artificial replicas fingerprints. Previous works highlighted vulnerability FPADs digital adversarial attacks. However, in a realistic scenario, attackers may not have possibility directly feed digit...

2003
EVGENI ANDREEV

The paper presents the first ever demographic scenarios for the regions of Russia. Scenarios are developed for 49 ohlusts (regions), six kruys (territories), 21 republics, one autonomous oblast and two national cities, Moscow and St. Petersburg. Five scenarios are considered: two optimistic scenarios, two medium scenarios and one pessimistic scenario. The scenarios are combinations of three mor...

Journal: :IEEE Access 2023

Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks. More sophisticated apply machine learning abnormal behavior. Nevertheless, a growing number successful attacks the increasing ingenuity attackers prove that these are insufficient. This paper introduce...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

2011
Varun Dutt Young-Suk Ahn Cleotilde Gonzalez

In a corporate network, the situation awareness (SA) of a security analyst is of particular interest. A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or organized cyber-attacks. The current work describes a cognitive Instance-based Learning (IBL...

2013
Ashish Joshi Ram Shringar Raw Prakash Rao Ragiri

Vehicular Ad-hoc Networks (VANETs) are highly dynamic network and prone to many kinds of attacks. One class of attacks known as routing misbehavior targets the routing process of the networks. Grayhole attack is a malicious change in the routing process of effected nodes. Such node takes part in routing process but drops the packet when it is required to forward the packet to other nodes. This ...

Journal: :IACR Cryptology ePrint Archive 2013
Mohsen Shakiba Mohammad Dakhilalian Hamid Mala

Biclique attack, is a new cryptanalytic technique which brings new tools from the area of hash functions to the area of block cipher cryptanalysis. Till now, this technique is the only one able to analyze the full-round AES cipher in a single key scenario. In this paper, we introduce non-isomorphic biclique attack, a modified version of the original biclique attack. In this attack we obtain iso...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید