نتایج جستجو برای: malicious
تعداد نتایج: 12653 فیلتر نتایج به سال:
Since the advent of the information era, the Internet has brought various positive effects in everyday life. Nevertheless, recently, problems and side-effects have been noted. Internet witch-trials and spread of pornography are only a few of these problems.In this study, problems and causes of malicious replies on internet boards were analyzed, using the key ideas of game theory. The study prov...
One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization’s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is ...
abstract— peer-to-peer ( p2p ) systems have been the center of attention in recent years due to their advantage . since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . this paper investigates the use of genetic ...
wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...
Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system therefore is a potential attack on any other system that it may interact with, which further magn...
In this paper, we investigate Keccak — the cryptographic hash function adopted as the SHA-3 standard. We propose a malicious variant of the function, where new round constants are introduced. We show that for such the variant, collision and preimage attacks are possible. We also identify a class of weak keys for the malicious Keccak working in the MAC mode. Ideas presented in the paper were ver...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید