نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

Journal: :CoRR 2018
Chawin Sitawarin Arjun Nitin Bhagoji Arsalan Mosenia Prateek Mittal Mung Chiang

We propose a new real-world attack against the computer vision based systems of autonomous vehicles (AVs). Our novel Sign Embedding attack exploits the concept of adversarial examples to modify innocuous signs and advertisements in the environment such that they are classified as the adversary’s desired traffic sign with high confidence. Our attack greatly expands the scope of the threat posed ...

Journal: :IJGUC 2013
Yuanyuan Zhang Marine Minier

Packet pollution attack is considered as the most threatening attack model against network coding based sensor networks. A widely held belief says that, in a single source multi-destination dissemination scenario, the total number of polluted packets in the network will grow with the length of the transmission path, and the decoding failure (DF) rate at the further destination nodes are relativ...

2015
Ajay Sharma

Wireless and ad hoc are the striking networks these days in which many researchers are working. Basically Wireless or mobile networks are emerged to replace the wired networks from traditional scenario to new paradigm. The next trend of wireless network is quite differ than conventional wired network in many ways viz. infrastructure, cost, capacity, adaptability, easy to operate, schematizing r...

2011
Massimiliano Albanese Sushil Jajodia Andrea Pugliese V. S. Subrahmanian

Attack graphs have been widely used for attack modeling, alert correlation, and prediction. In order to address the limitations of current approaches – scalability and impact analysis – we propose a novel framework to analyze massive amounts of alerts in real time, and measure the impact of current and future attacks. Our contribution is threefold. First, we introduce the notion of generalized ...

2009
Thomas Plantard Willy Susilo

In 1988, H̊astad proposed the classical broadcast attack against public key cryptosystems. The scenario of a broadcast attack is as follows. A single message is encrypted by the sender directed for several recipients who have different public keys. By observing the ciphertexts only, an attacker can derive the plaintext without requiring any knowledge of any recipient’s secret key. H̊astad’s attac...

Journal: :Electronic proceedings in theoretical computer science 2021

Blockchain technology has developed significantly over the last decade. One of reasons for this is its sustainability architecture, which does not allow modification history committed transactions. That means that developers should consider blockchain vulnerabilities and eliminate them before deployment system. In paper, we demonstrate a statistical model checking approach verification systems ...

2015
Gopakumaran T. Thampi Amol C. Adamuthe

Computational technologies are changing rapidly due to fast and huge demand for computational power for variety of applications, societal factors and advances in science and technology. It is difficult to forecast exact nature of future computational technologies due to multiple and dynamic factors influencing technology advances. The paper focuses on computational technology trend from macro p...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2007
H Rosoff D von Winterfeldt

This article analyzes possible terrorist attacks on the ports of Los Angeles and Long Beach using a radiological dispersal device (RDD, also known as a "dirty bomb") to shut down port operations and cause substantial economic and psychological impacts. The analysis is an exploratory investigation of a combination of several risk analysis tools, including scenario generation and pruning, project...

2013
Florian Arnold Wolter Pieters Mariëlle Stoelinga

Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Thus, penetration testing has so far been used as a qualitative research method. To enable quantitative approaches to security risk management, including decision support based on the cost-effectiveness of countermeasures, one needs quantitative meas...

Journal: :Expert Syst. Appl. 2014
Joseph K. Liu Tsz Hon Yuen Man Ho Au Willy Susilo

In a recent paper, Shim (2012) presented a very interesting authentication scheme for vehicular sensor networks. Shim claimed that the scheme is secure against the highest adopted level of attack, namely the chosen-message attack (CID-CMA). Nevertheless, we find that the proof in Shim's paper does not actually prove that the scheme is secure in this level. Instead, it can only ensure that the s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید