نتایج جستجو برای: moving target detector mtd
تعداد نتایج: 550611 فیلتر نتایج به سال:
Memory corruption attacks such as code injection, reuse, and non-control data have become widely popular for compromising safety-critical Cyber–Physical Systems (CPS). Moving target defense (MTD) techniques instruction set randomization (ISR), address space (ASR), (DSR) can be used to protect systems against attacks. CPS often use time-triggered architectures guarantee predictable reliable oper...
Crossfire is an indirect target area link-flooding Distributed Denial of Service (DDoS) attack determined to affect the neighbors real target. Currently, DDoS attacks are acquiring impetus because their indistinguishability and undetectability. SDN (Software Defined Networking) a progressing technique its adaptability programmability. Moving Target Defense (MTD) arising security strategy counte...
The fundamental premise behind Moving Target Defense (MTD) is to create a dynamic and shifting system that is more difficult to attack than a static system because a constantly changing attack surface at least reduces the chance of an attacker finding and exploiting the weakness. However, MTD approaches are typically chosen without regard to other qualities of the system, such as performance or...
Driven by fear of underinvestment in network assets, merchant investment in electricity transmission networks (MTI) is now legally allowed. Given that MTI is a real possibility, regulators face a new set of questions. After classifying different types of MTI, the paper raises and analyses regulatory questions, concentrating on the effect on competition, ownership questions, third-party-access r...
Modern day technology has found its way into every aspect of our lives– be it the server storing our social information, the hand-held smartphones, the home security systems or a remotely monitored pacemaker. Unfortunately, this also increases the opportunity for agents with malicious intent to violate the privacy, availability or integrity of these applications. In fact, with the advancement o...
A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it feasible use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), offer effective security. At the cyber layer, proposed solution based on...
Video synthetic aperture radar (VideoSAR) can detect and identify a moving target based on its shadow. A slowly has shadow with distinct features, but it cannot be detected by state-of-the-art difference-based algorithms because of minor variations between adjacent frames. Furthermore, the detection boxes generated often contain such defects as misalignments fracture. In light these problems, t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید