نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

Journal: :Des. Codes Cryptography 2011
Jiqiang Lu

The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005. Impossible differential cryptanalysis and the boomerang attack are powerful variants of differential cryptanalysis for analysing the security...

Journal: :Cybersecurity: Education, Science, Technique 2021

2003
Van-Thinh Vu François Brémond Monique Thonnat

This paper presents a new scenario recognition algorithm for Video Interpretation. We represent a scenario model with the characters involved in the scenario, with its sub-scenarios and with the constraints combining the subscenarios. By pre-compiling the scenario models, the recognition algorithm processes temporal constraints by decomposing complex scenarios into intermediate sub-scenarios to...

2014
Moritz August

Virtualization has become of increasing importance for the security of embedded systems during the last years. One of the major threats to this security is posed by side channel attacks. In this work, Bernstein’s time-driven cache-based timing attack against AES is revisited in a virtualization security scenario and the PikeOS micro kernel system is presented. A novel countermeasure against tim...

2001
Oliver M. Dain Robert K. Cunningham

We describe a realtime algorithm for combining the alerts produced by several heterogeneous intrusion detection sensors into scenarios. Each scenario represents a sequence of actions performed by a single actor or organization. Our algorithm, which is probabilistic in nature, can determine the scenario membership of a new alert in time proportional to the number of candidate scenarios. It is ca...

Journal: :EURASIP J. Wireless Comm. and Networking 2016
Su Yao Jianfeng Guan Hongke Zhang

Large-scale failures triggered by undesirable events such as natural disasters, massive power malfunction, and malicious attacks are attracting serious concerns in communication network infrastructure perspective. However, there have been few survivability strategy analyses in network mobility (NEMO) scenarios. To properly address this issue, this paper proposes two novel survivability strategi...

Journal: :Computer Communications 2006
Wei Yan Edwin S. H. Hou Nirwan Ansari

Internet has grown by several orders of magnitude in recent years, and this growth has escalated the importance of computer security. Intrusion Detection System (IDS) is used to protect computer networks. However, the overwhelming flow of log data generated by IDS hamper security administrators from uncovering the hidden attack scenarios. Therefore, the autonomic IDS event analysis system is es...

2007
Alex Biryukov Andrey Bogdanov Dmitry Khovratovich Timo Kasper

Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this...

2016
Minsu Jo mi Baek Jin-hee Lee Sang Hyuk Son

In this paper, we analyze the performance various sensor fusion models using an unmanned ground vehicle. In a given attack scenario, we examine how attacks influence on each fusion model by comparing the results of different models We conduct the experiments with real measurement data obtained from an unmanned ground vehicle. Keywords— Sensor Fusion Model; Attack; Resiliency

Journal: :Emerging Infectious Diseases 1997
A. F. Kaufmann M. I. Meltzer G. P. Schmid

Understanding and quantifying the impact of a bioterrorist attack are essential in developing public health preparedness for such an attack. We constructed a model that compares the impact of three classic agents of biologic warfare (Bacillus anthracis, Brucella melitensis, and Francisella tularensis) when released as aerosols in the suburb of a major city. The model shows that the economic imp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید