نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

2012
Ajay Sharma Rajesh Babu Ahirwar Smita Patil

A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the wired networks from traditional scenario to new paradigm. The mobile ad hoc networks are purely infrastructure less network. Due to this vulnerabilities of the network are unprotected ...

Journal: :IJCWT 2012
Renier van Heerden Barry Irwin Ivan D. Burke Louise Leenen

Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly.The authors extend a previous, initial taxonomy of computer network attackswhichforms the b...

2013
Waldo Rocha Flores Hannes Holm Gustav Svensson Göran Ericsson

Threats from social engineering can cause organisations severe damage if they are not considered and managed. In order to understand how to manage those threats, it is important to examine reasons why organisational employees fall victim to social engineering. In this paper, the objective is to understand security behaviours in practice by investigating factors that may cause an individual to c...

2018
V. Ugrinovskii

We consider the distributed $H_\infty$ estimation problem with additional requirement of resilience to biasing attacks. An attack scenario is considered where an adversary misappropriates some of the observer nodes and injects biasing signals into observer dynamics. Using a dynamic modelling of biasing attack inputs, a novel distributed state estimation algorithm is proposed which involves feed...

2012
Marta Gomez-Barrero Javier Galbally Pedro Tome Julian Fiérrez

The vulnerabilities of a standard iris verification system to a novel indirect attack based on a binary genetic algorithm are studied. The experiments are carried out on the iris subcorpus of the publicly available BioSecure DB. The attack has shown a remarkable performance, thus proving the lack of robustness of the tested system to this type of threat. Furthermore, the consistency of the bits...

Journal: :civil engineering infrastructures journal 0
madhuri rahul mulay r.k.n.e.c. engineering college, nagpur, india mahendra s kadu head and professor, r.k.n.e.c. engineering college, nagpur, india sanjay v dahasahasra former member secretary, maharashtra jeevan pradhikaran,(water supply department, government of maharashtra) mumbai, and former president, indian water works association, mumbai, india

water is the most essential component for sustaining lives of humans and other living creatures. supplying potable water with adequate residual pressure is a fundamental responsibility of city administration, which they do during normal conditions. but sometimes, abnormal conditions are formed resulting pressure deficient conditions during the daily operations of water distribution networks. th...

Journal: :IACR Cryptology ePrint Archive 2013
Liran Lerman Gianluca Bontempi Souhaib Ben Taieb Olivier Markowitch

The goal of a profiling attack is to challenge the security of a cryptographic device in the worst case scenario. Though template attack are reputed as the strongest power analysis attack, they effectiveness is strongly dependent on the validity of the Gaussian assumption. This led recently to the appearance of nonparametric approaches, often based on machine learning strategies. Though these a...

Journal: :IACR Cryptology ePrint Archive 2017
Andreas Wiemers Dominik Klein

Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that exploits leakage caused by collisions in between S-Box computations of AES. The attack yields observations from which the AES key can be inferred. Due to noise, an insufficient number of collisions, ...

Journal: :IACR Cryptology ePrint Archive 2008
Zbigniew Golebiewski Krzysztof Majcher Filip Zagórski Marcin Zawada

HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...

2003
Steven Cheung Ulf Lindqvist Martin W. Fong

Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenarios. The Correlated Attack Modeling Language (CAML) uses a modular approach, where a module represents an inference step and modules can be linked together to detect multistep scenarios. CAML is accompanied by a library of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید