نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :CoRR 2014
Md Farhadur Rahman Weimo Liu Saravanan Thirumuruganathan Nan Zhang Gautam Das

A fundamental virtue of social media is to build virtual communities between users. As such, it is no surprise that almost all social media sites provide web interfaces for the search and/or recommendation of other users who share similar attributes, interests, etc. with results being the top-k users selected according to a ranking function. Our studies of real-world websites unveil a novel yet...

Journal: :Computer Networks 2014
Ertugrul N. Ciftcioglu Antonios Michaloliakos Aylin Yener Konstantinos Psounis Thomas F. La Porta Ramesh Govindan

This paper considers Quality-of-Information (QoI) aware resource allocation policies for multiuser networks. QoI is a recently introduced composite metric which is impacted by a number of attributes of information communicated from the source(s) to the destination(s), and as such differs from traditional qualityof-service metrics considered to date. The focus of this work is defining the Operat...

2001
Oliver Dain Robert K. Cunningham

An algorithm for fusing the alerts produced by multiple heterogeneous intrusion detection systems is presented. The algorithm runs in realtime, combining the alerts into scenarios; each is composed of a sequence of alerts produced by a single actor or organization. The software is capable of discovering scenarios even if stealthy attack methods, such as forged IP addresses or long attack latenc...

2013
Amanjot Kaur Varun Dutt

Cyber attacks, the disruption of normal functioning of computers in a network due to malicious events (threats), are becoming widespread. The role of security analysts, who are tasked with protecting networks by accurately and timely detecting cyber attacks, is becoming important. However, currently little is known on how certain cognitive and environmental factors might influence the analyst’s...

2016
Nicolas Bruneau Sylvain Guilley Annelie Heuser Olivier Rioul François-Xavier Standaert Yannick Teglia

The maximum likelihood side-channel distinguisher of a template attack scenario is expanded into lower degree attacks according to the increasing powers of the signal-to-noise ratio (SNR). By exploiting this decomposition we show that it is possible to build highly multivariate attacks which remain efficient when the likelihood cannot be computed in practice due to its computational complexity....

2017
Michael Schwarz Samuel Weiser Daniel Gruss Clémentine Maurice Stefan Mangard

In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus the supplied operating system and hardware. ...

2011
Ahmad Heidari

Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...

2005
Tomas Eriksson Tom Ritchey

Morphological analysis (MA) is a non-quantified modelling method for structuring and analysing technical, organisational and social problem complexes. It is well suited for developing scenarios, and the method is highly appropriate for complex cases where expertise from several areas is required. It is also useful for developing and relating operational and tactical scenarios to force requireme...

Journal: :RILEM technical letters 2022

Cementitious materials are frequently applied in environments which they exposed to acid attack, e.g., sewer systems, biogas plants, and agricultural/food-related industries. Alkali-activated (AAMs) have repeatedly been shown exhibit a remarkably high resistance against attack by organic inorganic acids and, thus, promising candidates for the construction repair of acid-exposed structures. Howe...

Journal: :iranian journal of mathematical chemistry 0
a. shokri department of mathematics, faculty of basic science, university of maragheh, maragheh, iran. m. tahmourasi department of mathematics, faculty of basic science, university of maragheh, maragheh, iran

a new two-step implicit linear obrechkoff twelfth algebraic order method with vanished phase-lag and its first, second, third and fourth derivatives is constructed in this paper. the purpose of this paper is to develop an efficient algorithm for the approximate solution of the one-dimensional radial schrodinger equation and related problems. this algorithm belongs in the category of the multist...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید