نتایج جستجو برای: multistep attack scenario
تعداد نتایج: 176512 فیلتر نتایج به سال:
A fundamental virtue of social media is to build virtual communities between users. As such, it is no surprise that almost all social media sites provide web interfaces for the search and/or recommendation of other users who share similar attributes, interests, etc. with results being the top-k users selected according to a ranking function. Our studies of real-world websites unveil a novel yet...
This paper considers Quality-of-Information (QoI) aware resource allocation policies for multiuser networks. QoI is a recently introduced composite metric which is impacted by a number of attributes of information communicated from the source(s) to the destination(s), and as such differs from traditional qualityof-service metrics considered to date. The focus of this work is defining the Operat...
An algorithm for fusing the alerts produced by multiple heterogeneous intrusion detection systems is presented. The algorithm runs in realtime, combining the alerts into scenarios; each is composed of a sequence of alerts produced by a single actor or organization. The software is capable of discovering scenarios even if stealthy attack methods, such as forged IP addresses or long attack latenc...
Cyber attacks, the disruption of normal functioning of computers in a network due to malicious events (threats), are becoming widespread. The role of security analysts, who are tasked with protecting networks by accurately and timely detecting cyber attacks, is becoming important. However, currently little is known on how certain cognitive and environmental factors might influence the analyst’s...
The maximum likelihood side-channel distinguisher of a template attack scenario is expanded into lower degree attacks according to the increasing powers of the signal-to-noise ratio (SNR). By exploiting this decomposition we show that it is possible to build highly multivariate attacks which remain efficient when the likelihood cannot be computed in practice due to its computational complexity....
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus the supplied operating system and hardware. ...
Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...
Morphological analysis (MA) is a non-quantified modelling method for structuring and analysing technical, organisational and social problem complexes. It is well suited for developing scenarios, and the method is highly appropriate for complex cases where expertise from several areas is required. It is also useful for developing and relating operational and tactical scenarios to force requireme...
Cementitious materials are frequently applied in environments which they exposed to acid attack, e.g., sewer systems, biogas plants, and agricultural/food-related industries. Alkali-activated (AAMs) have repeatedly been shown exhibit a remarkably high resistance against attack by organic inorganic acids and, thus, promising candidates for the construction repair of acid-exposed structures. Howe...
a new two-step implicit linear obrechkoff twelfth algebraic order method with vanished phase-lag and its first, second, third and fourth derivatives is constructed in this paper. the purpose of this paper is to develop an efficient algorithm for the approximate solution of the one-dimensional radial schrodinger equation and related problems. this algorithm belongs in the category of the multist...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید