نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Water is the most essential component for sustaining lives of humans and other living creatures. Supplying potable water with adequate residual pressure is a fundamental responsibility of city administration, which they do during normal conditions. But sometimes, abnormal conditions are formed resulting pressure deficient conditions during the daily operations of water distribution networks. Th...

2015
Heng Zhang Peng Cheng Ling Shi Jiming Chen

Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this paper, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote ...

Journal: :EURASIP J. Information Security 2007
Alessandro Piva Mauro Barni

The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwi...

2016
Changwei Liu Anoop Singhal Duminda Wijesekera

Cloud computing provides several benefits to organizations such as increased flexibility, scalability and reduced cost. However, it provides several challenges for digital forensics and criminal investigation. Some of these challenges are the dependence of forensically valuable data on the deployment model, multiple virtual machines running on a single physical machine and multiple tenancies of...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Honglong Chen Wei Lou Zhi Wang

Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor networks under the nonadversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied performance under the adversarial scenario. In t...

2003
Xinzhou Qin Wenke Lee

With the increasingly widespread deployment of security mechanisms, such as firewalls, intrusion detection systems (IDSs), antivirus software and authentication services, the problem of alert analysis has become very important. The large amount of alerts can overwhelm security administrators and prevent them from adequately understanding and analyzing the security state of the network, and init...

2009
Sachin Kadloor Xun Gong Negar Kiyavash Tolga Tezcan Nikita Borisov

This paper presents a nefarious low-cost traffic analysis attack in packet-based networks, such as the Internet. The attack is mountable in any scenario where a shared routing resource exists among users. A real-world attack successfully compromised the privacy of a user without requiring significant resources in terms of access, memory, or computational power. The effectiveness of our attack i...

Journal: :Biosecurity and bioterrorism : biodefense strategy, practice, and science 2013
M Brooke Rogers Richard Amlôt G James Rubin

It is a common assumption that, in the event of a chemical, biological, radiological, or nuclear (CBRN) attack, a well-prepared and informed public is more likely to follow official recommendations regarding the appropriate safety measures to take. We present findings from a UK study investigating the ability of crisis communication to influence perceptions of risk and behavioral intentions in ...

2003
Alefiya Hussain John Heidemann Christos Papadopoulos

Denial-of-service attacks on the Internet today are often launched from zombies, multiple compromised machines controlled by an attacker. Attackers often take control of a number of zombies and then repeatedly use this army to attack a target several times, or to attack several targets. In this paper, we propose a method to identify repeated attack scenarios, that is, the combination of a parti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید