نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2003
Stephen Specht Ruby Lee

Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against victim systems. As new countermeasures are developed to prevent DDoS attacks and help systems that are victims of such an attack, attackers are constantly devel...

2009
N. Goranin A. Cenys

Internet worms remain one of the major threats to the Internet infrastructure. Modeling allows forecasting the malware propagation consequences and evolution trends, planning countermeasures and many other tasks that cannot be investigated without harm to production systems in the wild. Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. foreca...

2001
Elisabeth Oswald Manfred Josef Aigner

Power Analysis attacks on elliptic curve cryptosystems and various countermeasures against them, have been first discussed by Coron ([6]). All proposed countermeasures are based on the randomization or blinding of the inputparameters of the binary algorithm. We propose a countermeasure that randomizes the binary algorithm itself. Our algorithm needs approximately 9% more additions than the ordi...

2012
Alessandro Armando Alessio Merlo Mauro Migliardi Luca Verderame

We present a previously undisclosed vulnerability of Android OS which can be exploited by mounting a Denial-of-Service attack that makes devices become totally unresponsive. We discuss the characteristics of the vulnerability – which affects all versions of Android – and propose two different fixes, each involving little patching implementing a few architectural countermeasures. We also provide...

2004
Paul Thompson

This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as...

2012
Paul Aebersold

The Food and Drug Administration issued a final rule in May 2002 to permit the Agency to approve drugs or license biological products on the basis of animal efficacy studies for use in ameliorating or preventing serious or life-threatening conditions caused by exposure to lethal or permanently disabling toxic biological, chemical, radiological, or nuclear substances. Only two drugs were approve...

Journal: :Information & Management 2007
Quey-Jen Yeh Arthur Jung-Ting Chang

IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises. Industry type and organizational use of IT were seen as the two factors that affected the motivation of firms to adopt security countermeasures, b...

2003
E. Smith

In recent years, Kocher introduced SCA techniques to the cryptographic community. Contrary to previous cryptanalysis methods that attack the mathematically difficult problems cryptographic techniques are based on, SCAs exploit physical properties of implementations in an attempt to compromise systems. Following the introduction of the new cryptanalysis techniques, numerous algorithms have been ...

2010
Amir Moradi Axel Poschmann

The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full control over the pervasive device, additionally to the cryptographic attacks the whole field of physical attacks has to be considered. Most notably are here so-called side channel attacks, such as Differential Power Analysis (DPA) a...

2004
Pieter Spronck Ida G. Sprinkhuizen-Kuyper Eric O. Postma

Unsupervised online learning in commercial computer games allows computer-controlled opponents to adapt to the way the game is being played. As such it provides a mechanism to deal with weaknesses in the game AI and to respond to changes in human player tactics. In prior work we designed a novel technique called “dynamic scripting” that is able to create successful adaptive opponents. However, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید