Results 21 to 30 of about 811,171 (213)
Botnet dataset with simultaneous attack activity
The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet network traffic has sequentially interconnected as formed as bidirectional network flow (binetflow), which is combined with normal activities.
Muhammad Aidiel Rachman Putra +2 more
doaj +1 more source
The effectiveness of intersection attack countermeasures for graphical passwords [PDF]
Recognition-based graphical passwords are one of several proposed alternatives to alphanumerical passwords for user authentication. However, there has been limited work on the security of such schemes.
English, R., Poet, R.
core +1 more source
Sex-Specific Asymmetrical Attack Rates in Combined Sexual-Vectorial Transmission Epidemics
In 2015−2016, South America went through the largest Zika epidemic in recorded history. One important aspect of this epidemic was the importance of sexual transmission in combination with the usual vectorial transmission, with asymmetrical ...
Ana Carolina W. G. de Barros +3 more
doaj +1 more source
Deep neural networks (DNNs) are proven vulnerable to attack against adversarial examples. Black-box transfer attacks pose a massive threat to AI applications without accessing target models.
Pengfei Xie +8 more
doaj +1 more source
Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core +1 more source
Analysis of stability derivatives important to recovery from spin
This paper describes the numerical analysis of light aircraft stability derivatives in a wide range of angles of attack, important for recovery from spin.
Marcin Figat, Zdobysław Goraj
doaj +1 more source
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source
Enhancing Security for JPEG Image Against Mosaic Attack Using Inter-Block Shuffle Encryption
Inter-block shuffle has been proved to be able to enhance the security for JPEG image encryption. However, it does not change the numbers of non-zero coefficients in 8*8 blocks. This leads to information leakage. In this paper, the defects of inter-block
Shanshan Li, Ruolan Ma, Hongli Zhang
doaj +1 more source
Sulfate attack on concrete induces volumetric changes resulting in a severe damage to the structure. The structural deterioration can be coupled with carbonation in practice, while such coupled effect is relatively unknown.
Melaku N. Seifu +4 more
doaj +1 more source
Attacking the combination generator
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to be resistant to other kinds of attacks.
Didier, Frédéric, Laigle-Chapuy, Yann
openaire +3 more sources

