Results 21 to 30 of about 811,171 (213)

Botnet dataset with simultaneous attack activity

open access: yesData in Brief, 2022
The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet network traffic has sequentially interconnected as formed as bidirectional network flow (binetflow), which is combined with normal activities.
Muhammad Aidiel Rachman Putra   +2 more
doaj   +1 more source

The effectiveness of intersection attack countermeasures for graphical passwords [PDF]

open access: yes, 2012
Recognition-based graphical passwords are one of several proposed alternatives to alphanumerical passwords for user authentication. However, there has been limited work on the security of such schemes.
English, R., Poet, R.
core   +1 more source

Sex-Specific Asymmetrical Attack Rates in Combined Sexual-Vectorial Transmission Epidemics

open access: yesMicroorganisms, 2019
In 2015−2016, South America went through the largest Zika epidemic in recorded history. One important aspect of this epidemic was the importance of sexual transmission in combination with the usual vectorial transmission, with asymmetrical ...
Ana Carolina W. G. de Barros   +3 more
doaj   +1 more source

Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing

open access: yesFrontiers in Neurorobotics, 2021
Deep neural networks (DNNs) are proven vulnerable to attack against adversarial examples. Black-box transfer attacks pose a massive threat to AI applications without accessing target models.
Pengfei Xie   +8 more
doaj   +1 more source

Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]

open access: yes, 2011
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core   +1 more source

Analysis of stability derivatives important to recovery from spin

open access: yesAviation, 2016
This paper describes the numerical analysis of light aircraft stability derivatives in a wide range of angles of attack, important for recovery from spin.
Marcin Figat, Zdobysław Goraj
doaj   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Enhancing Security for JPEG Image Against Mosaic Attack Using Inter-Block Shuffle Encryption

open access: yesIEEE Access, 2019
Inter-block shuffle has been proved to be able to enhance the security for JPEG image encryption. However, it does not change the numbers of non-zero coefficients in 8*8 blocks. This leads to information leakage. In this paper, the defects of inter-block
Shanshan Li, Ruolan Ma, Hongli Zhang
doaj   +1 more source

Thermodynamic modeling of sulfate attack on carbonated Portland cement blended with blast furnace slag

open access: yesDevelopments in the Built Environment, 2023
Sulfate attack on concrete induces volumetric changes resulting in a severe damage to the structure. The structural deterioration can be coupled with carbonation in practice, while such coupled effect is relatively unknown.
Melaku N. Seifu   +4 more
doaj   +1 more source

Attacking the combination generator

open access: yes, 2009
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to be resistant to other kinds of attacks.
Didier, Frédéric, Laigle-Chapuy, Yann
openaire   +3 more sources

Home - About - Disclaimer - Privacy