Results 31 to 40 of about 811,171 (213)
Collusion Attack Identification Reasoning Model Fusing Implicit and Explicit Features Under DS Evidence Theory [PDF]
Collusion attack produced a serious threat to e-commerce trust evaluation mechanism and the existing attack detection model is not able to solve the problem well,combined with the characteristics of domestic C2C e-commerce,this paper uses the goods in ...
ZHAO Jie,XUE Rui,CHEN Xu,YANG Yujian
doaj +1 more source
On multiple symmetric fixed points in GOST [PDF]
In this article the author revisits the oldest attack on GOST known, the Kara Reflection attack, and another totally unrelated truncated differential attack by Courtois and Misztal.
Courtois, N
core +1 more source
Attacks on Java Card 3.0 Combining Fault and Logical Attacks [PDF]
Java Cards have been threatened so far by attacks using ill-formed applications which assume that the application bytecode is not verified. This assumption remained realistic as long as the bytecode verifier was commonly executed off-card and could thus be bypassed.
Guillaume Barbu +2 more
openaire +1 more source
Differential fault attack on LiCi cipher
LiCi lightweight block cipher is a new algorithm proposed in 2017. With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT). In the design document of
CHEN Weijian, LUO Haoxiang
doaj +3 more sources
Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures [PDF]
Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code verification may have then lead to the end of software-based attacks against such platforms.
Guillaume Barbu +2 more
openaire +1 more source
Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training.
Eman Shalabi +3 more
doaj +1 more source
A multi-stage coordinated cyber-physical topology attack method based on deep reinforcement learning
With the development of smart grid and the continuous introduction of communication equipments into cyber physical system (CPS), CPS is confronted with a new attack mode with more destructive—coordinated cyber physical attack (CCPA).
YI Na, XU Jianjun, CHEN Yue, SUN Dikang
doaj +1 more source
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda +15 more
wiley +1 more source
Detecting House of Spirit Attacks by Glibc Heap Information Extraction
The current forensic research on heaps mainly extracts information from the heap and the NT heap of Windows. However,the study of how to extract the information on the Glibc heap in the Linux from dump files is not sufficient. To reproduce the
ZHAI Jiqiang +3 more
doaj +1 more source
Migraine is a chronic brain disease with a high prevalence and a marked deterioration in quality of life. Triptans are the gold standard for migraine attack therapy, but they are not effective in all patients.
K. V. Skorobogatykh, Yu. E. Azimova
doaj +1 more source

