Results 31 to 40 of about 811,171 (213)

Collusion Attack Identification Reasoning Model Fusing Implicit and Explicit Features Under DS Evidence Theory [PDF]

open access: yesJisuanji gongcheng, 2017
Collusion attack produced a serious threat to e-commerce trust evaluation mechanism and the existing attack detection model is not able to solve the problem well,combined with the characteristics of domestic C2C e-commerce,this paper uses the goods in ...
ZHAO Jie,XUE Rui,CHEN Xu,YANG Yujian
doaj   +1 more source

On multiple symmetric fixed points in GOST [PDF]

open access: yes, 2015
In this article the author revisits the oldest attack on GOST known, the Kara Reflection attack, and another totally unrelated truncated differential attack by Courtois and Misztal.
Courtois, N
core   +1 more source

Attacks on Java Card 3.0 Combining Fault and Logical Attacks [PDF]

open access: yes, 2010
Java Cards have been threatened so far by attacks using ill-formed applications which assume that the application bytecode is not verified. This assumption remained realistic as long as the bytecode verifier was commonly executed off-card and could thus be bypassed.
Guillaume Barbu   +2 more
openaire   +1 more source

Differential fault attack on LiCi cipher

open access: yes网络与信息安全学报, 2021
LiCi lightweight block cipher is a new algorithm proposed in 2017. With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT). In the design document of
CHEN Weijian, LUO Haoxiang
doaj   +3 more sources

Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures [PDF]

open access: yes, 2011
Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code verification may have then lead to the end of software-based attacks against such platforms.
Guillaume Barbu   +2 more
openaire   +1 more source

A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis

open access: yesInformation
Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training.
Eman Shalabi   +3 more
doaj   +1 more source

A multi-stage coordinated cyber-physical topology attack method based on deep reinforcement learning

open access: yes电力工程技术, 2023
With the development of smart grid and the continuous introduction of communication equipments into cyber physical system (CPS), CPS is confronted with a new attack mode with more destructive—coordinated cyber physical attack (CCPA).
YI Na, XU Jianjun, CHEN Yue, SUN Dikang
doaj   +1 more source

Adjunctive Therapeutic Plasma Exchange in Refractory Adult‐Onset Still's Disease Complicated by Secondary Macrophage Activation Syndrome: A Single‐Center Experience

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda   +15 more
wiley   +1 more source

Detecting House of Spirit Attacks by Glibc Heap Information Extraction

open access: yesJournal of Harbin University of Science and Technology
The current forensic research on heaps mainly extracts information from the heap and the NT heap of Windows. However,the study of how to extract the information on the Glibc heap in the Linux from dump files is not sufficient. To reproduce the
ZHAI Jiqiang   +3 more
doaj   +1 more source

Comparative evaluation of the efficiency of a sumatriptan/dexketoprofen combination versus sumatriptan monotherapy in the treatment of a migraine attack

open access: yesНеврология, нейропсихиатрия, психосоматика, 2018
Migraine is a chronic brain disease with a high prevalence and a marked deterioration in quality of life. Triptans are the gold standard for migraine attack therapy, but they are not effective in all patients.
K. V. Skorobogatykh, Yu. E. Azimova
doaj   +1 more source

Home - About - Disclaimer - Privacy