Results 91 to 100 of about 587,598 (211)
Survey on application of attack graph technology
Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and ...
Zi-wei YE +3 more
doaj +2 more sources
DeepCoAST: Unveiling Split Trace Correlation to Counter Traffic Splitting Defenses
Despite its widespread adoption, Tor remains vulnerable to traffic analysis attacks, which enables both ends of the communication to be inferred by network-level adversaries.
Goun Kim +5 more
doaj +1 more source
Multi-Step Attack Recognition and Correlation Research Based on Graph Attention
Jiaxun Wang +3 more
openalex +1 more source
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]
Muhammad Sheeraz +5 more
openalex +1 more source
THE CPA QUALIFICATION METHOD BASED ON THE GAUSSIAN CURVE FITTING
The Correlation Power Analysis (CPA) attack is an attack on cryptographic devices, especially smart cards. The results of the attack are correlation traces.
M.T. Adithia
doaj
Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation [PDF]
Costin Ghiban, Omar Choudary
openalex +1 more source

