Results 91 to 100 of about 587,598 (211)

Survey on application of attack graph technology

open access: yesTongxin xuebao, 2017
Attack graph technology was a measure to predict the pattern and process used by attacker to compromise the target network,so as to guide defender to take defensive measures and improve network security.The basic component,types of attack graphs and ...
Zi-wei YE   +3 more
doaj   +2 more sources

DeepCoAST: Unveiling Split Trace Correlation to Counter Traffic Splitting Defenses

open access: yesIEEE Access
Despite its widespread adoption, Tor remains vulnerable to traffic analysis attacks, which enables both ends of the communication to be inferred by network-level adversaries.
Goun Kim   +5 more
doaj   +1 more source

Correlation between Bond Order Based on Electron Theory and Active Corrosion Rate for Ti-based Alloys Attacked in HCl Solution

open access: bronze, 1990
Masao Morishita   +5 more
openalex   +2 more sources

Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]

open access: gold
Muhammad Sheeraz   +5 more
openalex   +1 more source

THE CPA QUALIFICATION METHOD BASED ON THE GAUSSIAN CURVE FITTING

open access: yesJurnal Informatika, 2015
The Correlation Power Analysis (CPA) attack is an attack on cryptographic devices, especially smart cards. The results of the attack are correlation traces.
M.T. Adithia
doaj  

Home - About - Disclaimer - Privacy