Results 11 to 20 of about 5,572,769 (345)
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption [PDF]
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation of the inputs conditioned on a given (short) output pattern of some specific nonlinear function.
Serge Vaudenay, Willi Meier, Yi Lu
openaire +7 more sources
Correlation-Aware Neural Networks for DDoS Attack Detection in IoT Systems [PDF]
We present a comprehensive study on applying machine learning to detect distributed Denial of service (DDoS) attacks using large-scale Internet of Things (IoT) systems.
Arvin Hekmati +5 more
semanticscholar +1 more source
GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks
The Tor network, renowned for its provision of online privacy and anonymity, faces the constant threat of correlation attacks that aim to compromise user identities.
Muhammad Asfand Hafeez +3 more
doaj +1 more source
Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security [PDF]
In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the ...
T. Iwakoshi
semanticscholar +1 more source
Correlations in complex networks under attack [PDF]
For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity ...
Srivastava, Animesh +3 more
openaire +5 more sources
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several limitations, such as generating a high volume of low-quality alerts. Moreover,
Hashim Albasheer +8 more
semanticscholar +1 more source
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack [PDF]
With the continuous improvement of attack methods, there are more and more distributed, complex, targeted attacks in which the attackers use combined attack methods to achieve the purpose.
Xiaoyu Wang +3 more
semanticscholar +1 more source
Privacy preserving data publishing (PPDP) refers to the releasing of anonymized data for the purpose of research and analysis. A considerable amount of research work exists for the publication of data, having a single sensitive attribute.
Razaullah Khan +6 more
semanticscholar +1 more source
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet +3 more
doaj +1 more source
A topological index is a numerical quantity associate with a graph describes its topology by applying molecular structure of a chemical compound, we obtain its properties theoretically.
Muhammad Waheed Rasheed +2 more
doaj +1 more source

