Results 11 to 20 of about 5,572,769 (345)

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption [PDF]

open access: yes, 2005
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation of the inputs conditioned on a given (short) output pattern of some specific nonlinear function.
Serge Vaudenay, Willi Meier, Yi Lu
openaire   +7 more sources

Correlation-Aware Neural Networks for DDoS Attack Detection in IoT Systems [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2023
We present a comprehensive study on applying machine learning to detect distributed Denial of service (DDoS) attacks using large-scale Internet of Things (IoT) systems.
Arvin Hekmati   +5 more
semanticscholar   +1 more source

GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks

open access: yesIEEE Access, 2023
The Tor network, renowned for its provision of online privacy and anonymity, faces the constant threat of correlation attacks that aim to compromise user identities.
Muhammad Asfand Hafeez   +3 more
doaj   +1 more source

Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security [PDF]

open access: yesIEEE Access, 2020
In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the ...
T. Iwakoshi
semanticscholar   +1 more source

Correlations in complex networks under attack [PDF]

open access: yesPhysical Review E, 2012
For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity ...
Srivastava, Animesh   +3 more
openaire   +5 more sources

Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey

open access: yesItalian National Conference on Sensors, 2022
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several limitations, such as generating a high volume of low-quality alerts. Moreover,
Hashim Albasheer   +8 more
semanticscholar   +1 more source

MAAC: Novel Alert Correlation Method To Detect Multi-step Attack [PDF]

open access: yesInternational Conference on Trust, Security and Privacy in Computing and Communications, 2020
With the continuous improvement of attack methods, there are more and more distributed, complex, targeted attacks in which the attackers use combined attack methods to achieve the purpose.
Xiaoyu Wang   +3 more
semanticscholar   +1 more source

Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity

open access: yesWireless Communications and Mobile Computing, 2020
Privacy preserving data publishing (PPDP) refers to the releasing of anonymized data for the purpose of research and analysis. A considerable amount of research work exists for the publication of data, having a single sensitive attribute.
Razaullah Khan   +6 more
semanticscholar   +1 more source

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet   +3 more
doaj   +1 more source

An estimation of physicochemical properties of heart attack treatment medicines by using molecular descriptor's

open access: yesSouth African Journal of Chemical Engineering, 2023
A topological index is a numerical quantity associate with a graph describes its topology by applying molecular structure of a chemical compound, we obtain its properties theoretically.
Muhammad Waheed Rasheed   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy