Results 191 to 200 of about 587,598 (211)
Some of the next articles are maybe not open access.
Correlates of Vertigo Attacks in Ménière’s Disease
Psychotherapy and Psychosomatics, 1998<b>Background: </b>Ménière’s disease is a medical condition that involves hearing loss, tinnitus and attacks of vertigo. The attacks can be severely disabling with nausea, dizziness, and aural sensations. <b>Method: </b>Three scales assessing the correlates of vertigo attacks in Ménière’s disease were developed and completed by ...
C, Hägnebo, G, Andersson, L, Melin
openaire +2 more sources
Fast Correlation Attacks on the Summation Generator
Journal of Cryptology, 2000zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Golić, Jovan Dj. +2 more
openaire +2 more sources
Correlation between heart attacks and magnetic activity
Nature, 1979SINCE the pioneering work of Dull and Dull1, many papers have been published on the possible correlation between geomagnetic activity and medical phenomena. Most of them conclude that there is such a correlation, although this may reflect the tendency to publish positive results and discard negative ones, and there is widespread scepticism concerning ...
S R, Malin, B J, Srivastava
openaire +2 more sources
Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling
2008 International Conference on Information Security and Assurance (isa 2008), 2008Most cyber-attacks are not single attack actions. They are multi-step attacks composed by a set of attack actions. Although techniques used by attackers can be diverse, attack patterns are generally finite. So we need to find attack steps that are correlated in an attack scenario.
Zhijie Liu, Chongjun Wang, Shifu Chen
openaire +1 more source
Correlation attacks on stream ciphers
Proceedings of IEEE. AFRICON '96, 2002The fast correlation attack described by Meier and Staffelbach (1989) on certain classes of stream ciphers, based on linear feedback shift registers, requires that the number of taps of the characteristic polynomial must be small-typically less than 10.
openaire +1 more source
Spatial correlation detection of DDoS attack
2009 International Conference on Communications, Circuits and Systems, 2009DDoS attack flows distributed in many links exhibit directional nature, they are usually generated by certain tools and originate from different nodes, but have inherent dependencies in spatial when transit in network. This will cause correlation between the traffic where they traverse deviate from norm.
null Zonglin Li +2 more
openaire +1 more source
Data recovery after geographic correlated attacks
2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), 2015In distributed storage networks, ensuring data availability in the presence of hardware faults is an important requirement. Typically, redundancy schemes such as replication and erasure coding are used to ensure this. In case of hardware failures, these networks may be disconnected into multiple components, each of which may require access to the data.
Guy Grebla +4 more
openaire +1 more source
Are global terrorist attacks time-correlated?
Physica A: Statistical Mechanics and its Applications, 2006Is there any kind of "memory" in the sequence of terror attacks worldwide? Are the terrorist attacks non-randomly time distributed? Our analysis suggests that they are correlated, which means that a terror event is not independent from the time elapsed since the previous event.
Telesca L, Lovallo M
openaire +3 more sources
Known Plaintext Correlation Attack against RC5
2002We investigate a known plaintext attack on RC5 based on correlations. Compared with the best previous known-plaintext attack on RC5-32, a linear cryptanalysis by Borst, Preneel, and Vandewalle, our attack applies to a larger number of rounds. RC5-32 with r rounds can be broken with a success probability of 90% by using 26.14r+2.27 plaintexts. Therefore,
Atsuko Miyaji +2 more
openaire +1 more source
New correlation attacks on stream ciphers
IEEE AFRICON. 6th Africon Conference in Africa,, 2003We introduce two new correlation attacks on stream ciphers that make use of non-linearly combined linear feedback shift-registers (LFSRs). The first attack utilises the well-known Lempel-Ziv complexity measure for binary sequences. The second attack is based on the binary derivative, applied in conjunction with the distribution of runs in a binary ...
W.T. Penzhorn, C. Bruwer
openaire +1 more source

