Results 191 to 200 of about 587,598 (211)
Some of the next articles are maybe not open access.

Correlates of Vertigo Attacks in Ménière’s Disease

Psychotherapy and Psychosomatics, 1998
<b>Background: </b>Ménière’s disease is a medical condition that involves hearing loss, tinnitus and attacks of vertigo. The attacks can be severely disabling with nausea, dizziness, and aural sensations. <b>Method: </b>Three scales assessing the correlates of vertigo attacks in Ménière’s disease were developed and completed by ...
C, Hägnebo, G, Andersson, L, Melin
openaire   +2 more sources

Fast Correlation Attacks on the Summation Generator

Journal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Golić, Jovan Dj.   +2 more
openaire   +2 more sources

Correlation between heart attacks and magnetic activity

Nature, 1979
SINCE the pioneering work of Dull and Dull1, many papers have been published on the possible correlation between geomagnetic activity and medical phenomena. Most of them conclude that there is such a correlation, although this may reflect the tendency to publish positive results and discard negative ones, and there is widespread scepticism concerning ...
S R, Malin, B J, Srivastava
openaire   +2 more sources

Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling

2008 International Conference on Information Security and Assurance (isa 2008), 2008
Most cyber-attacks are not single attack actions. They are multi-step attacks composed by a set of attack actions. Although techniques used by attackers can be diverse, attack patterns are generally finite. So we need to find attack steps that are correlated in an attack scenario.
Zhijie Liu, Chongjun Wang, Shifu Chen
openaire   +1 more source

Correlation attacks on stream ciphers

Proceedings of IEEE. AFRICON '96, 2002
The fast correlation attack described by Meier and Staffelbach (1989) on certain classes of stream ciphers, based on linear feedback shift registers, requires that the number of taps of the characteristic polynomial must be small-typically less than 10.
openaire   +1 more source

Spatial correlation detection of DDoS attack

2009 International Conference on Communications, Circuits and Systems, 2009
DDoS attack flows distributed in many links exhibit directional nature, they are usually generated by certain tools and originate from different nodes, but have inherent dependencies in spatial when transit in network. This will cause correlation between the traffic where they traverse deviate from norm.
null Zonglin Li   +2 more
openaire   +1 more source

Data recovery after geographic correlated attacks

2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), 2015
In distributed storage networks, ensuring data availability in the presence of hardware faults is an important requirement. Typically, redundancy schemes such as replication and erasure coding are used to ensure this. In case of hardware failures, these networks may be disconnected into multiple components, each of which may require access to the data.
Guy Grebla   +4 more
openaire   +1 more source

Are global terrorist attacks time-correlated?

Physica A: Statistical Mechanics and its Applications, 2006
Is there any kind of "memory" in the sequence of terror attacks worldwide? Are the terrorist attacks non-randomly time distributed? Our analysis suggests that they are correlated, which means that a terror event is not independent from the time elapsed since the previous event.
Telesca L, Lovallo M
openaire   +3 more sources

Known Plaintext Correlation Attack against RC5

2002
We investigate a known plaintext attack on RC5 based on correlations. Compared with the best previous known-plaintext attack on RC5-32, a linear cryptanalysis by Borst, Preneel, and Vandewalle, our attack applies to a larger number of rounds. RC5-32 with r rounds can be broken with a success probability of 90% by using 26.14r+2.27 plaintexts. Therefore,
Atsuko Miyaji   +2 more
openaire   +1 more source

New correlation attacks on stream ciphers

IEEE AFRICON. 6th Africon Conference in Africa,, 2003
We introduce two new correlation attacks on stream ciphers that make use of non-linearly combined linear feedback shift-registers (LFSRs). The first attack utilises the well-known Lempel-Ziv complexity measure for binary sequences. The second attack is based on the binary derivative, applied in conjunction with the distribution of runs in a binary ...
W.T. Penzhorn, C. Bruwer
openaire   +1 more source

Home - About - Disclaimer - Privacy