Results 21 to 30 of about 5,572,769 (345)

Comparative study of power analysis attacks based on template and KNN algorithm

open access: yesDianxin kexue, 2022
Power analysis attack is still the most threatening type of side channel attack on cryptographic hardware.The template analysis attack with the attack of KNN algorithm was compared.Firstly, three dimensionality reduction methods of Pearson correlation ...
Jifang JIN   +4 more
doaj   +2 more sources

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework

open access: yesIEEE Access, 2019
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang   +4 more
doaj   +1 more source

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

Malicious Attack Correlation Analysis Method of Source-Grid-Load System under Specific Attack Scenarios

open access: yesZhongguo dianli, 2019
The key for the power grid to deal with cyber security threats is to make full use of cyber and electrical information to improve the self-adaptation ability and automation for identification of malicious attack event.
Rui ZHANG   +5 more
doaj   +1 more source

A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System

open access: yesIEEE Access, 2020
Smart Grid Monitoring System(SGMS) is an important means to protect the security of smart grid. The high volumes of alerts generated by SGMS often confuse managers.
Hua Zhang   +6 more
doaj   +1 more source

Contribution Percentages of certain Body Measurements and Physical Fitness Components on certain Handball Attack Skills for the students of Sport Education Institution in Akra [PDF]

open access: yesمجلة الرافدين للعلوم الرياضية, 2012
The study aimed at being acquainted with the correlation among body measurements and certain handball attack skills for the students of Sport Education Institution in Akra; the correlation among physical fitness components and certain handball attack ...
Dhyaa. Ibrahim, Shihab. hassan
doaj   +1 more source

A comparison of fast correlation attacks [PDF]

open access: yes, 1996
A comparison of two different approaches to fast correlation attacks on stream ciphers is conducted. One is based on standard or modified iterative probabilistic decoding algorithms, and the other is a recent, so-called free energy minimisation approach.
Ed Dawson   +3 more
openaire   +2 more sources

Detection of advanced persistent threat using machine-learning correlation analysis [PDF]

open access: yes, 2018
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F   +6 more
core   +6 more sources

Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs [PDF]

open access: yes2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), 2019
S. Haas, F. Wilkens and M. Fischer, "Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs," 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), London, United Kingdom, 2019, pp. 1-11.
Steffen Haas   +2 more
openaire   +2 more sources

Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection

open access: yesIEEE Access, 2020
The advent of Advanced Persistent Threat (APT) as a new concept in cyber warfare has raised many concerns in recent years. APT based cyber-attacks are usually stealthy, stepwise, slow, long-term, planned, and based on a set of varied zero-day ...
M. Khosravi, B. T. Ladani
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy