Comparative study of power analysis attacks based on template and KNN algorithm
Power analysis attack is still the most threatening type of side channel attack on cryptographic hardware.The template analysis attack with the attack of KNN algorithm was compared.Firstly, three dimensionality reduction methods of Pearson correlation ...
Jifang JIN +4 more
doaj +2 more sources
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang +4 more
doaj +1 more source
On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa +14 more
core +3 more sources
The key for the power grid to deal with cyber security threats is to make full use of cyber and electrical information to improve the self-adaptation ability and automation for identification of malicious attack event.
Rui ZHANG +5 more
doaj +1 more source
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System
Smart Grid Monitoring System(SGMS) is an important means to protect the security of smart grid. The high volumes of alerts generated by SGMS often confuse managers.
Hua Zhang +6 more
doaj +1 more source
Contribution Percentages of certain Body Measurements and Physical Fitness Components on certain Handball Attack Skills for the students of Sport Education Institution in Akra [PDF]
The study aimed at being acquainted with the correlation among body measurements and certain handball attack skills for the students of Sport Education Institution in Akra; the correlation among physical fitness components and certain handball attack ...
Dhyaa. Ibrahim, Shihab. hassan
doaj +1 more source
A comparison of fast correlation attacks [PDF]
A comparison of two different approaches to fast correlation attacks on stream ciphers is conducted. One is based on standard or modified iterative probabilistic decoding algorithms, and the other is a recent, so-called free energy minimisation approach.
Ed Dawson +3 more
openaire +2 more sources
Detection of advanced persistent threat using machine-learning correlation analysis [PDF]
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F +6 more
core +6 more sources
Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs [PDF]
S. Haas, F. Wilkens and M. Fischer, "Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs," 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), London, United Kingdom, 2019, pp. 1-11.
Steffen Haas +2 more
openaire +2 more sources
Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection
The advent of Advanced Persistent Threat (APT) as a new concept in cyber warfare has raised many concerns in recent years. APT based cyber-attacks are usually stealthy, stepwise, slow, long-term, planned, and based on a set of varied zero-day ...
M. Khosravi, B. T. Ladani
semanticscholar +1 more source

