Results 31 to 40 of about 587,598 (211)

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

Correlation inference attacks against machine learning models

open access: goldScience Advances
Despite machine learning models being widely used today, the relationship between a model and its training dataset is not well understood. We explore correlation inference attacks, whether and when a model leaks information about the correlations between the input variables of its training dataset.
Ana-Maria Creţu   +2 more
openalex   +5 more sources

Do height and weight play an important role in block and attack efficiency in high-level men's volleyball? [PDF]

open access: yes, 2017
The research objective was to study the relationships of players’ efficiency in attack and block with their anthropometric characteristics. Data on men’s weight and height and their proficiency in the game were used.
Jairus, Aleksander   +5 more
core   +2 more sources

Cache Timing Template Attack Method Based on Pearson Correlation Coefficient [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that the data collected by Cache timing template attack is noisy,a method of establishing timing template by using the Cache hit rate of access address is proposed,and the input value is judged by Pearson correlation coefficient.The
CHENG Zhiwei, CHEN Caisen, ZHU Lianjun, MO Weifeng, WANG Huiyu
doaj   +1 more source

Node Survival in Networks under Correlated Attacks

open access: yesPLOS ONE, 2015
We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors.
Yan Hao   +2 more
openaire   +5 more sources

Resilient AC Microgrids Against Correlated Attacks

open access: yesIEEE Access, 2023
Multi-inverter AC microgrids increasingly rely on local embedded controllers and distributed communication networks to meet operational requirements, which makes the microgrids vulnerable to physical and cyber attacks. Conventional resilient control strategies generally assume that the attack signals are bounded and uncorrelated.
Shan Zuo   +4 more
openaire   +2 more sources

Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation

open access: yesIEEE Access
DDoS attacks are still one of the primary sources of problems on the Internet and continue to cause significant financial losses for organizations. To mitigate their impact, detection should preferably occur close to the attack origin, e.g., at home ...
Gabriel Mendonca   +3 more
doaj   +1 more source

Fluctuation effects in disordered Peierls systems [PDF]

open access: yes, 2001
We review the density of states and related quantities of quasi one-dimensional disordered Peierls systems in which fluctuation effects of a backscattering potential play a crucial role.
Boguliubov   +17 more
core   +4 more sources

Host security assessment method based on attack graph

open access: yesTongxin xuebao, 2022
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj   +2 more sources

Vulnerability association evaluation of Internet of thing devices based on attack graph

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices ...
Yao Ma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy