Results 41 to 50 of about 587,598 (211)

Correlation Attack on A5/1 [PDF]

open access: yes, 2015
Popis šifry A5/1, základních kryptografických útoků a rozbor útoku korelační metodou. Tato práce bude prospěšná každému, kdo se bude zajímat o proudové šifry, základní myšlenky kryptografických útoků a speciálně myšlenku útoku korelační metodou ...
Holec Martin
core  

An exploration of hypotheses that explain herbivore and pathogen attack in restored plant communities.

open access: yesPLoS ONE, 2015
Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to ...
G Kai Blaisdell   +3 more
doaj   +1 more source

Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation

open access: yesSensors, 2019
With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence.
Xiang Cheng, Jiale Zhang, Bing Chen
doaj   +1 more source

Correlation Electromagnetic Analysis Attacks Based on Signal Amplified Technology [PDF]

open access: yesJisuanji gongcheng, 2018
The Correlation Electromagnetic Analysis(CEMA) attacks technology is widely used in side channel analysis attacks for cryptographic chips,but the signal collected is easily affected by external noise and other factors, resulting in a large amount of work.
WANG Sixiang,ZHANG Lei,CUI Qi,GAO Xianwei,DUAN Xiaoyi
doaj   +1 more source

Attacking the combination generator [PDF]

open access: yes, 2009
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to
Didier, Frédéric, Laigle-Chapuy, Yann
core   +3 more sources

Intrusion alert prioritisation and attack detection using post-correlation analysis [PDF]

open access: yes, 2015
Event Correlation used to be a widely used technique for interpreting alert logs and discovering network attacks. However, due to the scale and complexity of today's networks and attacks, alert logs produced by these modern networks are much larger in ...
Bloomfield, R. E.   +4 more
core   +1 more source

Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems [PDF]

open access: green, 2023
Arvin Hekmati   +3 more
openalex   +1 more source

MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack

open access: yesIET Information Security, 2023
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj   +1 more source

Fingerprinting with Minimum Distance Decoding

open access: yes, 2007
This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates.
Gamal, Hesham El   +2 more
core   +2 more sources

Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection

open access: yesTongxin xuebao, 2006
Causal correlation method was one of the most representative methods for instruction detection alert correla-tion. In some conditions, the correlation graph would be split because of loss of causal information. In order to solve the problem, an algorithm
MA Lin-ru1   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy