Results 41 to 50 of about 587,598 (211)
Correlation Attack on A5/1 [PDF]
Popis šifry A5/1, základních kryptografických útoků a rozbor útoku korelační metodou. Tato práce bude prospěšná každému, kdo se bude zajímat o proudové šifry, základní myšlenky kryptografických útoků a speciálně myšlenku útoku korelační metodou ...
Holec Martin
core
Many hypotheses address the associations of plant community composition with natural enemies, including: (i) plant species diversity may reduce enemy attack, (ii) attack may increase as host abundance increases, (iii) enemy spillover may lead to ...
G Kai Blaisdell +3 more
doaj +1 more source
Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation
With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence.
Xiang Cheng, Jiale Zhang, Bing Chen
doaj +1 more source
Correlation Electromagnetic Analysis Attacks Based on Signal Amplified Technology [PDF]
The Correlation Electromagnetic Analysis(CEMA) attacks technology is widely used in side channel analysis attacks for cryptographic chips,but the signal collected is easily affected by external noise and other factors, resulting in a large amount of work.
WANG Sixiang,ZHANG Lei,CUI Qi,GAO Xianwei,DUAN Xiaoyi
doaj +1 more source
Attacking the combination generator [PDF]
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to
Didier, Frédéric, Laigle-Chapuy, Yann
core +3 more sources
Intrusion alert prioritisation and attack detection using post-correlation analysis [PDF]
Event Correlation used to be a widely used technique for interpreting alert logs and discovering network attacks. However, due to the scale and complexity of today's networks and attacks, alert logs produced by these modern networks are much larger in ...
Bloomfield, R. E. +4 more
core +1 more source
Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems [PDF]
Arvin Hekmati +3 more
openalex +1 more source
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj +1 more source
Fingerprinting with Minimum Distance Decoding
This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates.
Gamal, Hesham El +2 more
core +2 more sources
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
Causal correlation method was one of the most representative methods for instruction detection alert correla-tion. In some conditions, the correlation graph would be split because of loss of causal information. In order to solve the problem, an algorithm
MA Lin-ru1 +3 more
doaj +2 more sources

