Results 51 to 60 of about 587,598 (211)

Attack detection method based on spatiotemporal event correlation in intranet environment

open access: yesTongxin xuebao, 2020
In view of the fact that a single event as an attack detection feature leads to a higher false positive rate,an intranet attack detection method using Bayesian network model for cross-space event correlation and Kalman filter linear model for cross ...
Wei SUN   +3 more
doaj   +2 more sources

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

Realization of correlation attack against the fuzzy vault scheme

open access: yesSPIE Proceedings, 2008
User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem.
Kholmatov, Alisher Anatolyevich   +1 more
openaire   +2 more sources

Risk assessment method for network attack surface based on Bayesian attack graph

open access: yes网络与信息安全学报, 2018
Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network ...
Yuyang ZHOU, Guang CHENG, Chunsheng GUO
doaj   +3 more sources

Detrended fluctuation analysis on the correlations of complex networks under attack and repair strategy

open access: yes, 2005
We analyze the correlation properties of the Erdos-Renyi random graph (RG) and the Barabasi-Albert scale-free network (SF) under the attack and repair strategy with detrended fluctuation analysis (DFA).
A. Eke   +8 more
core   +1 more source

Peripapillary retinal nerve fiber layer thickness, papilledema grading, and opening pressure in first and recurrent attacks in idiopathic intracranial hypertension patients

open access: yesJournal of the Egyptian Ophthalmological Society
Aim To assess the correlation between clinical papilledema grading, in cases of idiopathic intracranial hypertension (IIH), noninvasive retinal nerve fiber layer (RNFL) thickness using optical coherence tomography (OCT) and the interventional ...
Sara A. Rabiea   +4 more
doaj   +1 more source

Evaluation of Attackers’ Skill Levels in Multi-Stage Attacks

open access: yesInformation, 2020
The rapid move to digitalization and usage of online information systems brings new and evolving threats that organizations must protect themselves from and respond to.
Terézia Mézešová   +2 more
doaj   +1 more source

Applying Gaussian quantum discord to quantum key distribution

open access: yes, 2014
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core   +1 more source

The Optimal Defense of Networks of Targets [PDF]

open access: yes
This paper examines a game-theoretic model of attack and defense of multiple networks of targets in which there exist intra-network strategic complementarities among targets.
Brian Roberson, Dan Kovenock
core  

Home - About - Disclaimer - Privacy