Results 51 to 60 of about 587,598 (211)
Attack detection method based on spatiotemporal event correlation in intranet environment
In view of the fact that a single event as an attack detection feature leads to a higher false positive rate,an intranet attack detection method using Bayesian network model for cross-space event correlation and Kalman filter linear model for cross ...
Wei SUN +3 more
doaj +2 more sources
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj +1 more source
Realization of correlation attack against the fuzzy vault scheme
User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem.
Kholmatov, Alisher Anatolyevich +1 more
openaire +2 more sources
Risk assessment method for network attack surface based on Bayesian attack graph
Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network ...
Yuyang ZHOU, Guang CHENG, Chunsheng GUO
doaj +3 more sources
We analyze the correlation properties of the Erdos-Renyi random graph (RG) and the Barabasi-Albert scale-free network (SF) under the attack and repair strategy with detrended fluctuation analysis (DFA).
A. Eke +8 more
core +1 more source
Aim To assess the correlation between clinical papilledema grading, in cases of idiopathic intracranial hypertension (IIH), noninvasive retinal nerve fiber layer (RNFL) thickness using optical coherence tomography (OCT) and the interventional ...
Sara A. Rabiea +4 more
doaj +1 more source
Evaluation of Attackers’ Skill Levels in Multi-Stage Attacks
The rapid move to digitalization and usage of online information systems brings new and evolving threats that organizations must protect themselves from and respond to.
Terézia Mézešová +2 more
doaj +1 more source
Applying Gaussian quantum discord to quantum key distribution
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core +1 more source
Family member's awareness of cyber-security concepts and its correlation with the precautionary procedures taken against cyber-attacks during the Coronavirus pandemic [PDF]
Najat Malibari
openalex +1 more source
The Optimal Defense of Networks of Targets [PDF]
This paper examines a game-theoretic model of attack and defense of multiple networks of targets in which there exist intra-network strategic complementarities among targets.
Brian Roberson, Dan Kovenock
core

