Results 61 to 70 of about 587,598 (211)

A comparison of fast correlation attacks [PDF]

open access: yes, 1996
A comparison of two different approaches to fast correlation attacks on stream ciphers is conducted. One is based on standard or modified iterative probabilistic decoding algorithms, and the other is a recent, so-called free energy minimisation approach.
Andrew Clark   +2 more
openaire   +1 more source

From Bell's Theorem to Secure Quantum Key Distribution

open access: yes, 2005
Any Quantum Key Distribution (QKD) protocol consists first of sequences of measurements that produce some correlation between classical data. We show that these correlation data must violate some Bell inequality in order to contain distillable secrecy ...
Antonio Acín   +5 more
core   +2 more sources

Correlation-based Detection of LDoS Attack

open access: yesJournal of Software, 2012
Low-rate Denial of Service (LDoS) attack and TCP flows are simulated in the time and frequency domain for the purpose of analyzing their signatures and extracting period T and duration L of LDoS attack, which are two correlative parameters used in the proposed detecting approach.
Zhi-jun Wu   +3 more
openaire   +1 more source

HUBUNGAN POPULASI NGENGAT PENGGEREK BATANG PADI YANG TERTANGKAP PERANGKAP LAMPU DENGAN INTENSITAS SERANGAN PENGGEREK BATANG PADI DI SEKITARNYA

open access: yesJurnal HPT (Hama Penyakit Tumbuhan), 2013
The data of pest captured by light trap can be utilized to monitor pest attack in an area, so it can be determined early when the pest will attack that area.
Evana Nuzulia Pertiwi   +2 more
doaj  

Calculation of aerodynamic characteristics of airplane configurations at high angles of attack [PDF]

open access: yes
Calculation of longitudinal and lateral directional aerodynamic characteristics of airplanes by the VORSTAB code is examined. The numerical predictions are based on the potential flow theory with corrections of high angle of attack phenomena; namely ...
Lan, C. Edward, Tseng, J. B.
core   +1 more source

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

open access: yes, 2019
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping   +6 more
core  

Theoretical estimation of the transonic aerodynamic characteristics of a supercritical-wing transport model with trailing-edge controls [PDF]

open access: yes
A method for rapidly estimating the overall forces and moments at supercritical speeds, below drag divergence, of transport configurations with supercritical wings is presented.
Luckring, J. M., Mann, M. J.
core   +1 more source

A highly optimized flow-correlation attack

open access: yes, 2013
Deciding that two network flows are essentially the same is an important problem in intrusion detection and in tracing anonymous connections. A stepping stone or an anonymity network may try to prevent flow correlation by adding chaff traffic, splitting the flow in several subflows or adding random delays. A well-known attack for these types of systems
Elices, Juan A.   +1 more
openaire   +2 more sources

Kernel matrix regression

open access: yes, 2007
We address the problem of filling missing entries in a kernel Gram matrix, given a related full Gram matrix. We attack this problem from the viewpoint of regression, assuming that the two kernel matrices can be considered as explanatory variables and ...
Vert, Jean-Philippe   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy