Results 61 to 70 of about 587,598 (211)
A comparison of fast correlation attacks [PDF]
A comparison of two different approaches to fast correlation attacks on stream ciphers is conducted. One is based on standard or modified iterative probabilistic decoding algorithms, and the other is a recent, so-called free energy minimisation approach.
Andrew Clark +2 more
openaire +1 more source
From Bell's Theorem to Secure Quantum Key Distribution
Any Quantum Key Distribution (QKD) protocol consists first of sequences of measurements that produce some correlation between classical data. We show that these correlation data must violate some Bell inequality in order to contain distillable secrecy ...
Antonio Acín +5 more
core +2 more sources
Correlation-based Detection of LDoS Attack
Low-rate Denial of Service (LDoS) attack and TCP flows are simulated in the time and frequency domain for the purpose of analyzing their signatures and extracting period T and duration L of LDoS attack, which are two correlative parameters used in the proposed detecting approach.
Zhi-jun Wu +3 more
openaire +1 more source
The data of pest captured by light trap can be utilized to monitor pest attack in an area, so it can be determined early when the pest will attack that area.
Evana Nuzulia Pertiwi +2 more
doaj
Calculation of aerodynamic characteristics of airplane configurations at high angles of attack [PDF]
Calculation of longitudinal and lateral directional aerodynamic characteristics of airplanes by the VORSTAB code is examined. The numerical predictions are based on the potential flow theory with corrections of high angle of attack phenomena; namely ...
Lan, C. Edward, Tseng, J. B.
core +1 more source
Attention, Please! Adversarial Defense via Attention Rectification and Preservation
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping +6 more
core
Theoretical estimation of the transonic aerodynamic characteristics of a supercritical-wing transport model with trailing-edge controls [PDF]
A method for rapidly estimating the overall forces and moments at supercritical speeds, below drag divergence, of transport configurations with supercritical wings is presented.
Luckring, J. M., Mann, M. J.
core +1 more source
A highly optimized flow-correlation attack
Deciding that two network flows are essentially the same is an important problem in intrusion detection and in tracing anonymous connections. A stepping stone or an anonymity network may try to prevent flow correlation by adding chaff traffic, splitting the flow in several subflows or adding random delays. A well-known attack for these types of systems
Elices, Juan A. +1 more
openaire +2 more sources
We address the problem of filling missing entries in a kernel Gram matrix, given a related full Gram matrix. We attack this problem from the viewpoint of regression, assuming that the two kernel matrices can be considered as explanatory variables and ...
Vert, Jean-Philippe +1 more
core +1 more source

