Results 81 to 90 of about 587,598 (211)
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
As the important means of network security, intrusion detection and prevention technology have seen some preliminary applications in the traditional wired network environment.
Guanlin Chen, Zebing Wang, Yong Zhang
doaj +2 more sources
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance [PDF]
Jovan Dj. Golić, Miodrag J. Mihaljević
openalex +1 more source
Web Application DDoS Attack Defense Using Access Correlation [PDF]
Nguyen Nghia Huynh Thi +2 more
openalex +1 more source
Erratum to: Zero-correlation linear attack on reduced-round SKINNY [PDF]
Yi Zhang, Ting Cui, Congjun Wang
openalex +1 more source
Investigation of real-gas and viscous effects on the aerodynamic characteristics of a 40 deg half-cone with suggested correlations for the shuttle orbiter [PDF]
Parameters were evaluated that might be used to correlate shuttle orbiter aerodynamic data to be used in extrapolating from wind-tunnel to flight conditions.
Hunt, J. L., Jones, R. A., Woods, W. C.
core +1 more source
Agcm: A Multi-Stage Attack Correlation and Scenario Reconstruction Method Based on Graph Aggregation
Hongshuo Lyu +4 more
openalex +1 more source
Fast Correlation Attacks: Methods and Countermeasures [PDF]
Fast correlation attacks have considerably evolved since their first appearance. They have lead to new design criteria of stream ciphers, and have found applications in other areas of communications and cryptography. In this paper, a review of the development of fast correlation attacks and their implications on the design of stream ciphers over the
openaire +1 more source
A Security Event Correlation Algorithm Based On Attack Sequence [PDF]
De-dong ZHANG +2 more
openalex +1 more source

