Results 11 to 20 of about 70,576 (258)
This paper considers the problem of estimating the parameters of a frequency-hopping signal under non-cooperative conditions. To make the estimation of different parameters independently of each other, a compressed domain frequency-hopping signal ...
Weipeng Zhu +3 more
doaj +1 more source
Working Mode Recognition of Non-Specific Radar Based on ResNet-SVM Learning Framework
Mode recognition is a basic task to interpret the behavior of multi-functional radar. The existing methods need to train complex and huge neural networks to improve the recognition ability, and it is difficult to deal with the mismatch between the ...
Jifei Pan, Jingwei Xiong, Yihong Zhuo
doaj +1 more source
As used in modern practice, judicial decisions, and literature, the term “countermeasures” covers the main part of the classical subject of “reprisals,” to which the first monographs of international law were devoted in the 14th century (B. de Sassoferrato and G. de Legnano).
Keijo Haataja +3 more
+7 more sources
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security [PDF]
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged repaired version by Coron et al.
Guilley, Sylvain, Rauzy, Pablo
core +3 more sources
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core +12 more sources
Hardware architecture implemented on FPGA for protecting cryptographic keys against side-channel attacks [PDF]
This paper presents a new hardware architecture designed for protecting the key of cryptographic algorithms against attacks by side-channel analysis (SCA).
Cantó Navarro, Enrique +2 more
core +2 more sources
Formal verification of a software countermeasure against instruction skip attacks [PDF]
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle +3 more
core +7 more sources
Bacillus anthracis is a potent biowarfare agent, able to be highly lethal. The bacteria dwell in the soil of certain regions, as natural flora.
Aleksandra Nakonieczna +5 more
doaj +1 more source
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto +3 more
core +3 more sources
Performance Evaluation of Deception Against Synthetic Aperture Radar Based on Multifeature Fusion
Deception is an effective means of jamming against synthetic aperture radar (SAR). The performance of deceptive jamming is affected by the accuracy of parameter measurement and the applied antijamming methods of SAR.
Tian Tian +6 more
doaj +1 more source

