Results 1 to 10 of about 462,016 (176)
Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study [PDF]
Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures.
Stéphane Paul
doaj +6 more sources
Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle [PDF]
Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity.
Wang Yafei +3 more
doaj +1 more source
Problem solving is one of the most important skills for students. Meanwhile, logical thinking is the ability to solve problems by relying on mental abilities.
Tika Nurhalisa +3 more
doaj +1 more source
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio
The rapidly increasing use of the internet has led to an increase in new devices and technologies; however, attack and security violations have grown exponentially as well.
Sneha Chauhan +2 more
doaj +1 more source
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage
Organizations employ various adversary models to assess the risk and potential impact of attacks on their networks. A popular method of visually representing cyber risks is the attack graph. Attack graphs represent vulnerabilities and actions an attacker
David Tayouri +3 more
doaj +1 more source
Classification of logical vulnerability based on group attacking method [PDF]
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal +2 more
core +2 more sources
Research on Java card security
To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault ...
Xue-lian ZHANG +4 more
doaj +3 more sources
Searching for an Efficient System of Equations Defining the AES Sbox for the QUBO Problem
The time complexity of solving the QUBO problem depends mainly on the number of logical variables in the problem. This paper focuses mainly on finding a system of equations that uniquely defines the Sbox of the AES cipher and simultaneously allows us to
Elżbieta Burek +2 more
doaj +1 more source
Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems
Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric ...
Benoit Vibert +3 more
doaj +1 more source
Classifying Argumentative Relations Using Logical Mechanisms and Argumentation Schemes
While argument mining has achieved significant success in classifying argumentative relations between statements (support, attack, and neutral), we have a limited computational understanding of logical mechanisms that constitute those ...
Yohan Jo +3 more
doaj +1 more source

