Results 1 to 10 of about 462,016 (176)

Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures.
Stéphane Paul
doaj   +6 more sources

Study on cybersecurity attack-defense visualization method based on intelligent connected vehicle [PDF]

open access: yesE3S Web of Conferences, 2021
Attack test and defense verification are important ways to effectively evaluate the cybersecurity performance of Intelligent Connected Vehicle (ICV). This paper investigates the problem of attack-defense visualization in ICV cybersecurity.
Wang Yafei   +3 more
doaj   +1 more source

Exploration of Mathematics Problem Solving Processes of Junior High School Students with Different Levels of Logical Thinking Ability

open access: yesIndonesian Journal of Science and Mathematics Education, 2022
Problem solving is one of the most important skills for students. Meanwhile, logical thinking is the ability to solve problems by relying on mental abilities.
Tika Nurhalisa   +3 more
doaj   +1 more source

Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio

open access: yesCryptography, 2022
The rapidly increasing use of the internet has led to an increase in new devices and technologies; however, attack and security violations have grown exponentially as well.
Sneha Chauhan   +2 more
doaj   +1 more source

A Survey of MulVAL Extensions and Their Attack Scenarios Coverage

open access: yesIEEE Access, 2023
Organizations employ various adversary models to assess the risk and potential impact of attacks on their networks. A popular method of visually representing cyber risks is the attack graph. Attack graphs represent vulnerabilities and actions an attacker
David Tayouri   +3 more
doaj   +1 more source

Classification of logical vulnerability based on group attacking method [PDF]

open access: yes, 2020
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal   +2 more
core   +2 more sources

Research on Java card security

open access: yes网络与信息安全学报, 2017
To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault ...
Xue-lian ZHANG   +4 more
doaj   +3 more sources

Searching for an Efficient System of Equations Defining the AES Sbox for the QUBO Problem

open access: yesJournal of Telecommunications and Information Technology, 2023
The time complexity of solving the QUBO problem depends mainly on the number of logical variables in the problem. This paper focuses mainly on finding a system of equations that uniquely defines the Sbox of the AES cipher and simultaneously allows us to
Elżbieta Burek   +2 more
doaj   +1 more source

Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems

open access: yesSensors, 2020
Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric ...
Benoit Vibert   +3 more
doaj   +1 more source

Classifying Argumentative Relations Using Logical Mechanisms and Argumentation Schemes

open access: yesTransactions of the Association for Computational Linguistics, 2021
While argument mining has achieved significant success in classifying argumentative relations between statements (support, attack, and neutral), we have a limited computational understanding of logical mechanisms that constitute those ...
Yohan Jo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy