Results 11 to 20 of about 462,135 (294)

Possibilities of conducting XSS-attacks and the development of countermeasures [PDF]

open access: yesE3S Web of Conferences, 2020
The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches were determined whether XSS–attack can be fulfilled successfully, and vulnerability detection ...
Revyakina Yelena   +5 more
doaj   +1 more source

Logical Modes of Attack in Argumentation Networks [PDF]

open access: yesStudia Logica, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gabbay, Dov, d'Avila Garcez, A
openaire   +2 more sources

Functional Analysis Attacks on Logic Locking [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2019
Logic locking refers to a set of techniques that can protect integrated circuits (ICs) from counterfeiting, piracy and malicious functionality changes by an untrusted foundry. It achieves these goals by introducing new inputs, called key inputs, and additional logic to an IC such that the circuit produces the correct output only when the key inputs are
Deepak Sirone, Pramod Subramanyan
openaire   +2 more sources

Resynthesis-based Attacks Against Logic Locking

open access: yes2023 24th International Symposium on Quality Electronic Design (ISQED), 2023
Logic locking has been a promising solution to many hardware security threats, such as intellectual property infringement and overproduction. Due to the increased attention that threats have received, many efficient specialized attacks against logic locking have been introduced over the years. However, the ability of an adversary to manipulate a locked
Almeida, Felipe   +5 more
openaire   +2 more sources

Mitigating SAT Attack on Logic Locking [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2016
Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of ...
Yang Xie, Ankur Srivastava
openaire   +3 more sources

Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things

open access: yesSensors, 2020
Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are
Jingwen Yan   +5 more
doaj   +1 more source

A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning

open access: yesApplied Sciences, 2023
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities.
Xiaotong Cui   +6 more
doaj   +1 more source

Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems

open access: yesShanghai Jiaotong Daxue xuebao, 2021
The network security situational awareness (NSSA) technology, which can perceive the potential network security risks globally and dynamically, is receiving more and more attention.With the help of machine learning, artificial intelligence, big data, and
ZHANG Liang, QU Gang, LI Huixing, JIN Haochun
doaj   +1 more source

AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks

open access: yesSensors, 2023
Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its “network brain” located at the control plane.
Sameer Ali   +6 more
doaj   +1 more source

LOGICAL TIME AND SPACE OF THE NETWORK INTRUSION

open access: yesStudia Universitatis Babes-Bolyai: Series Informatica, 2017
Nowadays, one of the biggest threats for modern computer networks are the cyber attacks. One of the possible ways how to increase the level of computer networks security is a deployment of a network intrusion detection system.
Daniel MIHÁLYI   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy