Results 41 to 50 of about 13,174 (191)

Build It, Break It, Fix It: Contesting Secure Development

open access: yes, 2016
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to assess the ability to securely build software not just break it.
Hicks, Michael   +5 more
core   +1 more source

MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]

open access: yesProceedings on Engineering Sciences
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain   +2 more
doaj   +1 more source

Key exchange with the help of a public ledger

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +1 more source

A Fault Analytic Method against HB+ [PDF]

open access: yes, 2010
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose   +2 more
core   +2 more sources

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

New attacks against reduced Rijndael‐160

open access: yesIET Information Security, 2022
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj   +1 more source

Understanding Mosquito Vector Invasion Pathways: Synergistic Effects of Human Mobility, Climate and Natural Dispersal

open access: yesEcology Letters, Volume 29, Issue 2, February 2026.
Mosquito‐borne diseases are increasing globally, driven by the expanding range of invasive vectors, yet the mechanisms of their spread remain poorly understood. Using 20 years of invasion data from Spain, we combine high‐resolution human mobility data with a metapopulation model to study the colonisation dynamics of Aedes albopictus.
Marta Pardo‐Araujo   +3 more
wiley   +1 more source

DSTC: DNS-based Strict TLS Configurations

open access: yes, 2018
Most TLS clients such as modern web browsers enforce coarse-grained TLS security configurations. They support legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g.
AJ Menezes   +3 more
core   +1 more source

Journalists’ Use of Gender‐Inclusive Language in German Youth Radio: Ethnographic Insights From On‐ and Off‐Air Communication

open access: yesJournal of Sociolinguistics, Volume 30, Issue 1, Page 43-55, February 2026.
ABSTRACT The use of gender‐inclusive language (GIL) in German is frequently examined in linguistics and related fields. While journalistic texts are often the central element of such analyses, research on the actual language users – the journalists – and their complex linguistic practices behind the scenes is rather scarce.
Sarah Josefine Schaefer
wiley   +1 more source

Home - About - Disclaimer - Privacy