Results 41 to 50 of about 3,209,774 (327)
Glitch-Resistant Masking Revisited
Implementing the masking countermeasure in hardware is a delicate task. Various solutions have been proposed for this purpose over the last years: we focus on Threshold Implementations (TIs), Domain-Oriented Masking (DOM), the Unified Masking Approach ...
Thorben Moos +3 more
doaj +1 more source
Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J. +4 more
core +2 more sources
Model fusion of deep neural networks for anomaly detection
Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network traffic data are large-scale and imbalanced. Additionally, they have noisy labels.
Nouar AlDahoul +2 more
doaj +1 more source
RMD-QOSM: The NSIS Quality-of-Service Model for Resource Management in Diffserv [PDF]
This document describes a Next Steps in Signaling (NSIS) Quality-of- Service (QoS) Model for networks that use the Resource Management in Diffserv (RMD) concept.
Bader, A. +4 more
core +3 more sources
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj +1 more source
This article examines the role of former National Security Adviser H. R. McMaster in the Trump administration. The article discusses four major roles performed by the APNSA - administrator, coordinator, counselor, agent - and asserts that McMaster served
Mikael Blomdahl
doaj +1 more source
Assessing the Security of Campus Networks: The Case of Seven Universities
The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid
Rui Zheng +4 more
doaj +1 more source
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Physical characteristics of electronic devices, leaking secret and sensitive information to an adversary with physical access, pose a long-known threat to cryptographic hardware implementations.
Jakob Feldtkeller +4 more
doaj +3 more sources
Using the Pattern-of-Life in Networks to Improve the Effectiveness of Intrusion Detection Systems [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be ...
Aparicio-Navarro, Francisco J. +4 more
core +3 more sources
Interviewing suspects: examining the association between skills, questioning, evidence disclosure, and interview outcomes [PDF]
The interviewing of suspects is an important element in the investigation of crime. However, studies concerning actual performance of investigators when undertaking such interviews remain sparse. Nevertheless, in England and Wales, since the introduction
Baldwin J. +17 more
core +3 more sources

