Showing 2,201 - 2,220 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 2201

    Risk, Disappointment and Distraction in Keith Gessen’s All the Sad Young Literary Men by James Peacock

    Published 2014-01-01
    “…It is not concerned, explicitly, with the aftermath of the attacks. Like many “post-9/11” texts, however, it asks questions about the ability of twenty-first century writers to tackle big issues—tragedy, violence, history. …”
    Get full text
    Article
  2. 2202

    Apple Maggot, Apple Maggot Fly, Rhagoletis pomonella (Walsh) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Thomas R. Fasulo

    Published 2012-03-01
    “…Thin skinned sweet and subacid varieties are most susceptible, but acid varieties may be attacked. This revised 4-page fact sheet was written by H. …”
    Get full text
    Article
  3. 2203

    Design and implementation of secure Windows platform based on TCM by Wei FENG, Yu QIN, Deng-guo FENG, Bo YANG, Ying-jun ZHANG

    Published 2015-08-01
    “…A secure Windows platform solution based on TCM was proposed to solve the integrity measurement and attestation problem of the Windows system.Two security modes were realized by extending the Windows kernel:in the measurement mode,all executable contents that were loaded onto the Windows system were measured,and the TCM provided the protection and outward attestation for these measurements; and in the control mode,the measurements were further compared with a whitelist customized by an administrator,and all the programs that were not included in the whitelist would be prohibited from running.Experiment analysis shows that proposed solution can enhance the security of Windows platform and resist some software attacks; and at the same time,the average performance overhead is about 20~30ms,which will not influence the normal running of Windows.…”
    Get full text
    Article
  4. 2204

    Langage et construction de règles en jeux collectifs by Florence Darnis, Lucile Lafont

    Published 2016-01-01
    “…Furthermore, at school, they have to write in a cooperative learning setting attackers action rules and defenders action rules. …”
    Get full text
    Article
  5. 2205

    Security analysis and improvement of a certificateless signcryption scheme by Zhen-guo ZHAO

    Published 2015-03-01
    “…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. A strongly secure certificateless signcryption without bilinear pairings was also proposed, which was provably secure in the random oracle model under the assumption that the discrete logarithm problem and the computational Diffie-Hellman problems were intractable. …”
    Get full text
    Article
  6. 2206

    Cloud storage scheme based on closed-box encryption by Rui-zhong DU, Shao-xuan WANG, Jun-feng TIAN

    Published 2017-07-01
    “…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
    Get full text
    Article
  7. 2207

    Research on software-defined network and the security defense technology by Tao WANG, Hong-chang CHEN, Guo-zhen CHENG

    Published 2017-11-01
    “…Software-defined network (SDN) separated the traditional control plane from the data plane,formed a centralized controller,opened up the network programming interface,simplified network management,promoted network innovation and optimized network operation.However,SDN's “three-layer two-interface” architecture increased the network attack surface,resulting in many new security issues.The development,characteristics and working principle of SDN were first introduced,and the existing security problems from the application layer,the northbound interface,the control plane,the southbound interface,the data plane were summarized respectively.Secondly,the latest research progress and existing solutions were discussed.Finally,SDN current and future security challenges were summarized,and the future SDN security development direction was looked forward to.…”
    Get full text
    Article
  8. 2208

    Research and practice on power big data security governance system by Hongbin ZHU, Long AN, Mingchen YANG

    Published 2019-11-01
    “…The blackmail attacks and data leakage problems of big data had become increasingly serious in recent years,and the state had successively issued a series of relevant laws and regulations to clarify the requirements for big data security work.Power big data assets had the characteristics of large data volume,wide distribution,high utilization value and high sensitivity.It was urgent to carry out research on big data security governance technology.Based on the analysis of the challenges faced by power big data security,the power big data security governance system was designed,the power big data security governance requirements were put forward,and the data security management and control was verified by the research and development of power big data security governance platform.…”
    Get full text
    Article
  9. 2209

    DGANS:robustness image steganography model based on double GAN by Leqing ZHU, Yu GUO, Lingqiang MO, Daxing ZHANG

    Published 2020-01-01
    “…Deep convolutional neural networks can be effectively applied to large-capacity image steganography,but the research on their robustness is rarely reported.The DGANS (double-GAN-based steganography) applies the deep learning framework in image steganography,which is optimized to resist small geometric distortions so as to improve the model’s robustness.DGANS is made up of two consecutive generative adversarial networks that can hide a grayscale image into another color or grayscale image of the same size and can restore it later.The generated stego-images are augmented and used to further train and strengthen the reveal network so as to make it adaptive to small geometric distortion of input images.Experimental results suggest that DGANS can not only realize high-capacity image steganography,but also can resist geometric attacks within certain range,which demonstrates better robustness than similar models.…”
    Get full text
    Article
  10. 2210

    Wireless Multiple Access and Analog Oscillation Analysis in Microgrids: A Prony Approach by Shuping Gong, Husheng Li

    Published 2012-10-01
    “…Two countermeasures, max-min ratio measure (MMRM) and variance measure (VM), are also proposed to prevent possible attacks of false reports. Numerical simulation results demonstrate the effectiveness of Prony-based algorithms and the two countermeasures.…”
    Get full text
    Article
  11. 2211

    Enfouissement du témoignage et archivage oraculaire dans Oracle Night de Paul Auster by François Hugonnier

    Published 2017-12-01
    “…This article explores the inscription of historical testimony within fictional frames, by way of collage, fragmentation, ellipsis, chronological reshuffling and polyphonia, whose upshot is the broadening of the writer’s scope after 1945. Here the 9/11 attacks surface fleetingly, by way of a belated negative.…”
    Get full text
    Article
  12. 2212

    Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition by Ting WU, Chengnan HU, Qingnan CHEN, Anbang CHEN, Qiuhua ZHENG

    Published 2021-03-01
    “…Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.…”
    Get full text
    Article
  13. 2213

    « Mr Azn@r, parT » by Ludivine Thouverez

    Published 2004-09-01
    “…The attacks of the 11th of march in Madrid provoked a division between the mass media and the Spanish society. …”
    Get full text
    Article
  14. 2214

    Lightweight security architecture design for wireless sensor network by Chao WANG, Guang-yue HU, Huan-guo ZHANG

    Published 2012-02-01
    “…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
    Get full text
    Article
  15. 2215

    Preparing to Evacuate your Home in Case of an Emergency by Elizabeth B. Bolton

    Published 2003-07-01
    “… During these times of potential terrorist attacks, it is important to plan for the worst and hope that it never happens. …”
    Get full text
    Article
  16. 2216

    Citrus peelminer Marmara gulosa Guillèn and Davis (Insecta: Lepidoptera: Gracillariidae) by Lukasz L. Stelinski

    Published 2013-04-01
    “…This moth is considered native in the United States, attacking willow. It is believed that a host-shift occurred to multiple non-native plants including all varieties of citrus and certain ornamentals, such as oleander. …”
    Get full text
    Article
  17. 2217

    Research on ciphertext search and sharing technology in edge computing mode by Jifeng WANG, Guofeng WANG

    Published 2022-04-01
    “…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
    Get full text
    Article
  18. 2218

    Apple Maggot, Apple Maggot Fly, Rhagoletis pomonella (Walsh) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Thomas R. Fasulo

    Published 2012-03-01
    “…Thin skinned sweet and subacid varieties are most susceptible, but acid varieties may be attacked. This revised 4-page fact sheet was written by H. …”
    Get full text
    Article
  19. 2219

    Security mechanism in access control based on non-cooperative game by Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO

    Published 2014-11-01
    “…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
    Get full text
    Article
  20. 2220

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article