Showing 241 - 260 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 241
  2. 242

    Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs by Youngho Cho, Gang Qu

    Published 2013-08-01
    “…Furthermore, we design two attacker-aware protocols to reroute victim nodes' packets by avoiding the attackers. …”
    Get full text
    Article
  3. 243

    Location privacy preserving scheme against attack from friends in SNS by Xi LIN, Yi-liang HAN, Yan KE, Xiao-yuan YANG

    Published 2016-10-01
    “…In order to enrich the performance of the user's location information and to meet the diverse needs of users,a location privacy protection scheme based on attribute encryption was designed,which provided precise,more accurate,fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade,then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed,which shows that the scheme has the advantage of user attribute information confidentiality,data confidentiality and can resist the collusion attack.…”
    Get full text
    Article
  4. 244
  5. 245

    Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures by Stephanie Ness

    Published 2025-01-01
    Subjects: “…Adversarial attacks…”
    Get full text
    Article
  6. 246

    Higher P-Wave Dispersion in Migraine Patients with Higher Number of Attacks by A. Koçer, M. Eryılmaz, H. Tutkan, N. Ercan, Z. S. Küçükbayrak

    Published 2012-01-01
    “…P WD was positively correlated with P max (P<0.01). Attacks number per month and male gender were the factors related to the P WD (P<0.01). …”
    Get full text
    Article
  7. 247

    Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS by Kefei Mao, Jianwei Liu, Jie Chen

    Published 2016-01-01
    “…However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. …”
    Get full text
    Article
  8. 248

    Pixel‐wise supervision for presentation attack detection on identity document cards by Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, Naser Damer

    Published 2022-09-01
    “…In this paper, a pixel‐wise supervision on DenseNet is proposed to detect presentation attacks of the printed and digitally replayed attacks. …”
    Get full text
    Article
  9. 249

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    Subjects: “…low-rate denial of service attack…”
    Get full text
    Article
  10. 250
  11. 251

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. …”
    Get full text
    Article
  12. 252
  13. 253
  14. 254
  15. 255
  16. 256
  17. 257

    Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception by Lihua SONG, Yangyang JIANG, Changyou XING, Guomin ZHANG

    Published 2022-11-01
    “…Using game theory to optimize honeypot behavior is an important method in improving defender’s trapping ability.Existing work tends to use over simplified action spaces and consider isolated game stages.A game model named HoneyED with expanded action spaces and covering comprehensively the whole interaction process between a honeypot and its adversary was proposed.The model was focused on the change in the attacker’s beliefs about its opponent’s real identity.A pure-strategy-equilibrium involving belief was established for the model by theoretical analysis.Then, based on the idea of deep counterfactual regret minimization (Deep-CFR), an optimization algorithm was designed to find an approximate hybrid-strategy-equilibrium.Agents for both sides following hybrid strategies from the approximate equilibrium were obtained.Theoretical and experimental results show that the attacker should quit the game when its belief reaches a certain threshold for maximizing its payoff.But the defender’s strategy is able to maximize the honeypot’s profit by reducing the attacker’s belief to extend its stay as long as possible and by selecting the most suitable response to attackers with different deception recognition abilities.…”
    Get full text
    Article
  18. 258
  19. 259
  20. 260