Showing 341 - 360 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 341
  2. 342
  3. 343

    Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid by Marc Mangel, Jimmie McEver

    Published 2021-01-01
    “…We use the coupled models, both of which have emergent properties, to investigate two situations. First, when an attacker that relies on stealth compromise is hidden until it is either detected during routine maintenance or an attack is initiated. …”
    Get full text
    Article
  4. 344

    Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review by Kun Hwang, Chan Yong Park

    Published 2024-03-01
    “…The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. …”
    Get full text
    Article
  5. 345
  6. 346

    Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity by Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG

    Published 2015-12-01
    “…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
    Get full text
    Article
  7. 347

    New Practical Attacks on GEA-1 Based on a New-Found Weakness by Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang, Ziyu Guan

    Published 2024-01-01
    “…After then, a new practical key recovery attack on GEA-1 is presented. It has a time complexity of 221.02 GEA-1 encryptions and requires only seven related keys, which is much less than the existing related key attack on GEA-1. …”
    Get full text
    Article
  8. 348

    A Comprehensive Analysis of Robustness in Interdependent Mechatronic Systems under Attack Strategies by Gang Xu, Yanhui Wang, Yucheng Hao, Limin Jia, Zeyun Yang, Zhichao He

    Published 2021-01-01
    “…Then, we also define the robustness metric to quantify the performance of IMECN during the entire attack process. The mass transit vehicle is taken as an example to investigate the impact of attack strategies on the robustness at different δ in a real-world mechatronic system. …”
    Get full text
    Article
  9. 349
  10. 350
  11. 351
  12. 352
  13. 353

    Account hijacking threat attack detection for OAuth2.0 authorization API by Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU

    Published 2019-06-01
    “…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
    Get full text
    Article
  14. 354
  15. 355
  16. 356
  17. 357
  18. 358
  19. 359

    Countering detector manipulation attacks in quantum communication through detector self-testing by Lijiong Shen, Christian Kurtsiefer

    Published 2025-01-01
    “…Apart from various side channels, a vulnerability of single-photon detectors to blinding attacks has been one of the biggest concerns and has been addressed both by technical means as well as advanced protocols. …”
    Get full text
    Article
  20. 360

    A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks by Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li

    Published 2014-01-01
    “…Attacking leads to a failure of one round of communication between the source nodes and destination nodes. …”
    Get full text
    Article