-
341
Defense policies selection method based on attack-defense signaling game model
Published 2016-05-01Subjects: Get full text
Article -
342
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
343
Modeling Coupled Nonlinear Multilayered Dynamics: Cyber Attack and Disruption of an Electric Grid
Published 2021-01-01“…We use the coupled models, both of which have emergent properties, to investigate two situations. First, when an attacker that relies on stealth compromise is hidden until it is either detected during routine maintenance or an attack is initiated. …”
Get full text
Article -
344
Biomechanics of stabbing knife attack for trauma surgeons in Korea: a narrative review
Published 2024-03-01“…The aim of this paper was to review the biomechanics of knife injuries, including those that occur during stabbing rampages. In knife stab attacks, axial force and energy were found to be 1,885 N and 69 J, respectively. …”
Get full text
Article -
345
RUSSIA'S STRATEGIC DETERRENCE AND DEFENSE AGAINST POTENTIAL MEANS AND METHODS OF STRATEGIC ATTACK
Published 2019-01-01Subjects: “…strategic attack…”
Get full text
Article -
346
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Published 2015-12-01“…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
Get full text
Article -
347
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…After then, a new practical key recovery attack on GEA-1 is presented. It has a time complexity of 221.02 GEA-1 encryptions and requires only seven related keys, which is much less than the existing related key attack on GEA-1. …”
Get full text
Article -
348
A Comprehensive Analysis of Robustness in Interdependent Mechatronic Systems under Attack Strategies
Published 2021-01-01“…Then, we also define the robustness metric to quantify the performance of IMECN during the entire attack process. The mass transit vehicle is taken as an example to investigate the impact of attack strategies on the robustness at different δ in a real-world mechatronic system. …”
Get full text
Article -
349
Wild Boar Attacks on Hunting Dogs in Czechia: The Length of the Hunting Season Matters
Published 2025-01-01“…The number of attacks only increased with the length of the hunting season. …”
Get full text
Article -
350
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01Subjects: “…attack graph…”
Get full text
Article -
351
Retracted: Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation
Published 2024-01-01Get full text
Article -
352
-
353
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01“…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
Get full text
Article -
354
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
Published 2013-06-01Subjects: Get full text
Article -
355
Statistical-based detection of pilot contamination attack for NOMA in 5G networks
Published 2025-01-01Subjects: Get full text
Article -
356
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01Subjects: Get full text
Article -
357
Cardiac Calcified Amorphous Tumor of the Mitral Valve Presenting as Transient Ischemic Attack
Published 2017-01-01Get full text
Article -
358
Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks
Published 2025-01-01Subjects: Get full text
Article -
359
Countering detector manipulation attacks in quantum communication through detector self-testing
Published 2025-01-01“…Apart from various side channels, a vulnerability of single-photon detectors to blinding attacks has been one of the biggest concerns and has been addressed both by technical means as well as advanced protocols. …”
Get full text
Article -
360
A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks
Published 2014-01-01“…Attacking leads to a failure of one round of communication between the source nodes and destination nodes. …”
Get full text
Article