Showing 601 - 620 results of 3,648 for search '"Attacker"', query time: 0.08s Refine Results
  1. 601
  2. 602
  3. 603

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  4. 604

    Designing Attack Surface in Early Childhood Education System Environment using Risk Assessment and Enterprise Architecture Approach by Dadang Setiawan, Dita Oktaria, Sidik Prabowo, Elizabeth Sastrina Indrasari

    Published 2024-11-01
    “…This research addresses the challenge of securing Indonesia’s early childhood education systems by designing a minimized attack surface through the integration of ISO 27005-based risk assessment and the TOGAF enterprise architecture framework. …”
    Get full text
    Article
  5. 605

    Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks by M. Mubeen Tajudeen, M. Syed Ali, Syeda Asma Kauser, Khanyaluck Subkrajang, Anuwat Jirawattanapanit, Grienggrai Rajchakit

    Published 2022-01-01
    “…This study concentrates on adaptive event-triggered control of complex dynamical networks with unpredictable coupling delays and stochastic deception attacks. The adaptive event-triggered mechanism is used to avoid the wasting of limited bandwidth. …”
    Get full text
    Article
  6. 606

    A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection by Han Zhuoxi

    Published 2025-01-01
    “…With the continuous advancement of Internet technology, cybersecurity threats are growing more urgent as attack techniques become increasingly sophisticated. …”
    Get full text
    Article
  7. 607
  8. 608
  9. 609
  10. 610

    In search of a warning strategy against exchange-rate attacks: Forecasting tactics using artificial neural networks by A. S. Andreou, G. A. Zombanakis, E. F. Georgopoulos, S. D. Likothanassis

    Published 2000-01-01
    “…“Heart attacks and devaluations are not predictable and, certainly, are never preannounced”. …”
    Get full text
    Article
  11. 611

    Species and Termite Attack Intensity on Pine Trees in Nagari Talang Babungo, Solok District, West Sumatra Province by Desyanti Desyanti, Fauzan Fauzan, Zulhilda Yenti

    Published 2023-07-01
    “…The intensity of the termite attack was relatively low, with a percentage of lose weight by using graveyard test was 17.7%. …”
    Get full text
    Article
  12. 612

    DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments by Min Su Song, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, Jong Hyuk Park

    Published 2014-01-01
    “…However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. …”
    Get full text
    Article
  13. 613
  14. 614
  15. 615
  16. 616
  17. 617
  18. 618
  19. 619
  20. 620