-
61
Automated crowdturfing attack in Chinese user reviews
Published 2019-06-01Subjects: “…automated crowdturfing attack…”
Get full text
Article -
62
-
63
Improved meet-in-the-middle attack on ARIA cipher
Published 2015-03-01Subjects: Get full text
Article -
64
DDoS attacks detection based on link character
Published 2007-01-01“…A new method based on link character was proposed for DDoS attacks detection.Maximum likelihood estima-tion was used to estimate the distribution of link character.SOM neural network is used for link activity profile learning and anomaly link detection.Experiment results indicate that the technique is effective and of a definite practicability.It has a further develop potential for DDoS attacks detection.…”
Get full text
Article -
65
Survey on backdoor attacks targeted on neural network
Published 2021-06-01“…According to existing neural network backdoor attack research works, the concept of neural network backdoor attack is first introduced.Secondly, the research status of neural network backdoor attack is explained from three aspects: research development, summary of typical work and classification.Then, some typical backdoor attack strategies are analyzed in detail.Finally, the research status is summarized and the future research directions are discussed.…”
Get full text
Article -
66
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01Subjects: “…Adversarial evasion attack…”
Get full text
Article -
67
Forgery attacks on several certificateless signature schemes
Published 2020-06-01Subjects: “…public key replacement attack…”
Get full text
Article -
68
New attacks against reduced Rijndael‐160
Published 2022-01-01“…Abstract The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. …”
Get full text
Article -
69
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
70
Lightweight detection system of shared spam attacks
Published 2015-07-01“…Spam is one of the most serious attacks against online social networks (OSN).Recently a new type of spam attack occurs,which named shared spam attack.The shared spam attack can separate the storage and dissemination of spam content,making the existing detection systems no longer effective.To address this problem,an empirical analysis of the process and properties of this new spam attack is performed.A novel lightweight iterative detection algorithm (LIDA) is proposed to detect spam accounts in OSN with these properties.LIDA contains two steps:target filter and content detection.It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts’ sharing instead of scanning or analyzing all accounts.Experimental results in RenRen,which has successfully detected 9 568 spam accounts,30 732 spam albums and 2 626 780 spam URL in four round iterations,indicate that LIDA is effective and efficiency in detecting shared spam accounts.…”
Get full text
Article -
71
Hybrid Intrusion Detection System for DDoS Attacks
Published 2016-01-01“…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. …”
Get full text
Article -
72
Efficient attack detection and data aggregation algorithm
Published 2012-09-01Subjects: Get full text
Article -
73
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…The classification resulting from this model yielded high accuracy with robust results for different attack scenarios. Results reflect the potential superiority of the given model in detecting DDoS attacks. …”
Get full text
Article -
74
-
75
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01“…The purpose of the article is a comprehensive study of modern methods of mathematical modeling of network threats and attacks, as well as studying their effectiveness. …”
Get full text
Article -
76
The Application of Baum-Welch Algorithm in Multistep Attack
Published 2014-01-01“…In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. …”
Get full text
Article -
77
Paroxysmal Amnesia Attacks due to Hashimoto’s Encephalopathy
Published 2016-01-01Get full text
Article -
78
Intrusion Detection for Routing Attacks in Sensor Networks
Published 2006-01-01Get full text
Article -
79
-
80
SYN flood attack defense strategy for asymmetric routing
Published 2013-08-01“…In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. …”
Get full text
Article