Showing 61 - 80 results of 3,648 for search '"Attacker"', query time: 0.07s Refine Results
  1. 61

    Automated crowdturfing attack in Chinese user reviews by Li’na WANG, Xiaodong GUO, Run WANG

    Published 2019-06-01
    Subjects: “…automated crowdturfing attack…”
    Get full text
    Article
  2. 62
  3. 63
  4. 64

    DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li

    Published 2007-01-01
    “…A new method based on link character was proposed for DDoS attacks detection.Maximum likelihood estima-tion was used to estimate the distribution of link character.SOM neural network is used for link activity profile learning and anomaly link detection.Experiment results indicate that the technique is effective and of a definite practicability.It has a further develop potential for DDoS attacks detection.…”
    Get full text
    Article
  5. 65

    Survey on backdoor attacks targeted on neural network by Qingyin TAN, Yingming ZENG, Ye HAN, Yijing LIU, Zheli LIU

    Published 2021-06-01
    “…According to existing neural network backdoor attack research works, the concept of neural network backdoor attack is first introduced.Secondly, the research status of neural network backdoor attack is explained from three aspects: research development, summary of typical work and classification.Then, some typical backdoor attack strategies are analyzed in detail.Finally, the research status is summarized and the future research directions are discussed.…”
    Get full text
    Article
  6. 66
  7. 67

    Forgery attacks on several certificateless signature schemes by Jing WANG, Zumeng LI

    Published 2020-06-01
    Subjects: “…public key replacement attack…”
    Get full text
    Article
  8. 68

    New attacks against reduced Rijndael‐160 by Xiaoli Dong, Yongzhuang Wei

    Published 2022-01-01
    “…Abstract The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. …”
    Get full text
    Article
  9. 69
  10. 70

    Lightweight detection system of shared spam attacks by Shao-qing LV, Dan FAN, Yu-qing ZHANG

    Published 2015-07-01
    “…Spam is one of the most serious attacks against online social networks (OSN).Recently a new type of spam attack occurs,which named shared spam attack.The shared spam attack can separate the storage and dissemination of spam content,making the existing detection systems no longer effective.To address this problem,an empirical analysis of the process and properties of this new spam attack is performed.A novel lightweight iterative detection algorithm (LIDA) is proposed to detect spam accounts in OSN with these properties.LIDA contains two steps:target filter and content detection.It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts’ sharing instead of scanning or analyzing all accounts.Experimental results in RenRen,which has successfully detected 9 568 spam accounts,30 732 spam albums and 2 626 780 spam URL in four round iterations,indicate that LIDA is effective and efficiency in detecting shared spam accounts.…”
    Get full text
    Article
  11. 71

    Hybrid Intrusion Detection System for DDoS Attacks by Özge Cepheli, Saliha Büyükçorak, Güneş Karabulut Kurt

    Published 2016-01-01
    “…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. …”
    Get full text
    Article
  12. 72
  13. 73

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…The classification resulting from this model yielded high accuracy with robust results for different attack scenarios. Results reflect the potential superiority of the given model in detecting DDoS attacks. …”
    Get full text
    Article
  14. 74
  15. 75

    Prediction of Network Threats and Attacks by Mathematical Simulation by Daniil Doroshenko

    Published 2024-11-01
    “…The purpose of the article is a comprehensive study of modern methods of mathematical modeling of network threats and attacks, as well as studying their effectiveness. …”
    Get full text
    Article
  16. 76

    The Application of Baum-Welch Algorithm in Multistep Attack by Yanxue Zhang, Dongmei Zhao, Jinxing Liu

    Published 2014-01-01
    “…In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. …”
    Get full text
    Article
  17. 77
  18. 78
  19. 79
  20. 80

    SYN flood attack defense strategy for asymmetric routing by Jian-xi TAO, Li ZHOU, Zhou ZHOU, Wei YANG, Qing-yun LIU, Rong YANG

    Published 2013-08-01
    “…In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. …”
    Get full text
    Article