Showing 941 - 960 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 941
  2. 942
  3. 943
  4. 944
  5. 945
  6. 946
  7. 947

    Partially policy hidden CP-ABE supporting dynamic policy updating by Zuo-bin YING, Jian-feng MA, Jiang-tao CUI

    Published 2015-12-01
    Subjects: “…adaptive chosen plaintext attack secure…”
    Get full text
    Article
  8. 948
  9. 949
  10. 950
  11. 951

    Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments by Hanan Abbas Mohammad

    Published 2024-12-01
    Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
    Get full text
    Article
  12. 952
  13. 953
  14. 954
  15. 955
  16. 956
  17. 957
  18. 958
  19. 959
  20. 960

    Negative feedback scheduling algorithm based on historical information in SDN by Yingying LYU, Yunfei GUO, Zhenpeng WANG, Guozhen CHENG, Yawen WANG

    Published 2018-06-01
    “…In the current SDN architecture,the controllers suffer from lots of potential attacks.For example,malicious flow rule attacks may introduce fake flow rules to confuse the host.A negative feedback scheduling algorithm based on historical information was proposed,in which hypothesis testing was used to judge the behavior of the attacker and the result will be used as a basis for scheduling.Simulation results and analysis show that,compared with the traditional scheduling methods,the proposed algorithm can increase the attacker’s time cost to a certain extent,so as to effectively defend the attacker’s probe attack.In addition,the more types of controllers,the more difficult it is to break the system.…”
    Get full text
    Article