Showing 81 - 100 results of 3,648 for search '"Attacker"', query time: 0.12s Refine Results
  1. 81
  2. 82

    Effect of the difference enumeration attack on LowMC instances by Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU

    Published 2021-06-01
    Subjects: “…difference enumeration attack…”
    Get full text
    Article
  3. 83

    Automatic proof of resistance of denial of service attacks in protocols by Bo MENG, Wei HUANG, De-jun WAND, Fei SHAO

    Published 2012-03-01
    Subjects: “…denial of service attacks…”
    Get full text
    Article
  4. 84
  5. 85
  6. 86
  7. 87
  8. 88
  9. 89
  10. 90
  11. 91

    Attack simulation and signature extraction of low-rate DDoS by WU Zhi-jun, ZHANG Dong

    Published 2008-01-01
    “…Experiments show that LDDoS attack traffic exhibit strong periodicity. Based on the periodical feature of LDDoS attack, the signatures of LDDoS attack are extracted through analyzing the cache queue of target router for the purpose of detection and defense of LDDoS attack. …”
    Get full text
    Article
  12. 92
  13. 93
  14. 94

    Zero correlation-integral attack of MIBS block cipher by Qing-cong LIU, Ya-qun ZHAO, Meng MA, Feng-mei LIU

    Published 2016-11-01
    “…Finally, considering the symmetrical structure of the MIBS and using the partial-sum technique, it applied integral attack to 10 and 12 rounds of MIBS-80. The time com-plexities of 10 and 12 round attack on MIBS-80 are 2<sup>27.68</sup>and 2<sup>48.81</sup>. …”
    Get full text
    Article
  15. 95
  16. 96
  17. 97

    A novel perturbation attack on SVM by greedy algorithm by Yaguan QIAN, Xiaohui GUAN, Shuhui WU, NBensheng YU, Dongxiao REN

    Published 2019-01-01
    “…With the increasing concern of machine learning security issues, an adversarial sample generation method for SVM was proposed. This attack occurred in the testing stage by manipulating with the sample tofool the SVM classification model. …”
    Get full text
    Article
  18. 98

    Research on SSDF Attack and Defense for Cooperative Spectrum Sensing by Jingyu Feng

    Published 2014-01-01
    Subjects: “…spectrum sensing data falsification attack…”
    Get full text
    Article
  19. 99
  20. 100