-
1061
A security detection approach based on autonomy-oriented user sensor in social recommendation network
Published 2022-03-01“…Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. …”
Get full text
Article -
1062
Respon Beberapa Varietas Padi Terhadap Serangan Fusarium fujikuroi Penyebab Penyakit Bakanae
Published 2018-03-01“…Level of bakanae disease attack on some rice cultivation land in West Sumatra, especially in Padang Pariaman district is quite high. …”
Get full text
Article -
1063
On Eternal Domination of Generalized Js,m
Published 2021-01-01“…These guards can defend any infinite series of attacks, an attack is defended by moving one guard along an edge from its position to the attacked vertex. …”
Get full text
Article -
1064
Analysis on Invulnerability of Wireless Sensor Network towards Cascading Failures Based on Coupled Map Lattice
Published 2018-01-01“…., random network, small-world network, homogenous scale-free network, and heterogeneous scale-free network) under various attack schemes (i.e., random attack, max-degree attack, and max-status attack) are investigated, respectively. …”
Get full text
Article -
1065
Survey of split learning data privacy
Published 2024-06-01“…Subsequently, two common attacks in split learning, namely the raw data reconstruction attack and the label leakage attack, were introduced. …”
Get full text
Article -
1066
Sex-biased prevalence in infections with heterosexual, direct, and vector-mediated transmission: a theoretical analysis
Published 2018-01-01“…The results on final attack ratios are actually quite similar to those obtained with the second model. …”
Get full text
Article -
1067
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…However, the detection of less frequency attack types such as U2R attacks was quite low with an F1 score of 62.5%. …”
Get full text
Article -
1068
Dynamic Watermarking for Finite Markov Decision Processes
Published 2025-01-01“…Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems. …”
Get full text
Article -
1069
Eternal Domination of Generalized Petersen Graph
Published 2021-01-01“…These guards can defend any infinite series of attacks; an attack is defended by moving one guard along an edge from its position to the attacked vertex. …”
Get full text
Article -
1070
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
Published 2024-01-01“…The proposed work has proved to be highly robust against cyber attacks like man-in-the-middle attacks and spoofing attacks.…”
Get full text
Article -
1071
Impossible differential cryptanalysis of Saturnin algorithm
Published 2022-03-01“…A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the sufficient condition of 3.5-round impossible differential distinguisher of Saturnin was presented and proved, and 2<sup>70.1</sup>truncated impossible differential distinguishers could be quickly constructed by utilizing the sufficient condition.Then, from the constructed 2<sup>70.1</sup>distinguishers, the 64 distinguishers could be picked out pointedly and classified into four types.Four attack trails could be obtained by appending two rounds before the four types of distinguishers.These four attack trails had the same plaintext structure and a number of common subkey bits.With the help of these two properties, the complexity of the attack scheme could be reduced.Combined with the analysis technologies such as early abort, present the 5.5-round impossible differential attack scheme with 2<sup>176.88</sup>chosen plaintexts, 2<sup>143.88</sup> 256-bit blocks, and 2<sup>176.91</sup>5.5-round encryption.As so far, this is the known attack scheme for Saturnin against impossible differential attack.…”
Get full text
Article -
1072
A Case of Syncope Induced in the Supine Position
Published 2011-01-01“…The same attack was reproduced three times in the same situation. …”
Get full text
Article -
1073
A bidirectional authentication protocol for RFID based on Syn
Published 2018-12-01“…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
Get full text
Article -
1074
Leakage-resilient certificateless signcryption scheme
Published 2017-11-01“…In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless signcryption scheme based on Elliptic Curve Cryptography and bilinear pairing was presented.In the random oracle,proved that the security of the scheme is based on the decisional Diffie-Hellman assumption.The scheme is also proved semantically secure against adaptive posterior chosen-ciphertext key-leakage attacks (KL-CCA2),and existentially unforgeable against chosen-message key-leakage attacks(KL-CMA).The proposed scheme was free from non-interactive zero knowledge proof system and needs no bilinear paring operation in signcryption phase.Compared with other schemes of the same kind,the proposed scheme can resist key-leakage attacks and maintains high efficiency.…”
Get full text
Article -
1075
Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos
Published 2016-01-01“…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
Get full text
Article -
1076
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. …”
Get full text
Article -
1077
Security Analysis of HMAC/NMAC by Using Fault Injection
Published 2013-01-01“…In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. …”
Get full text
Article -
1078
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01“…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
Get full text
Article -
1079
Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach
Published 2025-01-01“…To address the detection of such attacks, we first present a traffic modeling framework for three types of potential cyberattacks: malicious manipulation of vehicle control commands, data poison attacks, and denial-of-service (DoS) attacks. …”
Get full text
Article -
1080
Application on Wireless Sensor Networks in Domestic and Hostile Environment
Published 2022-09-01“…Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.…”
Get full text
Article