Showing 1,061 - 1,080 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1061

    A security detection approach based on autonomy-oriented user sensor in social recommendation network by Shanshan Wan, Ying Liu

    Published 2022-03-01
    “…Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. …”
    Get full text
    Article
  2. 1062

    Respon Beberapa Varietas Padi Terhadap Serangan Fusarium fujikuroi Penyebab Penyakit Bakanae by Darnetty Darnetty, Eri Sulyanti

    Published 2018-03-01
    “…Level of bakanae disease attack on some rice cultivation land in West Sumatra, especially in Padang Pariaman district is quite high. …”
    Get full text
    Article
  3. 1063

    On Eternal Domination of Generalized Js,m by Ramy Shaheen, Mohammad Assaad, Ali Kassem

    Published 2021-01-01
    “…These guards can defend any infinite series of attacks, an attack is defended by moving one guard along an edge from its position to the attacked vertex. …”
    Get full text
    Article
  4. 1064

    Analysis on Invulnerability of Wireless Sensor Network towards Cascading Failures Based on Coupled Map Lattice by Xiuwen Fu, Yongsheng Yang, Haiqing Yao

    Published 2018-01-01
    “…., random network, small-world network, homogenous scale-free network, and heterogeneous scale-free network) under various attack schemes (i.e., random attack, max-degree attack, and max-status attack) are investigated, respectively. …”
    Get full text
    Article
  5. 1065

    Survey of split learning data privacy by QIN Yiqun, MA Xiaojing, FU Jiayun, HU Pingyi, XU Peng, JIN Hai

    Published 2024-06-01
    “…Subsequently, two common attacks in split learning, namely the raw data reconstruction attack and the label leakage attack, were introduced. …”
    Get full text
    Article
  6. 1066

    Sex-biased prevalence in infections with heterosexual, direct, and vector-mediated transmission: a theoretical analysis by Andrea Pugliese, Abba B. Gumel, Fabio A. Milner, Jorge X. Velasco-Hernandez

    Published 2018-01-01
    “…The results on final attack ratios are actually quite similar to those obtained with the second model. …”
    Get full text
    Article
  7. 1067

    Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model by Godfrey A. Mills, Daniel K. Acquah, Robert A. Sowah

    Published 2024-01-01
    “…However, the detection of less frequency attack types such as U2R attacks was quite low with an F1 score of 62.5%. …”
    Get full text
    Article
  8. 1068

    Dynamic Watermarking for Finite Markov Decision Processes by Jiacheng Tang, Jiguo Song, Abhishek Gupta

    Published 2025-01-01
    “…Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems. …”
    Get full text
    Article
  9. 1069

    Eternal Domination of Generalized Petersen Graph by Ramy Shaheen, Ali Kassem

    Published 2021-01-01
    “…These guards can defend any infinite series of attacks; an attack is defended by moving one guard along an edge from its position to the attacked vertex. …”
    Get full text
    Article
  10. 1070

    Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud by Vikas K. Soman, V. Natarajan

    Published 2024-01-01
    “…The proposed work has proved to be highly robust against cyber attacks like man-in-the-middle attacks and spoofing attacks.…”
    Get full text
    Article
  11. 1071

    Impossible differential cryptanalysis of Saturnin algorithm by Zilong JIANG, Chenhui JIN

    Published 2022-03-01
    “…A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the sufficient condition of 3.5-round impossible differential distinguisher of Saturnin was presented and proved, and 2<sup>70.1</sup>truncated impossible differential distinguishers could be quickly constructed by utilizing the sufficient condition.Then, from the constructed 2<sup>70.1</sup>distinguishers, the 64 distinguishers could be picked out pointedly and classified into four types.Four attack trails could be obtained by appending two rounds before the four types of distinguishers.These four attack trails had the same plaintext structure and a number of common subkey bits.With the help of these two properties, the complexity of the attack scheme could be reduced.Combined with the analysis technologies such as early abort, present the 5.5-round impossible differential attack scheme with 2<sup>176.88</sup>chosen plaintexts, 2<sup>143.88</sup> 256-bit blocks, and 2<sup>176.91</sup>5.5-round encryption.As so far, this is the known attack scheme for Saturnin against impossible differential attack.…”
    Get full text
    Article
  12. 1072

    A Case of Syncope Induced in the Supine Position by Kazuo Eguchi, Akihiro Tsujita, Syoji Ono, Kazuomi Kario

    Published 2011-01-01
    “…The same attack was reproduced three times in the same situation. …”
    Get full text
    Article
  13. 1073

    A bidirectional authentication protocol for RFID based on Syn by Shanhua ZHAN, Shaorong HUANG

    Published 2018-12-01
    “…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
    Get full text
    Article
  14. 1074

    Leakage-resilient certificateless signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU

    Published 2017-11-01
    “…In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless signcryption scheme based on Elliptic Curve Cryptography and bilinear pairing was presented.In the random oracle,proved that the security of the scheme is based on the decisional Diffie-Hellman assumption.The scheme is also proved semantically secure against adaptive posterior chosen-ciphertext key-leakage attacks (KL-CCA2),and existentially unforgeable against chosen-message key-leakage attacks(KL-CMA).The proposed scheme was free from non-interactive zero knowledge proof system and needs no bilinear paring operation in signcryption phase.Compared with other schemes of the same kind,the proposed scheme can resist key-leakage attacks and maintains high efficiency.…”
    Get full text
    Article
  15. 1075

    Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos by Jian Wang

    Published 2016-01-01
    “…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
    Get full text
    Article
  16. 1076

    Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks by Jun-Sub Kim, Jin Kwak

    Published 2014-04-01
    “…However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. …”
    Get full text
    Article
  17. 1077

    Security Analysis of HMAC/NMAC by Using Fault Injection by Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

    Published 2013-01-01
    “…In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main idea of their attack. …”
    Get full text
    Article
  18. 1078

    Research and design of authenticated encryption algorithm based on AES round function by Guoqiang GAO, Zichen LI

    Published 2020-04-01
    “…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
    Get full text
    Article
  19. 1079

    Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach by Tianyi Li, Mingfeng Shang, Shian Wang, Raphael Stern

    Published 2025-01-01
    “…To address the detection of such attacks, we first present a traffic modeling framework for three types of potential cyberattacks: malicious manipulation of vehicle control commands, data poison attacks, and denial-of-service (DoS) attacks. …”
    Get full text
    Article
  20. 1080

    Application on Wireless Sensor Networks in Domestic and Hostile Environment by lu fan

    Published 2022-09-01
    “…Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.…”
    Get full text
    Article