-
1121
Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud
Published 2021-06-01“…Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these security threats, a dynamic heterogeneous scheduling method based on Stackelberg game in the container cloud was proposed.First, a heterogeneous mirrored resource pool is constructed to suppress the spread of attacks based on common-mode vulnerabilities on the cloud.Then, the offensive and defense interaction process is modeled as a Stackelberg game model.Finally, the offensive and defensive model is analyzed, and the system scheduling problem is modeled as a mixed integer non-linear programming problem to solve the system's optimal scheduling strategy.Experiments show that the proposed method can improve the defense effect of the cloud platform and reduce the system defense overhead.…”
Get full text
Article -
1122
Image encryption algorithms based on chaos through dual scrambling of pixel position and bit
Published 2014-03-01“…As the current popular chaos-based image encryption algorithms with the permutation–diffusion structure have security flaws of no immunity to attack.A new image encryption algorithm was proposed based on the analysis of current algorithms,which can well resist the chosen-plaintext and the chosen-ciphertext attacks.The algorithm uses Kent chaotic map to generate key streams,and produces the parameters of the chaotic system and the iteration times according to the characteristics of plaintext pixels and input key.Firstly,the positions of pixels were shuffled totally with the chaotic sequence.Secondly,the 0 and 1 bit positions of image pixels were scrambled by using another chaotic sequence generated by the input key.The experimental results show that the algorithm cannot only resist the chosen plaintext attack and chosen ciphertext attack but also achieve better cryptographic properties,such as key space,statistical analysis.…”
Get full text
Article -
1123
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
Get full text
Article -
1124
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges
Published 2024-01-01“…Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. …”
Get full text
Article -
1125
Security capability analysis of software-based heterogeneous redundant execution system
Published 2021-09-01“…Software-based redundant execution (SRE) is a popular fault-tolerant design method which makes use of faults occurring randomly to achieve fault-tolerance.Software-based heterogeneous redundant execution (SHRE) uses heterogeneous redundant software replicas with identical function based on SRE and diversity of software.By comparing the results of heterogeneous redundant software replicas, SHRE can resist threats from software vulnerabilities and homogenization.The classification method of SHRE was proposed, and the security capability of SHRE was introduced.Based on N-modular redundancy, I/O operation mode and the recovery capability of attacked software replica, resistance to attack of different structures were analyzed.The analysis shows that the security capability of SHRE performs best when it is triple-mode redundancy architecture and attacked software replica can be recovered.Besides, by shortening the recovery time of attacked software replica, security to SHRE can be improved.…”
Get full text
Article -
1126
Robustness Analysis of the Regional and Interregional Components of the Weighted World Air Transportation Network
Published 2022-01-01“…It opens new perspectives to design more efficient attacks.…”
Get full text
Article -
1127
Survey of braid-based cryptography
Published 2009-01-01“…The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. …”
Get full text
Article -
1128
Level of Pest Infestation on Cocoa (Theobroma cacao L.) Variety BL-50 in Tanah Datar Regency, West Sumatera Province, Indonesia
Published 2024-04-01“…This study aims to determine the level of significant pest attacks on cocoa varieties BL-50 in Tanah Datar Regency. …”
Get full text
Article -
1129
A Secure Image Encryption Algorithm Based on Rubik's Cube Principle
Published 2012-01-01“…Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.…”
Get full text
Article -
1130
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Published 2023-12-01“…Therefore, the data exchange process raises privacy concerns, especially when the integration of health data from multiple sources (linkage attack) results in further leakage. Linkage attack is a type of dominant attack in the privacy domain, which can leverage various data sources for private data mining. …”
Get full text
Article -
1131
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01“…It has been found that cybercriminals can use various techniques: denial-of- service (DoS) attacks, man-in-the-middle attacks, remote code execution and social engineering, to disrupt systems. …”
Get full text
Article -
1132
Metabolic consequences and nailfold capillary changes in children with familial Mediterranean fever
Published 2025-02-01“…Conclusions Insulin resistance, alterations in serum lipids and atherogenic indices, and NC changes significantly endure in children with FMF during attack-free periods compared to controls, with more prominence during acute attacks. …”
Get full text
Article -
1133
Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems
Published 2020-01-01“…Growing neural networks have incurred severe attacks such as adversarial example attacks, imposing threats to tram safety. …”
Get full text
Article -
1134
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…A simple and efficient timing attack on the shared portions of multilevel hierarchical caches and its corresponding countermeasure is proposed here. …”
Get full text
Article -
1135
L’Olympisme des femmes face à l’antiféminisme sportif (1921-1936)
Published 2024-04-01“…In turn, the focus will also be on the responses to these attacks.…”
Get full text
Article -
1136
Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling
Published 2017-01-01“…The results indicate that these networks have the same vulnerability against the maximum node attack, the load of the maximum node attack, and the random node attack, which explain that the coupling relationship between network nodes is an important factor in network design.…”
Get full text
Article -
1137
Cryptographic secrecy of steganographic matrix encoding
Published 2012-06-01“…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
Get full text
Article -
1138
Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks
Published 2014-11-01“…A routing metric SIEB which includes link security,link conflict,link reliability and link available bandwidth was proposed.The SIEB includes link security and link performance two aspects.In order to resist various hole attack,the link trust value based on two hop neighbor feedback is computed in link security weight computing of SIEB.On this basis,a link security weight computing algorithm LSWC and a link performance weight computing algorithm LSPC were proposed,and a distributed routing protocol SIEBP with QoS constraints in cognitive wireless Mesh network was proposed.Finding safety routing path and maximizing the network throughput are the objective of SIEBP.Simulation results show that SIEBP routing protocol can achieve expectation goal.It can not only find safety routing path which can resist black hole attack,gray hole attack and worm hole attack,but also obtain a higher network throughput.…”
Get full text
Article -
1139
A mutual authentication security scheme for mobile NFC devices
Published 2017-08-01“…Near field communication (NFC) is a kind of short-range wireless communication technology which has been applied around the world.The applications of mobile payments and access control are the most common applications of NFC technology.Technically,the NFC device can be used as a bank card or an entrance card with the help of the card emulation mode of NFC,which will be validated by external reader.It is very essential to select a appropriate and safe certification scheme in this scenario.First of all,the existing NFC authentication system and security scheme was introduced and the system security requirements and potential security risks were analyzed.Then,by using Hash,AES and password Key dynamic updating mechanism,a mutual authentication security scheme for mobile NFC devices was proposed,and the synchronization mechanism was designd.Finally,GNY logic was used to prove the security correctness of our proposed scheme.The security analysis shows that our scheme can avoid a number of attacks,such as forgery,replay attack,eavesdropping,tampering attack,asynchronous attack and so on.…”
Get full text
Article -
1140
Quantum cryptanalysis of lightweight block cipher Piccolo
Published 2023-06-01“…By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results show that the key can be recovered 56 bit with the time complexity 2 <sup>28</sup> and the occupation of 464 qubit.Moreover, if attack rounds r>6,the time complexity is 2 <sup>28+16(r-6)</sup>, which is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>68</mn></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of Grover quantum brute-force search.The time complexity of the proposed attack method is significantly reduced compared with Grover search and is also better than that of traditional cryptanalysis, which lays a foundation for the subsequent research on quantum attacks of lightweight block ciphers.…”
Get full text
Article