Showing 1,121 - 1,140 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1121

    Dynamic heterogeneous scheduling method based on Stackelberg game model in container cloud by Wei ZENG, Hongchao HU, Lingshu LI, Shumin HUO

    Published 2021-06-01
    “…Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these security threats, a dynamic heterogeneous scheduling method based on Stackelberg game in the container cloud was proposed.First, a heterogeneous mirrored resource pool is constructed to suppress the spread of attacks based on common-mode vulnerabilities on the cloud.Then, the offensive and defense interaction process is modeled as a Stackelberg game model.Finally, the offensive and defensive model is analyzed, and the system scheduling problem is modeled as a mixed integer non-linear programming problem to solve the system's optimal scheduling strategy.Experiments show that the proposed method can improve the defense effect of the cloud platform and reduce the system defense overhead.…”
    Get full text
    Article
  2. 1122

    Image encryption algorithms based on chaos through dual scrambling of pixel position and bit by Xiao-heng DENG, Chun-long LIAO, Cong-xu ZHU, Zhi-gang CHEN

    Published 2014-03-01
    “…As the current popular chaos-based image encryption algorithms with the permutation–diffusion structure have security flaws of no immunity to attack.A new image encryption algorithm was proposed based on the analysis of current algorithms,which can well resist the chosen-plaintext and the chosen-ciphertext attacks.The algorithm uses Kent chaotic map to generate key streams,and produces the parameters of the chaotic system and the iteration times according to the characteristics of plaintext pixels and input key.Firstly,the positions of pixels were shuffled totally with the chaotic sequence.Secondly,the 0 and 1 bit positions of image pixels were scrambled by using another chaotic sequence generated by the input key.The experimental results show that the algorithm cannot only resist the chosen plaintext attack and chosen ciphertext attack but also achieve better cryptographic properties,such as key space,statistical analysis.…”
    Get full text
    Article
  3. 1123

    Secure data collection method of WSN based on mobile Sink by Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG

    Published 2021-02-01
    “…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
    Get full text
    Article
  4. 1124

    Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges by Mourad Benmalek

    Published 2024-01-01
    “…Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. …”
    Get full text
    Article
  5. 1125

    Security capability analysis of software-based heterogeneous redundant execution system by Bolin MA, Zheng ZHANG, Quan REN, Gaofei ZHANG, Jiangxing WU

    Published 2021-09-01
    “…Software-based redundant execution (SRE) is a popular fault-tolerant design method which makes use of faults occurring randomly to achieve fault-tolerance.Software-based heterogeneous redundant execution (SHRE) uses heterogeneous redundant software replicas with identical function based on SRE and diversity of software.By comparing the results of heterogeneous redundant software replicas, SHRE can resist threats from software vulnerabilities and homogenization.The classification method of SHRE was proposed, and the security capability of SHRE was introduced.Based on N-modular redundancy, I/O operation mode and the recovery capability of attacked software replica, resistance to attack of different structures were analyzed.The analysis shows that the security capability of SHRE performs best when it is triple-mode redundancy architecture and attacked software replica can be recovered.Besides, by shortening the recovery time of attacked software replica, security to SHRE can be improved.…”
    Get full text
    Article
  6. 1126
  7. 1127

    Survey of braid-based cryptography by ZHU Ping1, WEN Qiao-yan2

    Published 2009-01-01
    “…The achievements of braid-based cryptography were surveyed: some recently developed cryptographic schemes were introduced, including key exchange protocols enciphering-deciphering and authentication schemes. The attacks against these schemes were reviewed, such as solutions to conjugacy problems, length-based attacks, and linear representation-based attacks. …”
    Get full text
    Article
  8. 1128

    Level of Pest Infestation on Cocoa (Theobroma cacao L.) Variety BL-50 in Tanah Datar Regency, West Sumatera Province, Indonesia by Zahlul Ikhsan, Muhammad Al-Ikhlas, Yaherwandi, Hasmiandy Hamid, Aulia Oktavia, Dandy Ahamefula Osibe

    Published 2024-04-01
    “…This study aims to determine the level of significant pest attacks on cocoa varieties BL-50 in Tanah Datar Regency. …”
    Get full text
    Article
  9. 1129

    A Secure Image Encryption Algorithm Based on Rubik's Cube Principle by Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah Berdai

    Published 2012-01-01
    “…Finally, the experimental results and security analysis show that the proposed image encryption scheme not only can achieve good encryption and perfect hiding ability but also can resist exhaustive attack, statistical attack, and differential attack.…”
    Get full text
    Article
  10. 1130

    Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence by Youyang Qu, Lichuan Ma, Wenjie Ye, Xuemeng Zhai, Shui Yu, Yunfeng Li, David Smith

    Published 2023-12-01
    “…Therefore, the data exchange process raises privacy concerns, especially when the integration of health data from multiple sources (linkage attack) results in further leakage. Linkage attack is a type of dominant attack in the privacy domain, which can leverage various data sources for private data mining. …”
    Get full text
    Article
  11. 1131

    Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations by Wojciech Wróblewski, Dorota Seliga

    Published 2024-12-01
    “…It has been found that cybercriminals can use various techniques: denial-of- service (DoS) attacks, man-in-the-middle attacks, remote code execution and social engineering, to disrupt systems. …”
    Get full text
    Article
  12. 1132

    Metabolic consequences and nailfold capillary changes in children with familial Mediterranean fever by Ahmed S. Abo Hola, Rania S. El Zayat, Wafaa Ahmed Shehata, Mai I. Elashmawy, Noha E. Khalaf, Heba M. S. El Zefzaf

    Published 2025-02-01
    “…Conclusions Insulin resistance, alterations in serum lipids and atherogenic indices, and NC changes significantly endure in children with FMF during attack-free periods compared to controls, with more prominence during acute attacks. …”
    Get full text
    Article
  13. 1133

    Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems by Shize Huang, Xiaowen Liu, Xiaolu Yang, Zhaoxin Zhang, Lingyu Yang

    Published 2020-01-01
    “…Growing neural networks have incurred severe attacks such as adversarial example attacks, imposing threats to tram safety. …”
    Get full text
    Article
  14. 1134

    Joint security and performance improvement in multilevel shared caches by Amin Sarihi, Ahmad Patooghy, Mahdi Amininasab, Mohammad Shokrolah Shirazi, Abdel‐Hameed A. Badawy

    Published 2021-07-01
    “…A simple and efficient timing attack on the shared portions of multilevel hierarchical caches and its corresponding countermeasure is proposed here. …”
    Get full text
    Article
  15. 1135

    L’Olympisme des femmes face à l’antiféminisme sportif (1921-1936) by Florys Castan-Vicente

    Published 2024-04-01
    “…In turn, the focus will also be on the responses to these attacks.…”
    Get full text
    Article
  16. 1136

    Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling by Chunjie Cao, Zhiqiang Zhang, Jingzhang Sun, Xianpeng Wang, Mengxing Huang

    Published 2017-01-01
    “…The results indicate that these networks have the same vulnerability against the maximum node attack, the load of the maximum node attack, and the random node attack, which explain that the coupling relationship between network nodes is an important factor in network design.…”
    Get full text
    Article
  17. 1137

    Cryptographic secrecy of steganographic matrix encoding by Jia-yong CHEN, Jiu-fen LIU, Yue-fei ZHU, Wei-ming ZHANG

    Published 2012-06-01
    “…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
    Get full text
    Article
  18. 1138

    Secure and high throughput routing protocol with QoS constraints in cognitive wireless Mesh networks by Zhu-fang KUANG, Zhi-gang CHEN, Guo-jun WANG, Hui LIU

    Published 2014-11-01
    “…A routing metric SIEB which includes link security,link conflict,link reliability and link available bandwidth was proposed.The SIEB includes link security and link performance two aspects.In order to resist various hole attack,the link trust value based on two hop neighbor feedback is computed in link security weight computing of SIEB.On this basis,a link security weight computing algorithm LSWC and a link performance weight computing algorithm LSPC were proposed,and a distributed routing protocol SIEBP with QoS constraints in cognitive wireless Mesh network was proposed.Finding safety routing path and maximizing the network throughput are the objective of SIEBP.Simulation results show that SIEBP routing protocol can achieve expectation goal.It can not only find safety routing path which can resist black hole attack,gray hole attack and worm hole attack,but also obtain a higher network throughput.…”
    Get full text
    Article
  19. 1139

    A mutual authentication security scheme for mobile NFC devices by Chengyu ZHANG, Rangding WANG, Ling YAO, Songyin FU, Fuqiang ZUO

    Published 2017-08-01
    “…Near field communication (NFC) is a kind of short-range wireless communication technology which has been applied around the world.The applications of mobile payments and access control are the most common applications of NFC technology.Technically,the NFC device can be used as a bank card or an entrance card with the help of the card emulation mode of NFC,which will be validated by external reader.It is very essential to select a appropriate and safe certification scheme in this scenario.First of all,the existing NFC authentication system and security scheme was introduced and the system security requirements and potential security risks were analyzed.Then,by using Hash,AES and password Key dynamic updating mechanism,a mutual authentication security scheme for mobile NFC devices was proposed,and the synchronization mechanism was designd.Finally,GNY logic was used to prove the security correctness of our proposed scheme.The security analysis shows that our scheme can avoid a number of attacks,such as forgery,replay attack,eavesdropping,tampering attack,asynchronous attack and so on.…”
    Get full text
    Article
  20. 1140

    Quantum cryptanalysis of lightweight block cipher Piccolo by Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI

    Published 2023-06-01
    “…By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results show that the key can be recovered 56 bit with the time complexity 2 <sup>28</sup> and the occupation of 464 qubit.Moreover, if attack rounds r>6,the time complexity is 2 <sup>28+16(r-6)</sup>, which is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>68</mn></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of Grover quantum brute-force search.The time complexity of the proposed attack method is significantly reduced compared with Grover search and is also better than that of traditional cryptanalysis, which lays a foundation for the subsequent research on quantum attacks of lightweight block ciphers.…”
    Get full text
    Article