Showing 1,441 - 1,460 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1441

    Network security situational awareness model based on threat intelligence by Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU

    Published 2021-06-01
    “…In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness model based on random game was constructed.Threat perception of the target system was performed by comparing the similarity between the exogenous threat intelligence and the internal security events of the system.At the same time, internal threat intelligence was generated based on the threat information inside the system.In this process, game theory was used to quantify the current network security situation of the system, evaluate the security status of the network.Finally, the prediction of the network security situation was realized.The experimental results show that the network security situation awareness method based on threat intelligence can reflect the changes in the network security situation and predict attack behaviors accurately.…”
    Get full text
    Article
  2. 1442

    Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments by Youngseok Chung, Seokjin Choi, Dongho Won

    Published 2015-11-01
    “…However, it was proven that it failed to provide anonymity against passive adversaries and malicious users and security against known session key attacks and side channel attacks. We propose an anonymous authentication scheme for intercommunication between the things in the Internet of Things environments. …”
    Get full text
    Article
  3. 1443

    On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys by Junghyun Nam, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, Dongho Won

    Published 2014-01-01
    “…In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. …”
    Get full text
    Article
  4. 1444

    Adsorption of Fe(NO) onto Activated Nylon-6,6 as a Container and a Possible “” Corrosion Inhibitor-containing System by Elsa C. Menchaca, Sara Hernández, Ana Tejeda, Estela Sarmiento, Jorge Uruchurtu, Miguel A. García-Sánchez

    Published 2011-06-01
    “…Nylon-6,6 exhibits chemical, thermal and mechanical properties which include resistance to chemical attack, electrical insulating properties and degradation resistance. …”
    Get full text
    Article
  5. 1445

    Durability of Steel Fibres Reinforcement Concrete Beams in Chloride Environment Combined with Inhibitor by AbdelMonem Masmoudi, Jamel Bouaziz

    Published 2016-01-01
    “…The steel surface immersed in the inhibitor free solution was seen to have been subject to chloride ions attacks as shown in this study. The interest to the field of the present study is the relatively higher durability of the performance when using the inhibitor. …”
    Get full text
    Article
  6. 1446

    Infectious and Noninfectious Granulomatosis in Patient with Multiple Sclerosis: Diagnostic Dilemmas and Followup by Jelena Paovic, Predrag Paovic, Vojislav Sredovic

    Published 2014-01-01
    “…Approximately 20 years following the initial attack, sarcoidosis was diagnosed during the regular preoperative procedures required for cataract surgery. …”
    Get full text
    Article
  7. 1447

    Construction of Regional Logistics Weighted Network Model and Its Robust optimization: Evidence from China by Lizhao Yan, Yi Wen, Kok Lay Teo, Jian Liu, Fei Xu

    Published 2020-01-01
    “…Finally, we analyze the model’s response to random attacks and deliberate attacks. From our study, it is found that when the failure nodes or edges reach a certain percentage, the regional logistics network will collapse on a large scale. …”
    Get full text
    Article
  8. 1448

    A comparison of several intrusion detection methods using the NSL-KDD dataset by hazem salim abdullah

    Published 2024-06-01
    “…This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. …”
    Get full text
    Article
  9. 1449

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services by Youngsook Lee, Juryon Paik

    Published 2014-01-01
    “…In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. …”
    Get full text
    Article
  10. 1450

    Self-adaptive encryption algorithm for image based on affine and composed chaos by Chang-ci WEN, Qin WANG, Fu-min HUANG, Zhi-shu YUAN, Chun-sheng TAO

    Published 2012-11-01
    “…On the basis of three-dimensional affine transformation in limited integer domain and composed chaos,a novel digital image encryption algorithm was proposed.Firstly,it scrambled pixels’ position and confused pixels’ value according to corresponding coordination.Secondly,it took a series of nonlinear diffusion,substitution and re-diffusion.In the process of substitution,it introduced pixels’ value to perturb multiple chaos systems that were coupled together for self-adaptive encryption.The algorithm proceeded the above two steps for 3 times to defend chosen plaintext attack,and had huge key space to defend violent attack.The scrambling function in it was compatible with images at any ratio of length to width without any preprocessing; the constructed whole chaos system which had a simple form was designed modularly,and could be realized parallel conveniently.…”
    Get full text
    Article
  11. 1451

    Guidance Law and Neural Control for Hypersonic Missile to Track Targets by Wenxing Fu, Binbin Yan, Xiaofei Chang, Jie Yan

    Published 2016-01-01
    “…It is demonstrated that the scheme has good robustness and high accuracy to attack a maneuvering target in the presence of external disturbance and missile model uncertainty.…”
    Get full text
    Article
  12. 1452

    Multi-authority attribute-based encryption scheme with policy dynamic updating by Xi-xi YAN, Yuan LIU, Zi-chen LI, Yong-li TANG

    Published 2017-10-01
    “…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
    Get full text
    Article
  13. 1453

    Assessment of Turbulence Models for Flow Simulation around a Wind Turbine Airfoil by Fernando Villalpando, Marcelo Reggio, Adrian Ilinca

    Published 2011-01-01
    “…This investigation focuses on the application of the computational fluid dynamics tool FLUENT to the study of flows over the NACA 63–415 airfoil at various angles of attack. With the aim of selecting the most suitable turbulence model to simulate flow around ice-accreted airfoils, this work concentrates on assessing the prediction capabilities of various turbulence models on clean airfoils at the large angles of attack that cause highly separated flows to occur. …”
    Get full text
    Article
  14. 1454

    A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS by Nguyễn Sĩ Hòa, Lại Thị Nhung, Đặng Thanh Hải

    Published 2017-06-01
    “…It has brought benefits as well as risks.In 2005, the world lost over $445 billion while, Vietnam lost approximately 8,700 billion VNĐ due to the incidents of cyber attacks, in which 5,226 Websites of agencies and businesses in Vietnam were attacked. …”
    Get full text
    Article
  15. 1455

    Efficient three-party authenticated key agreement protocol based on chaotic map by Xiong LI, Fan WU, Jun-guo LIAO, Yu-zhen LIU

    Published 2016-06-01
    “…Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.…”
    Get full text
    Article
  16. 1456

    AI-based model for securing cognitive IoT devices in advance communication systems by Akshat Gaurav, Varsha Arya, Kwok Tai Chui, Brij B. Gupta

    Published 2025-12-01
    “…Our approach leverages AI techniques for cyber attack detection and mitigation. The effectiveness of our model is demonstrated through its capability to identify different types of cyberattacks with a precision of more than 99%. …”
    Get full text
    Article
  17. 1457

    Linear SVM-Based Android Malware Detection for Reliable IoT Services by Hyo-Sik Ham, Hwan-Hee Kim, Myung-Sup Kim, Mi-Jung Choi

    Published 2014-01-01
    “…In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. …”
    Get full text
    Article
  18. 1458

    Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems by Nidhi Goel, Balasubramanian Raman, Indra Gupta

    Published 2014-01-01
    “…Thorough analysis of the technique, as regards various standard evaluation parameters and attack scenarios, demonstrates its ability to withstand known-plaintext, ciphertext-only, and approximation attacks. …”
    Get full text
    Article
  19. 1459

    Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542 by František Šebek

    Published 2010-07-01
    “…Both attacks were made by a group of 50-60 bandits (the statements list the names of almost 35 people from 15 localities). …”
    Get full text
    Article
  20. 1460

    Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA by Rahmat - Budiarto, Yanif Dwi Kuntjoro

    Published 2023-12-01
    “…External attacks can be prevented using firewalls, anti-virus software, and special software for intruder and malware detection. …”
    Get full text
    Article