-
1441
Network security situational awareness model based on threat intelligence
Published 2021-06-01“…In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness model based on random game was constructed.Threat perception of the target system was performed by comparing the similarity between the exogenous threat intelligence and the internal security events of the system.At the same time, internal threat intelligence was generated based on the threat information inside the system.In this process, game theory was used to quantify the current network security situation of the system, evaluate the security status of the network.Finally, the prediction of the network security situation was realized.The experimental results show that the network security situation awareness method based on threat intelligence can reflect the changes in the network security situation and predict attack behaviors accurately.…”
Get full text
Article -
1442
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments
Published 2015-11-01“…However, it was proven that it failed to provide anonymity against passive adversaries and malicious users and security against known session key attacks and side channel attacks. We propose an anonymous authentication scheme for intercommunication between the things in the Internet of Things environments. …”
Get full text
Article -
1443
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
Published 2014-01-01“…In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. …”
Get full text
Article -
1444
Adsorption of Fe(NO) onto Activated Nylon-6,6 as a Container and a Possible “” Corrosion Inhibitor-containing System
Published 2011-06-01“…Nylon-6,6 exhibits chemical, thermal and mechanical properties which include resistance to chemical attack, electrical insulating properties and degradation resistance. …”
Get full text
Article -
1445
Durability of Steel Fibres Reinforcement Concrete Beams in Chloride Environment Combined with Inhibitor
Published 2016-01-01“…The steel surface immersed in the inhibitor free solution was seen to have been subject to chloride ions attacks as shown in this study. The interest to the field of the present study is the relatively higher durability of the performance when using the inhibitor. …”
Get full text
Article -
1446
Infectious and Noninfectious Granulomatosis in Patient with Multiple Sclerosis: Diagnostic Dilemmas and Followup
Published 2014-01-01“…Approximately 20 years following the initial attack, sarcoidosis was diagnosed during the regular preoperative procedures required for cataract surgery. …”
Get full text
Article -
1447
Construction of Regional Logistics Weighted Network Model and Its Robust optimization: Evidence from China
Published 2020-01-01“…Finally, we analyze the model’s response to random attacks and deliberate attacks. From our study, it is found that when the failure nodes or edges reach a certain percentage, the regional logistics network will collapse on a large scale. …”
Get full text
Article -
1448
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01“…This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. …”
Get full text
Article -
1449
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. …”
Get full text
Article -
1450
Self-adaptive encryption algorithm for image based on affine and composed chaos
Published 2012-11-01“…On the basis of three-dimensional affine transformation in limited integer domain and composed chaos,a novel digital image encryption algorithm was proposed.Firstly,it scrambled pixels’ position and confused pixels’ value according to corresponding coordination.Secondly,it took a series of nonlinear diffusion,substitution and re-diffusion.In the process of substitution,it introduced pixels’ value to perturb multiple chaos systems that were coupled together for self-adaptive encryption.The algorithm proceeded the above two steps for 3 times to defend chosen plaintext attack,and had huge key space to defend violent attack.The scrambling function in it was compatible with images at any ratio of length to width without any preprocessing; the constructed whole chaos system which had a simple form was designed modularly,and could be realized parallel conveniently.…”
Get full text
Article -
1451
Guidance Law and Neural Control for Hypersonic Missile to Track Targets
Published 2016-01-01“…It is demonstrated that the scheme has good robustness and high accuracy to attack a maneuvering target in the presence of external disturbance and missile model uncertainty.…”
Get full text
Article -
1452
Multi-authority attribute-based encryption scheme with policy dynamic updating
Published 2017-10-01“…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
Get full text
Article -
1453
Assessment of Turbulence Models for Flow Simulation around a Wind Turbine Airfoil
Published 2011-01-01“…This investigation focuses on the application of the computational fluid dynamics tool FLUENT to the study of flows over the NACA 63–415 airfoil at various angles of attack. With the aim of selecting the most suitable turbulence model to simulate flow around ice-accreted airfoils, this work concentrates on assessing the prediction capabilities of various turbulence models on clean airfoils at the large angles of attack that cause highly separated flows to occur. …”
Get full text
Article -
1454
A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS
Published 2017-06-01“…It has brought benefits as well as risks.In 2005, the world lost over $445 billion while, Vietnam lost approximately 8,700 billion VNĐ due to the incidents of cyber attacks, in which 5,226 Websites of agencies and businesses in Vietnam were attacked. …”
Get full text
Article -
1455
Efficient three-party authenticated key agreement protocol based on chaotic map
Published 2016-06-01“…Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.…”
Get full text
Article -
1456
AI-based model for securing cognitive IoT devices in advance communication systems
Published 2025-12-01“…Our approach leverages AI techniques for cyber attack detection and mitigation. The effectiveness of our model is demonstrated through its capability to identify different types of cyberattacks with a precision of more than 99%. …”
Get full text
Article -
1457
Linear SVM-Based Android Malware Detection for Reliable IoT Services
Published 2014-01-01“…In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. …”
Get full text
Article -
1458
Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems
Published 2014-01-01“…Thorough analysis of the technique, as regards various standard evaluation parameters and attack scenarios, demonstrates its ability to withstand known-plaintext, ciphertext-only, and approximation attacks. …”
Get full text
Article -
1459
Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542
Published 2010-07-01“…Both attacks were made by a group of 50-60 bandits (the statements list the names of almost 35 people from 15 localities). …”
Get full text
Article -
1460
Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA
Published 2023-12-01“…External attacks can be prevented using firewalls, anti-virus software, and special software for intruder and malware detection. …”
Get full text
Article