Showing 1,461 - 1,480 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1461

    Cheater identification in threshold scheme by DUAN Xiao-yi1, QI Wen-hua1, ZHANG Qi-shan1, WANG Zhong-wen2

    Published 2005-01-01
    “…A scheme can detection cheater correctly is proposed.The quantity of the scheme is detection and cheater identification efficient and simple.The attack is as difficult as factoring the product of large numbers.…”
    Get full text
    Article
  2. 1462

    De la controverse à la conversion : Venise et la défense de la rhétorique dans The Ephemerides of Phialo de Stephen Gosson by Anne Geoffroy-Piscou

    Published 2008-03-01
    “…Controversy was raging in England in the late 1570s and early 1580s as Puritans attacked the evils of the age and above all the stage. …”
    Get full text
    Article
  3. 1463

    Attribute-based proxy re-encryption scheme with multiple features by Chaosheng FENG, Wangping LUO, Zhiguang QIN, Ding YUAN, Liping ZOU

    Published 2019-06-01
    “…A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).…”
    Get full text
    Article
  4. 1464

    Traveling Islamophobia in the Global South: by Ashraf Kunnummal & Farid Esack

    Published 2021-05-01
    “… Malala Yousafzai (1997-) became an international icon after Pakistan-based Tehrik-i-Taliban militants attacked her on her way to school on October 9, 2012. …”
    Get full text
    Article
  5. 1465

    Dependable identity recognition and authorization based on visual information by Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI

    Published 2020-11-01
    “…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
    Get full text
    Article
  6. 1466

    Improving replicator dynamic evolutionary game model for selecting optimal defense strategies by Jianming HUANG, Hengwei ZHANG

    Published 2018-01-01
    “…In terms of the existence of strategy dependency in the same game group,network attack-defense evolutionary game model based on the improved replicator dynamics was constricted by introducing the intensity coefficient,which completed the method of calculating replicator dynamic rate.The improved replicator dynamic equation was adopted to solve the evolutionary equilibrium for the situation that both attack and defense have two optional strategies.The stability of the equilibrium points was analyzed by the local stability analysis method of Jacobian matrix,and the optimal defense strategies were obtained under different conditions.The results show that the strategy dependency between the players in the same group has a certain influence on the evolution of the game,both the incentive and the inhibition.Finally,the accuracy and validity of the model and method are verified by the experimental simulation,which provides a new theoretical support for solving the information security problems in the real.…”
    Get full text
    Article
  7. 1467

    SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization by Jiahua Zhang, Zhongxue Yang, Jiangping Wang, Yukai Shi, Liang Wei

    Published 2015-04-01
    “…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
    Get full text
    Article
  8. 1468

    An improved RFID authentication protocol based on quadratic residue by Zhiliang LIU

    Published 2018-04-01
    “…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
    Get full text
    Article
  9. 1469

    PhishingAgent: an agentic workflow method for advanced phishing email detection by JIN Jiandong, HUANG Zheng, HU Zhanyu, ZOU Yuanxin, QIN Huidong, LAI Qingnan, YANG Jia, ZHOU Changling

    Published 2024-11-01
    “…To address the increasing complexity of advanced persistent threat (APT) and phishing email attacks, an intelligent agentic workflow method for phishing email detection called PhishingAgent was proposed. …”
    Get full text
    Article
  10. 1470

    Research on security architecture of strong PUF by adversarial learning by Yan LI, Wei LIU, Yuanlu SUN

    Published 2021-06-01
    “…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
    Get full text
    Article
  11. 1471

    Knowledge graph based ubiquitous power IoT security visualization technology by Yang YU, Shaomin ZHU, Chaoyi BIAN

    Published 2019-11-01
    “…With the construction of the ubiquitous power IoT,the power network transform to interconnection,the data become more interactive and shared,and the business transform to lateral link-up,which pose new challenges to the original network security protection system.Network security visualization technology helps network security personnel quickly identify potential attacks,locate abnormal events,discover new types of attacks,and quickly capture global network security situation by displaying and analyzing the graph patterns.Based on the knowledge graph,the ubiquitous power IoT security analysis was carried out.The internal and external threat intelligence was modeled firstly.Then the relationship between the conceptual entities was constructed.The threat intelligence as knowledge graph was modeled,and then the abstract and complex alarm information which was invisible was converted into a more intuitive and convenient style,which provided accurate support for ubiquitous network security protection decisions in the power IoT.…”
    Get full text
    Article
  12. 1472

    Fingerprint template protection by adopting random projection based on re-encryption by Shan JIA, Zhengquan XU, Chuanbo HU, Hao WANG

    Published 2018-02-01
    “…In random projection (RP) based biometric template protection methods,the generated template and key are vulnerable to attacks,which may cause the leakage of users’ privacy.To solve this problem,an improved RP-based fingerprint template protection method was proposed.First,based on the RP result,the proposed method divided the projection domain into fingerprint matching domain and noise adding domain that were mutually independent,then fused them with two sub-matrices of the random projection matrix and saved the result as template.In addition,re-encryption mechanism was introduced to realize secure storage and transmission of the key (RP matrix).Experimental results show that the proposed method can achieve stronger ability to resist different attacks than existing RP-based biometric template protection methods,and also guarantee high matching accuracy and revocation.…”
    Get full text
    Article
  13. 1473

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article
  14. 1474

    Survey of research on abnormal traffic detection for software defined networks by Yu FU, Kun WANG, Xueyuan DUAN, Taotao LIU

    Published 2024-03-01
    “…Since software defined network (SDN) was more vulnerable to network attacks than traditional networks, the research progress of abnormal traffic detection for software defined network in recent years from the technical principle and architecture characteristics was summarized, the possible organizational forms of network attacks on SDN were analyzed, and the characteristics, advantages, and disadvantages of current technologies related to abnormal traffic detection, abnormal traffic traceability, and abnormal traffic mitigation were discussed.The data sets commonly used in current research were compared and analyzed, and some general data preprocessing methods were sorted out.The research direction of abnormal traffic detection methods in the SDN environment in the future was summarized and prospected.The research results can guide the selection of adaptation methods in practical application requirements, and the problems and contradictions to be solved can guide subsequent research.…”
    Get full text
    Article
  15. 1475

    Triple receiver public key encryption cryptosystem by Liutao ZHAO, Lin ZHONG, Jidong LIU, Caiqun WANG, Dan WU

    Published 2020-12-01
    “…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
    Get full text
    Article
  16. 1476

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. …”
    Get full text
    Article
  17. 1477

    La menace sans visage : Images de l’ennemi dans la presse britannique à la suite des attentats du 11 septembre 2001 by Pascale Villate-Compton

    Published 2003-01-01
    “…When President Bush, along with most of the English speaking media, talked about “war” in the aftermath of the World Trade Center attacks on 9/11/2001, he opened up the way for an array of representations of a multi-faceted enemy, which soon became a focus for fear. …”
    Get full text
    Article
  18. 1478

    Viollet-le-Duc is back. Usages fragmentaires d’une œuvre kaléidoscopique (1964-1980) by Bérénice Gaussuin

    Published 2019-06-01
    “…These attacks leaved untold his rationalist theory. At first, Viollet-le-Duc come back shyly, but, the reassessment of the international style is one of the dynamics allowing the architect review. …”
    Get full text
    Article
  19. 1479

    Multi-server identity authentication scheme based on biometric and chaotic maps by Jianwu ZHANG, Zejin YAO, Zhendong WU

    Published 2017-02-01
    “…Password-based user remote authentication system has been widely used in recent years,the study found that a single password system is so vulnerable to dictionary analysis and brute force attack as well as other attacks that the security is not high.Biometric and password combination authentication method gradually added to the remote authentication system in order to improve the security level of authentication system.However,the existing authentication systems work in a single server environment,if extended to a multi-server environment,biometric templates and passwords will encounter single point breakthrough and cross-crack problem.In order to overcome the above problems,a multi-server key authentication scheme based on biometric and chaotic map was proposed.The scheme was based on smart cards,passwords and biometrics,which could significantly improve the security and the ability of anti-password guessing of multi-server authentication systems.…”
    Get full text
    Article
  20. 1480

    Eastern Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “… Larvae of two closely related species of fruit flies in central and eastern North America -- Rhagoletis cingulata (Loew), commonly called the cherry fruit fly or cherry maggot, and Rhagoletis fausta (Osten Sacken), the black cherry fruit fly -- attack cherry and cause wormy fruits. Only R. cingulata occurs in Florida, where it attacks wild cherries and is of little economic importance. …”
    Get full text
    Article