-
141
Guest Editorial: WACV 2020—Presentation attacks on biometric systems
Published 2021-07-01Get full text
Article -
142
Hybrid-structured onion scheme against replay attack of MIX
Published 2009-01-01“…Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay attack, and the authentication property of layered encryption was utilized to protect integrity of messages.Meanwhile, symmetric encryption was imported to improve efficiency.Analysis shows that the hybrid-structured onion scheme can resist replay attack with guarantee of security and efficiency.…”
Get full text
Article -
143
Detecting and Defending against Replication Attacks in Wireless Sensor Networks
Published 2013-06-01“…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. Existing replicas detection schemes can be further improved in regard of detection probabilities, detection overheads, and the balance of detection overheads among sensor nodes. …”
Get full text
Article -
144
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: Get full text
Article -
145
Multi-point joint power analysis attack against AES
Published 2016-10-01Subjects: “…multi-point joint power analysis attack…”
Get full text
Article -
146
Construction of DDoS attacks malicious behavior knowledge base construction
Published 2021-11-01“…Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed based on the knowledge graph, and contains two parts: a malicious traffic detection database and a network security knowledge base.The malicious traffic detection database detects and classifies malicious traffic caused by DDoS attacks, the network security knowledge base detects DDoS attacks from traffic characteristics and attack frameworks model malicious behaviors, and perform inference, tracing and feedback on malicious behaviors.On this basis, a distributed knowledge base was built based on the DDoS open threat signaling (DOTS) protocol to realize the functions of data transmission between distributed nodes, DDoS attack defense, and malicious traffic mitigation.The experimental results show that the DDoS attack malicious behavior knowledge base can effectively detect and mitigate the malicious traffic caused by DDoS attacks at multiple gateways, and has the knowledge update and reasoning function between the distributed knowledge bases, showing good scalability.…”
Get full text
Article -
147
LDoS attack detection method based on simple statistical features
Published 2022-11-01Subjects: Get full text
Article -
148
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01Subjects: Get full text
Article -
149
Round reduction-based fault attack on SM4 algorithm
Published 2016-10-01“…A novel method of fault attack based on round reduction against SM4 algorithm was proposed.Faults were in-jected into the last four rounds of the SM4 encryption algorithm,so that the number of the algorithm's rounds can be re-duced.In known-ciphertext scenario,four traces are enough to recover the total 128 bit master key by screening these faults easily.The proposed attack is made to an unprotected SM4 smart card.Experiment shows that this attack method is efficient,and which not only simplifies the existing differential fault attack,but also improves the feasibility of the attack.…”
Get full text
Article -
150
Analysis Of Attack Velocity and Accuracy in Banjarbaru City Fencing Athletes
Published 2024-06-01Subjects: Get full text
Article -
151
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
152
Runtime verification approach for DoS attack detection in edge servers
Published 2021-09-01Subjects: Get full text
Article -
153
Approach of detecting LDoS attack based on time window statistic
Published 2010-01-01“…Through analysised of normal traffic and attack flow,statistic result showed that the normal traffic throughout had an obviously degrade and attack flow had a short time abnormity pulse with higher amplitude.An approach of de-tecting LDoS attack based on time window statistic was presented.Experiments on different length of sample time were conducted in a test environment established on simulation network.Test results show that the detection probability is more than 96%,false negative and false positive are less than 3%.…”
Get full text
Article -
154
Acute Attack of Pseudogout with the Wide Lesion in Lumbar Spondylolytic Spondylolisthesis
Published 2020-01-01“…To report a rare case of an acute attack of calcium pyrophosphate dihydrate (CPPD) deposition disease in a patient with lumbar spondylolytic spondylolisthesis, which demonstrated widespread lesion with neurological deficit. …”
Get full text
Article -
155
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: “…related-key rectangle attack…”
Get full text
Article -
156
Survey on SSDF attack and defense for distributed cooperative cognitive radio
Published 2017-01-01“…Cooperative spectrum sensing (CSS) improves the reliability of spectrum sensing,however,it is susceptible to spectrum sensing data falsification (SSDF) due to the fusion mechanism.To insight into the current research and development trend of defense strategy against the SSDF attack,several typical distributed strategies were concluded and the types of distributed algorithms were analyzed in several aspects.Finally,the future research of SSDF distributed defense strategy was prospected based on the problems found in the current research.…”
Get full text
Article -
157
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: “…attack prediction…”
Get full text
Article -
158
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article -
159
Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks
Published 2024-01-01“…Two extensions of this algorithm are further presented, which can operate under more adversarial attacks and also with relaxed conditions on the initial phases. …”
Get full text
Article -
160
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: “…control flow hijacking attacks…”
Get full text
Article