-
1
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: Get full text
Article -
2
Unknown presentation attack detection against rational attackers
Published 2021-09-01“…Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. …”
Get full text
Article -
3
Improved integral attack——random linear distinguish and key recovery attack
Published 2023-04-01Subjects: “…integral attack…”
Get full text
Article -
4
-
5
-
6
-
7
-
8
-
9
Mites That Attack Humans
Published 1999-05-01“… This document provides an overview of mites that attack humans, including household, bird, insect, rodent, scabies, and house dust mites. …”
Get full text
Article -
10
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01Subjects: Get full text
Article -
11
G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
Published 2025-01-01“…Current methods suffer from issues such as generated point outliers and poor attack generalization. Consequently, it is not feasible to rely solely on overall or geometry-aware attacks to generate adversarial samples. …”
Get full text
Article -
12
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: “…attack graph…”
Get full text
Article -
13
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01Subjects: Get full text
Article -
14
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: Get full text
Article -
15
-
16
Study of Row Hammer attack
Published 2018-01-01“…The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.…”
Get full text
Article -
17
-
18
-
19
Algebraic fault attack on PRESENT
Published 2012-08-01Subjects: “…fault attack…”
Get full text
Article -
20
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
Published 2022-09-01Subjects: “…adversarial attacks…”
Get full text
Article