Attacks on computer systems

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eavesdropping attacks on computer displays

Electromagnetic information leakage from computer displays was first demonstrated to the general public by van Eck in 1985. Nearby eavesdroppers can pick up compromising emanations from computer hardware with directional antennas and wideband receivers. The basic phenomenon is easily demonstrated with modified TV sets. However, to separate practically readable text shown on modern high-resoluti...

متن کامل

Attacks on Steganographic Systems

The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithms, the development of attacks is essential to assess security. We present both visual attacks, making use of the ability of humans to clearly discern between noise and visual patterns, and statistical attacks which are m...

متن کامل

Attacks on Cellular Systems

The cellular industry is growing quickly but so is the fraud. For instance, based on the surveys conducted by the Cellular Telecommunications Industry Association (CTIA), the number of U.S. cellular subscribers, cell sites, and total revenue have grown 112, 27, and 36 times, respectively, over the past ten years. At least 38.2 million, 14.5% of the entire U.S. population, have subscribed to the...

متن کامل

Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks

This paper discusses the various types of malicious software, particularly computer viruses, which threaten computer network dependability, including such attributes as reliability, availability, safety and security of computer systems. Quantitative risk assessment of computer virus attacks on computer networks is investigated. To this end, an analytical model to study computer virus propagatio...

متن کامل

Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI

This paper focuses on human-computer identification systems against peeping attacks, in which adversaries can observe (and even control) interactions between humans (provers) and computers (verifiers). Real cases on peeping attacks were reported by Ross J. Anderson ten years before. Fixed passwords are insecure to peeping attacks since adversaries can simply replay the observed passwords. Some ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vojnotehnicki glasnik

سال: 2012

ISSN: 0042-8469

DOI: 10.5937/vojtehg1201235v