نتایج جستجو برای: attacker
تعداد نتایج: 5419 فیلتر نتایج به سال:
Decision-making requires the perception of relevant information variables that emerge from the player-environment interaction. The purpose of the present article is to empirically assess whether players' decisional behavior about which type of pass to make is influenced by the spatio-temporal variable tau. Time series positional data of rugby players were analyzed from video footage taken in re...
Defender-Attacker Stackelberg games are the foundations of tools deployed for computing optimal patrolling strategies in adversarial domains such as the United states Federal Air Marshals Service and the United States Coast Guard, among others. In Stackelberg game models of these systems the attacker knows only the probability that each target is covered by the defender, but is oblivious to the...
<p><span>Almost every web-based application is managed and operated through a number of websites, each which vulnerable to cyber-attacks that are mounted across the same networks used by applications, with much less risk attacker than physical attacks. Such attacks make use range modern techniques-such as structured query language injection (SQLi), cross-site scripting, data tamperi...
Web-browsing clients may choose to browse the web by using proxies with encryption to secure their privacy. An attacker watching the outgoing connection of such a client will not be able to know the content or destination of their packets, unless the attacker uses website fingerprinting. Website fingerprinting is the process by which an attacker identifies which server a client is communicating...
There are many real world scenarios which can be modeled as a security game where there is one player, called the defender, trying to protect a set of potential targets from another player, called the attacker. Game-theoretic security approaches are currently used to set up traffic checkpoints and canine patrols at LAX airport [38, 37], to assign Federal Air Marshals to flights [43], and will s...
In Mobile Sensor Network, attacker can easily capture a node and compromise that sensor node and extract keying materials from that compromised node and make replicas of them. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network .Then attacker use the replica node to inject fake data and disr...
Mobile Ad hoc Network is a collection of mobile nodes and it creates temporary network for the communication. Each node transferred the message to the other node by using wireless network. This network is not fully secured when it transfer the message. So that it needs to protect from an attacker. For identify the malicious node, already used TWOACK and Misbehavior Report Authentication (MRA) c...
IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism generally ignores both the context within which the IDS operates and the attacker’s own ability to adapt to IDS behavior. In this paper, we propose an alternative strategy for evaluating IDS based around multiple strategies. Each strategy defines how an attacker profits ...
We propose a Bayesian Stackelberg game capable of analyzing the joint effects of both attacker intent and capabilities on optimal defensive strategies. The novel feature of our model is the use of contest success functions from economics to capture the extent to which the success of an attack is attributable to the adversary's capability (as well as the level of defensive investment), rather th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید