نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
Due to the considerable growth of Internet as well as its usage as a commercial platform, attacks against networks such as Distributed Denial of Service (DDoS) attacks, have emerged, with victims even among prestigious commercial sites. Such attacks in traditional networking are difficult to recognize and to handle. Managing them requires a network that can dynamically detect, share info, respo...
Nowadays, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion Detection (PAHID) model is proposed in this paper. The model detects host-based in...
In 1984, H.C. Williams introduced a public key cryptosystem whose security is as intractable as factorization. Motivated by some strong and interesting cryptographic properties of the intrinsic structure of this scheme, we present a practical modification thereof that has very strong security properties. We establish, and prove, a generalization of the “sole-samplability” paradigm of Zheng-Sebe...
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
The provision of context-aware services, that is crucial for mobile and ubiquitous computing, prerequisites appropriate management methods for acquiring, processing and distributing context information. This paper focuses on the challenge that refers to the seamless provision of real-time access to the dynamically changing context data. It studies the problem of handling the order of the inform...
رشد سریع تقاضا برای قدرت محاسباتی موجب شده است تا تغییر جهتی به سوی مدل رایانش ابری که بر اساس مراکز داده مجازی شده عظیم بنا شده است، صورت پذیرد. چنین مراکز داده ای طبیعتاً انرژی مصرفی بالایی را طلب می کنند. برای پاسخ به تقاضای مشتریان رایانش ابری و به منظور پشتیبانی از محاسبات سبز، ارائه دهنده های سرویس ابری باید انرژی مصرفی در این مراکز داده را کاهش دهند. انرژی مصرفی در یک سیستم با میزان بهره ...
A significant remaining challenge for existing recommender systems is that users may not trust either inaccurate recommendation or lack of explanation. Thus, it becomes critical to embrace a trustworthy system. This survey provides systematic summary three categories issues in systems: social-aware systems, which leverage users’ social relationships; robust filter untruthful information, noises...
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identi cation of quality measures and (2) the use of uncertain reasoning techniques. In this paper, we combine these two strands, exploring the problem of how to identify and propagate quality through the di erent context layers in order to support the context reasoning process. We present a ...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message pair constructed using a cryptanalytic collision attack on MD5 or SHA-1. The concept’s utility was prov...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید