نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

2003
Tao Peng Christopher Leckie Kotagiri Ramamohanarao

We propose a distributed approach to detect distributed denial of service attacks by monitoring the increase of new IP addresses. Unlike previous proposals for bandwidth attack detection schemes which are based on monitoring the traffic volume, our scheme is very effective for highly distributed denial of service attacks. Our scheme exploits an inherent feature of DDoS attacks, which makes it h...

2009
Hong Chen Ninghui Li Ziqing Mao

Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppArmor, have been introduced. In this paper we propose an approach to analyze and compare the quality of protection offered by these different MAC systems. We introduce the notion of vulnerability surfaces under attack s...

Journal: :J. Mathematical Cryptology 2012
Gérard Maze

This article presents an analysis of the secure key broadcasting scheme proposed by Wu, Ruan, Lai and Tseng [11]. The study of the parameters of the system is based on a connection with a special type of symmetric equations over finite fields. We present two different attacks against the system, whose efficiency depends on the choice of the parameters. In particular, a time-memory tradeoff atta...

2013
Erich Wenger Thomas Korak Mario Kirschbaum

Using RFID tags for security critical applications requires the integration of cryptographic primitives, e.g., Elliptic Curve Cryptography (ECC). It is specially important to consider that RFID tags are easily accessible to perform practical side-channel attacks due to their fields of applications. In this paper, we investigate a practical attack scenario on a randomized ECC hardware implementa...

Journal: :Psychophysiology 2011
John B Meixner J Peter Rosenfeld

Previous studies examining the P300-based concealed information test typically tested for mock crime or autobiographical details, but no studies have used this test in a counterterrorism scenario. Subjects in the present study covertly planned a mock terrorist attack on a major city. They were then given three separate blocks of concealed information testing, examining for knowledge of the loca...

2013
Changwei Liu Anoop Singhal Duminda Wijesekera

Evidence graphs model network intrusion evidence and their dependen­ cies to help with network forensics analysis. With quantitative metrics, probabilistic evidence graphs provide a way to link probabilities associ­ ated with different attack paths with available evidence. Existing work in evidence graphs assumes that all available evidence forms a single evidence graph. We show how to merge di...

2017
Shivangee Agrawal Gaurav Jain

1,2 PG Scholar, Department of CSE & IT, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In today’s scenario to maintain the security of network system is important. We need a secure and safe network system towards intruders attack. Intru...

2013
Michael Roland Josef Langer

Recent roll-outs of contactless payment infrastructures – particularly in Austria and Germany – have raised concerns about the security of contactless payment cards and Near Field Communication (NFC). There are well-known attack scenarios like relay attacks and skimming of credit card numbers. However, banks and credit card schemes often mitigate these attacks. They explain that attacks are imp...

Journal: :acta medica iranica 0
massoud ghasemi research center of endovascular intervention, tehran, iran. maryam mehrpooya department of cardiology, imam khomeini hospital complex, tehran university of medical sciences, tehran, iran. and department of cardiology, school of medicine, tehran university of medical sciences, tehran, iran. farshad ghasemi mount sini hospital, university of toronto, toronto, canada. fatemeh shahbazi department of biology, payame noor university, tehran, iran.

our aim was to report techniques and our experience in one-stage angioplasty and stenting of ostium of left common carotid and left internal carotid arteries in an octogenarian man with transient ischemic attack, who was completely recovered from neurologic insults short time after the procedure. an 81-year-old man presented with a transient ischemic attack. neurologic examination showed left s...

Journal: :Numerische Mathematik 2005
Ivo Babuska Fabio Nobile Raúl Tempone

This work studies linear elliptic problems under uncertainty. The major emphasis is on the deterministic treatment of such uncertainty. In particular, this work uses the Worst Scenario approach for the characterization of uncertainty on functional outputs (quantities of physical interest). Assuming that the input data belong to a given functional set, eventually infinitely dimensional, we propo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید