نتایج جستجو برای: level attack
تعداد نتایج: 1152212 فیلتر نتایج به سال:
one of the most complicated attacks in wireless sensor network is energy depletion attack. In which vampire attack and Distributed Denial of Service (DDOS) attack were leading. In this paper using a newly proposed Enhanced Ad Hoc on-Demand Vector (ENAODV) routing protocol, the link break at distant node is repaired with alternate path selection of shortest route in secure manner. The Adaptive T...
A new attack called the snoop-forge-replay attack is presented on keystroke-based continuous verification systems. The snoop-forge-replay is a sample-level forgery attack and is not specific to any particular keystroke-based continuous verification method or sysem. It can be launched with easily available keyloggers and APIs for keystroke synthesis. Our results ffrom 2460 experiments show that:...
On or about August 25 2013, the name servers supporting the country code Top Level Domain (ccTLD) “.cn” were attacked and brought offline[2, 6–8, 11]. As local DNS caches expired, this attack eventually affected the internet traffic of most users attempting to reach Chinese websites because the authoritative DNS servers for those sites ceased working. While the attack itself was widely reported...
This paper studies the Coremelt attack, a linkflooding Distributed Denial of Service attack that exhausts the bandwidth at a core network link using low-intensity traffics between subverted sources. A dynamical system model is formulated for analyzing the effect of the Coremelt attack on a single-link Transmission Control Protocol (TCP) network. Stability and convergence of the source flow rate...
We translate the argumentation networks A = (S,R) into a theory ∆A of intuitionistic logic, retaining S as the domain and using intuitionistic negation to model the attack R in A: the attack xRy is translated to x → ¬y. The intuitionistic models of ∆A characterise the complete extensions of A. The reduction of argumentation networks to intuitionistic logic yields, in addition to a representatio...
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenarios. The Correlated Attack Modeling Language (CAML) uses a modular approach, where a module represents an inference step and modules can be linked together to detect multistep scenarios. CAML is accompanied by a library of ...
Much literature is dedicated to the study of density dependence in host-parasitoid systems. The theoretical literature identifies two potential stabilization mechanisms relating the response of the parasitoid to host density. One is a behavioral response that occurs at a local level, and the other is a demographic response that occurs at a larger spatial scale with heterogeneous patches of host...
This dissertation is concerned with cryptanalysis of E0, the stream cipher used in the short-range wireless radio standard Bluetooth, and of its generalization by means of correlation attacks. It consists of three parts. In the first part, we propose an E0-like combiner with memory as the core stream cipher. First, we formulate a systematic and simple method to compute the correlations. An uppe...
In this paper, we have proposed a comprehensive and innovative approach for analysis and visualization of large complex multi-step cyber attack graphs. As an automated tool for cyber attack detection, prediction, and visualization, the newly proposed method transforms large quantities of network security data into real-time actionable intelligence, which can be used to (1) provide guidance on n...
repeatability, (the consistency with which a given trait is expressed) of aggressiveness against prey (attack latency) in gravid females of the predatory mite neoseiulus californicus (mcgregor) was examined. in two experiments, prey - conspecific individuals, the onion thrips thrips tabaci (lindeman), and the two-spotted spider mite tetranychus urticae koch- were repeatedly offered in various n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید