نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2010
Wael Kanoun Nora Cuppens-Boulahia Frédéric Cuppens Samuel Dubus Serge Papillon Antony Martin

Nowadays, response systems are used jointly with preventive measures, to ensure an enhanced security level for a given system. In particular, previous papers focus on balancing the cost of the response with the impact of the attack. However, even if an attack was detected, it may not be able to achieve its objective. In this paper, we present a novel attack response system, based on the assessm...

2006
Jarmo Mölsä

This paper analyzes application level performance during a range attack in ad hoc networks. This new denial of service (DoS) attack is based on periodical changes in the transmission range of a wireless node. It is very difficult to detect this attack, because it is perfectly normal for the transmission range to vary. The main contribution of this paper is to present two cross-layer designs for...

2016
CHAHIDI Badr EZZATI Abdellah

lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol). In this a...

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

Journal: :iranian journal of allergy, asthma and immunology 0
m.ii. boskabady m. ilosaini

for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....

2009
Tak-Lon Wu

The Domain Name system (DNS) has become a ubiquitous part of modern internet infrastructure that maps numeric IP address to human-readable names. In the recent years, denial of service (DoS) attacks on DNS has a trend to be more serious problems. These attack is mainly related the hierarchical namespace architecture, which is hard to avoid as this architecture are widely deployment in multi-lev...

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده مهندسی 1394

روش های موجود برای احرازهویت با توجه به ذخیره تصاویر عنبیه برای مرحله تطبیق، باعث نقض حریم خصوصی افراد و لورفتن ویژگی بیومتریک آنان می شود. الگوریتم پیشنهادی راهکاری برای استفاده از تصاویر بدست آمده از عنبیه برای تولید یک کلید موقت برای عنبیه کاربر و استفاده از ویژگی های عنبیه چشم او و ترکیب آنها برای تولید یک کپسول بیومتریک جهت احرازهویت می باشد. این کار با استفاده از عنبیه‏ های دو چشم کاربر و...

2012
Dr. K. Chitra

–Mobile network has a highest level of vulnerability since mobile networks are liable to attack due to its transparent location. The Adhoc nature posses structure less property due to its dynamic nature which paves way for multiple ways of attacks. Implementing IDS is a tedious process and one among them is Worm Hole attack which really challenges researchers to provide solution for preventing ...

2013
Su Man Nam Tae Ho Cho

An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the energy consumption of each node. To prevent...

2000
Jean-Sébastien Coron David Naccache

We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme’s security is based on two assumptions namely the strong RSA assumption and the existence of a division-intractable hash-function. For the latter, the authors conjectured a security level exponential in the hash-function’s digest size whereas our attack is sub-exponential with respect ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید