نتایج جستجو برای: level attack
تعداد نتایج: 1152212 فیلتر نتایج به سال:
Nowadays, response systems are used jointly with preventive measures, to ensure an enhanced security level for a given system. In particular, previous papers focus on balancing the cost of the response with the impact of the attack. However, even if an attack was detected, it may not be able to achieve its objective. In this paper, we present a novel attack response system, based on the assessm...
This paper analyzes application level performance during a range attack in ad hoc networks. This new denial of service (DoS) attack is based on periodical changes in the transmission range of a wireless node. It is very difficult to detect this attack, because it is perfectly normal for the transmission range to vary. The main contribution of this paper is to present two cross-layer designs for...
lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol). In this a...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....
The Domain Name system (DNS) has become a ubiquitous part of modern internet infrastructure that maps numeric IP address to human-readable names. In the recent years, denial of service (DoS) attacks on DNS has a trend to be more serious problems. These attack is mainly related the hierarchical namespace architecture, which is hard to avoid as this architecture are widely deployment in multi-lev...
روش های موجود برای احرازهویت با توجه به ذخیره تصاویر عنبیه برای مرحله تطبیق، باعث نقض حریم خصوصی افراد و لورفتن ویژگی بیومتریک آنان می شود. الگوریتم پیشنهادی راهکاری برای استفاده از تصاویر بدست آمده از عنبیه برای تولید یک کلید موقت برای عنبیه کاربر و استفاده از ویژگی های عنبیه چشم او و ترکیب آنها برای تولید یک کپسول بیومتریک جهت احرازهویت می باشد. این کار با استفاده از عنبیه های دو چشم کاربر و...
–Mobile network has a highest level of vulnerability since mobile networks are liable to attack due to its transparent location. The Adhoc nature posses structure less property due to its dynamic nature which paves way for multiple ways of attacks. Implementing IDS is a tedious process and one among them is Worm Hole attack which really challenges researchers to provide solution for preventing ...
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the energy consumption of each node. To prevent...
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme’s security is based on two assumptions namely the strong RSA assumption and the existence of a division-intractable hash-function. For the latter, the authors conjectured a security level exponential in the hash-function’s digest size whereas our attack is sub-exponential with respect ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید