نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2011
Aleksey A. Galtsev Andrei M. Sukhov

In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application. The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make a list of trespassers’ IP-addresses. Therefore, this method can be applied in intrusion detection systems, a...

Journal: :Applied sciences 2023

Quantum computing is currently being researched in many countries, and if implemented the near future, it may pose a threat to existing encryption standards. In quantum computer environment, asymmetric can be solved by Shor’s Algorithm polynomial time, difficulty of breaking symmetric using brute force reduced from N times square root Grover’s Algorithm. We take Advanced Encryption Standard as ...

Journal: :IEEE/ACM transactions on audio, speech, and language processing 2022

Over the past few years, various word-level textual attack approaches have been proposed to reveal vulnerability of deep neural networks used in natural language processing. Typically, these involve an important optimization step determine which substitute be for each word original input. However, current research on this is still rather limited, from perspectives both problem-understanding and...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

Journal: :iranian journal of immunology 0
alireza salek moghaddam department of immunology mohammad shabani department of biochemistry, iran university of medical sciences, tehran, iran farahdokht fateminasab department of immunology mohammad reza khakzad department of immunology

background: asthma is a chronic inflammatory disease with multifactorial and complicated mechanisms. elevated level of exhaled nitric oxide (no) in asthma and other inflammatory lung diseases has led to many studies examining no as a potential marker of airway inflammation. objective: this study was designed to determine the level of no in bronchoalveolar lavage (bal) fluid during early and lat...

Journal: :IEEE Transactions on Very Large Scale Integration Systems 2022

Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC) chips in a practical utilization environment. This article provides overviews of physical attacks cryptographic circuits, associated vulnerabilities an IC chip, and protection schemes the vertical unification systems, packaging technologies. The design principles on-chip monitoring circuits to sense attack...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2020

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید