نتایج جستجو برای: level attack
تعداد نتایج: 1152212 فیلتر نتایج به سال:
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application. The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make a list of trespassers’ IP-addresses. Therefore, this method can be applied in intrusion detection systems, a...
Quantum computing is currently being researched in many countries, and if implemented the near future, it may pose a threat to existing encryption standards. In quantum computer environment, asymmetric can be solved by Shor’s Algorithm polynomial time, difficulty of breaking symmetric using brute force reduced from N times square root Grover’s Algorithm. We take Advanced Encryption Standard as ...
Over the past few years, various word-level textual attack approaches have been proposed to reveal vulnerability of deep neural networks used in natural language processing. Typically, these involve an important optimization step determine which substitute be for each word original input. However, current research on this is still rather limited, from perspectives both problem-understanding and...
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
background: asthma is a chronic inflammatory disease with multifactorial and complicated mechanisms. elevated level of exhaled nitric oxide (no) in asthma and other inflammatory lung diseases has led to many studies examining no as a potential marker of airway inflammation. objective: this study was designed to determine the level of no in bronchoalveolar lavage (bal) fluid during early and lat...
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC) chips in a practical utilization environment. This article provides overviews of physical attacks cryptographic circuits, associated vulnerabilities an IC chip, and protection schemes the vertical unification systems, packaging technologies. The design principles on-chip monitoring circuits to sense attack...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید