نتایج جستجو برای: level attack
تعداد نتایج: 1152212 فیلتر نتایج به سال:
In order to be secure, modules that provide cryptographic function must do more than simply implement a secure cryptographic algorithm. They must resist system-level attacks, whether by software or hardware, and whether the attack is intended to produce incorrect results or to expose information that should be protected. The details of these requirements change over time. Both attack and defens...
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack paths (combinations of exploits), from which one can decide whether a given set of network hardening measures guarantees the safety of given critical resources. We go beyond attack paths to compute actual se...
In this paper, Data mining technique is used to present the concept of attack data analysis and traffic classification. Here the system is completely a automated system that contains packet capturing, processing of multiple attack logs, labeling of network traffic based on low level features and applying the classification algorithm to build a traffic classifier which will classify the normal a...
IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...
We present a new class of low-volume application layer DDoS attack–Very Short Intermittent DDoS (VSI-DDoS). Such attack sends intermittent bursts (tens of milliseconds duration) of legitimate HTTP requests to the target website with the goal of degrading the quality of service (QoS) of the system and damaging the long-term business of the service provider. VSI-DDoS attacks can be especially ste...
The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network suffers from an unpredictable attack, i...
background: as yet migraine has been established as one of the risk factors for ischemic stroke. some of the factors have been assessed for the explanation of this relation. hyperhomocysteinemia is seen partly both in stroke and in migraine. this study was conducted to determine the mean plasma levels of homocysteine in ischemic stroke patients on the basis of migraine history.methods: this cro...
In this paper we present a preimage attack on EnRUPT512. We exploit the fact that the internal state is only a little bit larger than the critical security level: 1152 bits against 1024 bits. The absence of a message expansion and a fairly simple compression function allow us to fix the values for some state words and thus reduce the size of birthday state space in the meet-in-the-middle attack...
Clock control sequence reconstruction is a key phase in the cryptanalysis of irregularly clocked Linear Feedback Shift Registers (LFSRs), which are widely used in spreadspectrum systems. The previously published reconstruction methods have been designed to work in the known plaintext attack scenario, i.e. without noise. However, the influence of noise on the effectiveness of the clock control s...
In secure multicast communications, key management is employed to prevent unauthorized access to the multicast content. Key management, however, can disclose the information about the dynamics of the group membership to inside attackers, which is a potential threat to many multicast applications. In this paper, we investigated several attack strategies for stealing group dynamic information and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید