نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2005
Steve Weingart

In order to be secure, modules that provide cryptographic function must do more than simply implement a secure cryptographic algorithm. They must resist system-level attacks, whether by software or hardware, and whether the attack is intended to produce incorrect results or to expose information that should be protected. The details of these requirements change over time. Both attack and defens...

2003
Steven Noel Sushil Jajodia Brian O'Berry Michael Jacobs

In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to compute attack paths (combinations of exploits), from which one can decide whether a given set of network hardening measures guarantees the safety of given critical resources. We go beyond attack paths to compute actual se...

2014
Rajesh Kumar Tajinder Kaur P. Haffner S. Sen D. Wang J. Ma K. Levchenko C. Kreibich S. Savage G. M. Voelker

In this paper, Data mining technique is used to present the concept of attack data analysis and traffic classification. Here the system is completely a automated system that contains packet capturing, processing of multiple attack logs, labeling of network traffic based on low level features and applying the classification algorithm to build a traffic classifier which will classify the normal a...

Mohammad Hasan Kargar Maher Nemat Bilan, Parinaz Habibi

IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...

2017
Huasong Shan Qingyang Wang Qiben Yan

We present a new class of low-volume application layer DDoS attack–Very Short Intermittent DDoS (VSI-DDoS). Such attack sends intermittent bursts (tens of milliseconds duration) of legitimate HTTP requests to the target website with the goal of degrading the quality of service (QoS) of the system and damaging the long-term business of the service provider. VSI-DDoS attacks can be especially ste...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2013
Lijia Ma Maoguo Gong Qing Cai Licheng Jiao

The community structure and the robustness are two important properties of networks for analyzing the functionality of complex systems. The community structure is crucial to understand the potential functionality of complex systems, while the robustness is indispensable to protect the functionality of complex systems from malicious attacks. When a network suffers from an unpredictable attack, i...

Journal: :caspian journal of internal medicine 0
mehdi maghbooli mazyar hasanzadeh kyani mehran yoosefi

background: as yet migraine has been established as one of the risk factors for ischemic stroke. some of the factors have been assessed for the explanation of this relation. hyperhomocysteinemia is seen partly both in stroke and in migraine. this study was conducted to determine the mean plasma levels of homocysteine in ischemic stroke patients on the basis of migraine history.methods: this cro...

Journal: :IACR Cryptology ePrint Archive 2008
Dmitry Khovratovich Ivica Nikolic

In this paper we present a preimage attack on EnRUPT512. We exploit the fact that the internal state is only a little bit larger than the critical security level: 1152 bits against 1024 bits. The absence of a message expansion and a fairly simple compression function allow us to fix the values for some state words and thus reduce the size of birthday state space in the meet-in-the-middle attack...

2004
Slobodan V. Petrović Amparo Fúster-Sabater

Clock control sequence reconstruction is a key phase in the cryptanalysis of irregularly clocked Linear Feedback Shift Registers (LFSRs), which are widely used in spreadspectrum systems. The previously published reconstruction methods have been designed to work in the known plaintext attack scenario, i.e. without noise. However, the influence of noise on the effectiveness of the clock control s...

2003
Yan Sun K. J. Ray Liu

In secure multicast communications, key management is employed to prevent unauthorized access to the multicast content. Key management, however, can disclose the information about the dynamics of the group membership to inside attackers, which is a potential threat to many multicast applications. In this paper, we investigated several attack strategies for stealing group dynamic information and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید