نتایج جستجو برای: primary user emulation attack
تعداد نتایج: 950393 فیلتر نتایج به سال:
This paper describes approach, methodology, and potential application areas for agent technologies in C2 performance and primarily focuses on the development of agent-based constructed forces. The platform involved is the AWACS-AEDGETM. This is a distributed, realtime team decision support environment comprised of simulators, entity framework, intelligent agents and user interfaces. The AEDGE i...
In the context of specific user (surgery or handicap domain), the list of requirements is especially difficult to establish. We propose to reflect on the design methodology and especially on the Scenario & Emulation application. The aim is to make emerge needs in users who have specific relation to the final product. In this paper, we illustrate the research with two projects: the DESTIN Projec...
Owing to rapid increase in PV penetration without inherent inertia, there has been an unremitting deterioration of the effective inertia existing power systems. This may pose a serious threat stability systems during disturbances if not taken care of. Hence, problem how emulate Synthetic Inertia (SI) Systems (PVS) retain their frequency demands attention. Super Capacitor (SC)-based storage beco...
One way a malicious insider can attack a network is by masquerading as a different user. Various algorithms have been proposed in an effort to detect when a user masquerade attack has occurred. In this paper, two unsupervised algorithms are proposed with the intended goal of detecting user masquerade attacks. The effectiveness of these two unsupervised algorithms are then compared against super...
In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symm...
—User authentication and key management play an important role in the security of WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from dedicated sensors. For this case, several user authentication schemes have been proposed in recent years. Among these schemes, Kim Jiye et. al’s scheme is very novel. However, in the current work...
The secret key used in a cryptosystem can be retrieved by physical attacks such as side-channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for different physical attacks are developed in a separate fashion. To lay a solid foundation for countermeasure development for the emerging combined attacks, it is imperative to thoroughly study how the countermeasure fo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید