نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2002
Christopher Barnes Plamen V. Petrov Linda R. Elliott

This paper describes approach, methodology, and potential application areas for agent technologies in C2 performance and primarily focuses on the development of agent-based constructed forces. The platform involved is the AWACS-AEDGETM. This is a distributed, realtime team decision support environment comprised of simulators, entity framework, intelligent agents and user interfaces. The AEDGE i...

2009
G. Thomann

In the context of specific user (surgery or handicap domain), the list of requirements is especially difficult to establish. We propose to reflect on the design methodology and especially on the Scenario & Emulation application. The aim is to make emerge needs in users who have specific relation to the final product. In this paper, we illustrate the research with two projects: the DESTIN Projec...

Journal: :Synthese 2012

Journal: :Energies 2021

Owing to rapid increase in PV penetration without inherent inertia, there has been an unremitting deterioration of the effective inertia existing power systems. This may pose a serious threat stability systems during disturbances if not taken care of. Hence, problem how emulate Synthetic Inertia (SI) Systems (PVS) retain their frequency demands attention. Super Capacitor (SC)-based storage beco...

2010
Matt Wolff

One way a malicious insider can attack a network is by masquerading as a different user. Various algorithms have been proposed in an effort to detect when a user masquerade attack has occurred. In this paper, two unsupervised algorithms are proposed with the intended goal of detecting user masquerade attacks. The effectiveness of these two unsupervised algorithms are then compared against super...

2013
Ravi Singh Pippal Pradeep Gupta Rakesh Singh

In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symm...

Journal: :JCM 2016
Jiping Li Yaoming Ding Zenggang Xiong Shouyin Liu Honglai Li

—User authentication and key management play an important role in the security of WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from dedicated sensors. For this case, several user authentication schemes have been proposed in recent years. Among these schemes, Kim Jiye et. al’s scheme is very novel. However, in the current work...

Journal: :J. Electronic Testing 2016
Jaya Dofe Hoda Pahlevanzadeh Qiaoyan Yu

The secret key used in a cryptosystem can be retrieved by physical attacks such as side-channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for different physical attacks are developed in a separate fashion. To lay a solid foundation for countermeasure development for the emerging combined attacks, it is imperative to thoroughly study how the countermeasure fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید