نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2014
Kristian Beckers Maritta Heisel Leanid Krautsevich Fabio Martinelli Rene Meis Artsiom Yautsiukhin

Smart grid is an intelligent energy distribution system consisting of multiple information and communication technologies (ICT). One of the challenges for such complex and heterogeneous system as smart grid is to unite security analysis on a high level of abstraction and concrete behavioral attack patterns that exploit low-level vulnerabilities. We provide a structured method that combines the ...

Journal: :journal of occupational health and epidemiology 0
a esmaeili nadimi school of medicine, rafsanjan university of medical sciences, rafsanjan, iran m hasani rafsanjan university of medical sciences, rafsanjan, iran m allahtavakoli pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran e hakimizadeh pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran h bakhshi

background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...

2015
Zhigang Chu Jiazi Zhang Oliver Kosut Lalitha Sankar

This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a sub-network of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external...

Journal: :journal of research in medical sciences 0
ozge basaran nermin uncu banu acar celikel fatma ayd?n nilgun cakar

background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...

2006
Igor Kotenko Mikhail Stepashkin

The approach to network security analysis is suggested. It is based on simulation of malefactor’s behavior, generating attack graph and calculating different security metrics. The graph represents all possible attack scenarios taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The security metrics describe computer network security a...

Journal: :Journal of the Korea Society of Digital Industry and Information Management 2014

2010
Daniel J. Bernstein Tanja Lange Christiane Peters D. J. Bernstein T. Lange C. Peters

This paper introduces a new generic decoding algorithm that is asymptotically faster than any previous attack against the McEliece cryptosystem. At a 256-bit security level, the attack costs 2.6 times fewer bit operations than the best previous attack; at a theoretical 1000-bit security level, the attack costs 15.5 times fewer bit operations than the best previous attack. The algorithm is asymp...

Journal: :JNW 2015
Muhammad Morshed Alam Muhammad Yeasir Arafat Feroz Ahmed

Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...

Journal: :ACM Journal on Emerging Technologies in Computing Systems 2021

Logic locking is a hardware security technique aimed at protecting intellectual property against threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional circuitry within an integrated circuit (IC) that induces incorrect digital functionality when verification key provided user. The amount of error induced known as effect...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید