نتایج جستجو برای: level attack
تعداد نتایج: 1152212 فیلتر نتایج به سال:
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis
Smart grid is an intelligent energy distribution system consisting of multiple information and communication technologies (ICT). One of the challenges for such complex and heterogeneous system as smart grid is to unite security analysis on a high level of abstraction and concrete behavioral attack patterns that exploit low-level vulnerabilities. We provide a structured method that combines the ...
background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...
This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a sub-network of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external...
background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...
The approach to network security analysis is suggested. It is based on simulation of malefactor’s behavior, generating attack graph and calculating different security metrics. The graph represents all possible attack scenarios taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The security metrics describe computer network security a...
This paper introduces a new generic decoding algorithm that is asymptotically faster than any previous attack against the McEliece cryptosystem. At a 256-bit security level, the attack costs 2.6 times fewer bit operations than the best previous attack; at a theoretical 1000-bit security level, the attack costs 15.5 times fewer bit operations than the best previous attack. The algorithm is asymp...
Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...
Logic locking is a hardware security technique aimed at protecting intellectual property against threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional circuitry within an integrated circuit (IC) that induces incorrect digital functionality when verification key provided user. The amount of error induced known as effect...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید