نتایج جستجو برای: malicious user

تعداد نتایج: 253175  

Journal: :IEEE Access 2023

Device-to-device (D2D) communication in cellular networks refers to a technology that enables direct transmission and reception between devices proximity without infrastructures such as base stations (BSs). It has consistently attracted attention due its key role extending coverage through the configuration of clusters, which D2D belonging cluster can either be head or member. In this paper, we...

Journal: :CoRR 2014
Andrea Gianazza Federico Maggi Aristide Fattori Lorenzo Cavallaro Stefano Zanero

Popularity and complexity of malicious mobile applications are rising, making their analysis difficult and labor intensive. Mobile application analysis is indeed inherently different from desktop application analysis: In the latter, the interaction of the user (i.e., victim) is crucial for the malware to correctly expose all its malicious behaviors. We propose a novel approach to analyze (malic...

2016
Huy Hang Adnan Bashir Michalis Faloutsos Christos Faloutsos Tudor Dumitras

Malware authors have been using websites to distribute their products as a way to evade spam filters and classic anti-virus engines. Yet there has been relatively little work in modeling the behaviors and temporal properties of websites, as most research focuses on detecting whether a website distributes malware. In this paper we ask: How does web-based malware spread? We conduct an extensive s...

2010
Jude Desti Hongmei Chi

Web browsers currently have security indicators which provide security features that notify users of malicious or un-trusted websites. Most of these security indicators are normally synced with some black list data base that has a list with known websites that are known to be malicious. When a user surfs a website that is identified in the black list data base, the security indicators then noti...

2010
Daniel Fuentes Juan A. Álvarez Juan A. Ortega Luis Gonzalez-Abril Francisco Velasco

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...

Journal: :IACR Cryptology ePrint Archive 2015
Travis Mayberry Erik-Oliver Blass Guevara Noubir

It has been an open question whether Oblivious RAM stored on a malicious server can be securely shared among multiple users. ORAMs are stateful, and users need to exchange updated state to maintain security. This is a challenge, as the motivation for using ORAM is that the users may not have a way to directly communicate. A malicious server can potentially tamper with state information and thus...

Journal: :Algorithms 2023

Cybersecurity models include provisions for legitimate user and agent authentication, as well algorithms detecting external threats, such intruders malicious software [...]

2006
István Zsolt Berta

Having no trusted user interface, smart cards are unable to communicate with the user directly. Communication is possible with the aid of a terminal only, which leads to several security problems. For example, if the terminal is untrusted (which is a very typical scenario), it may perform a man-in-the middle attack. Thus, a malicious terminal can make the user sign documents that she would not ...

Journal: :CoRR 2016
Ming Pang Wei Gao Min Tao Zhi-Hua Zhou

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید