نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

2008
Tobias Eibach Enrico Pilz Gunnar Völkel

In this paper we present experimental results of an application of SAT solvers in current cryptography. Trivium is a very promising stream cipher candidate in the final phase of the eSTREAM project. We use the fastest industrial SAT solvers to attack a reduced version of Trivium – called Bivium. Our experimental attack time using the SAT solver is the best attack time that we are aware of, it i...

2009
Sipat Triukose Zakaria Al-Qudah Michael Rabinovich

Content Delivery Networks (CDNs) are commonly believed to offer their customers protection against application-level denial of service (DoS) attacks. Indeed, a typical CDN with its vast resources can absorb these attacks without noticeable effect. This paper uncovers a vulnerability which not only allows an attacker to penetrate CDN’s protection, but to actually use a content delivery network t...

2017
Rui Zhang Quanyan Zhu

Cyber insurance is a valuable approach to mitigate further the cyber risk and its loss in addition to the deployment of technological cyber defense solutions such as intrusion detection systems and firewalls. An effective cyber insurance policy can reduce the number of successful cyber attacks by incentivizing the adoption of preventative measures and the implementation of best practices of the...

2015
Dalbir Singh Manjot Kaur

VANETs also called as intelligent transportation system (ITS) in which vehicles communicate to provide timely information. Their aim is to provide security, information and management of network. Instead of their many advantages vehicular network is prone to various attacks. In this research removal of Sybil attack in which node creates its multiple identities and it can be affected by various ...

Journal: :Journal of Network and Computer Applications 2022

The rapidly expanding nature of the Internet Things (IoT) networks is beginning to attract interest across a range applications, including smart homes, transportation, health, and industrial contexts such as robotics. This cutting-edge technology enables individuals track control their integrated environment in real-time remotely via thousands IoT devices comprised sensors actuators that active...

2017
Shiqing Ma Juan Zhai Fei Wang Kyu Hyung Lee Xiangyu Zhang Dongyan Xu

Traditional auditing techniques generate large and inaccurate causal graphs. To overcome such limitations, researchers proposed to leverage execution partitioning to improve analysis granularity and hence precision. However, these techniques rely on a low level programming paradigm (i.e., event handling loops) to partition execution, which often results in low level graphs with a lot of redunda...

2014
V. Sharmila Mr. K. MuthuRamalingam

one of the most complicated attacks in wireless sensor network is energy depletion attack. In which vampire attack and Distributed Denial of Service (DDOS) attack were leading. In this paper using a newly proposed Enhanced Ad Hoc on-Demand Vector (ENAODV) routing protocol, the link break at distant node is repaired with alternate path selection of shortest route in secure manner. The Adaptive T...

2010
Dominik Fisch Ferdinand Kastl Bernhard Sick

A typical task of intrusion detection systems is to detect known kinds of attacks by analyzing network traffic. In this article, we will take a step forward and enable such a system to recognize very new kinds of attacks by means of novelty-awareness mechanisms. That is, an intrusion detection system will be able to recognize deficits in its own knowledge and to react accordingly. It will prese...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید