نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

Journal: :Journal of Modern Power Systems and Clean Energy 2018

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

2014
Rui Marcelino José Afonso José Cicero Moraes Isabel Mesquita

This study aims at analysing probabilistic relationships predicting the outcomes relating to attack players in elite-level men’s volleyball. Nineteen matches from the 2006 Men’s World Championships were notated and the tactical indicators regarded the space-, task-, playerand efficacy-related dimensions of selected game actions (reception, set and attack) played in side-out. A multinomial logis...

2003
Carol Taylor Jim Alves-Foss

This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition” and discuss how our approach fits the requirements. Empirical results are given along with an estimate of the measured performance. Other work is reviewed within the context of attack recognition for survivability.

2001
C Taylor Harrison A Krings N Hanebutte M McQueen

This research presents a new method for detecting network attacks based on network tra c signatures The method emphasizes low level analysis of network tra c high e ciency real time operation and accurate identi cation of attacks Attack recogni tion is based on the analysis of TCP protocol ags with respect to speci c attacks and is characterized by its simplicity Index Terms Attack recognition ...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

2003
Michael Howard Jon Pincus Jeannette M. Wing

We propose a metric for determining whether one version of a system is more secure than another with respect to a fixed set of dimensions. Rather than count bugs at the code level or count vulnerability reports at the system level, we count a system’s attack opportunities. We use this count as an indication of the system’s “attackability,” likelihood that it will be successfully attacked. We de...

Journal: :Future Generation Comp. Syst. 2011
Xiaogang Wang Junzhou Luo Ming Yang Zhen Ling

Tor has become one of the most popular overlay networks for anonymizing TCP traffic, however, the anonymity of Tor clients is threatened by various attacks exploiting traffic analysis or Tor’s design features. Although considerable effort has beenmade to secure and improve Tor networks, little attention has been paid to various application-level attacks against Tor. In this paper, we present a ...

Journal: :CoRR 2015
Daniel Gruss Clémentine Maurice Klaus Wagner

Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. The Flush+Flus...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید