نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :Evolution; international journal of organic evolution 2012
Andy Fenton Janis Antonovics Michael A Brockhurst

There is growing evidence that successful infection of hosts by pathogens requires a series of independent steps. However, how multistep infection processes affect host-pathogen coevolution is unclear. We present a coevolutionary model, inspired by empirical observations from a range of host-pathogen systems, where the infection process consists of the following two steps: the first is for the ...

‎The main purpose of this paper is to study the numerical solution of nonlinear Volterra integral equations with constant delays, based on the multistep collocation method. These methods for approximating the solution in each subinterval are obtained by fixed number of previous steps and fixed number of collocation points in current and next subintervals. Also, we analyze the convergence of the...

2007
Alex Biryukov Andrey Bogdanov Dmitry Khovratovich Timo Kasper

Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this...

2016
Minsu Jo mi Baek Jin-hee Lee Sang Hyuk Son

In this paper, we analyze the performance various sensor fusion models using an unmanned ground vehicle. In a given attack scenario, we examine how attacks influence on each fusion model by comparing the results of different models We conduct the experiments with real measurement data obtained from an unmanned ground vehicle. Keywords— Sensor Fusion Model; Attack; Resiliency

Journal: :Emerging Infectious Diseases 1997
A. F. Kaufmann M. I. Meltzer G. P. Schmid

Understanding and quantifying the impact of a bioterrorist attack are essential in developing public health preparedness for such an attack. We constructed a model that compares the impact of three classic agents of biologic warfare (Bacillus anthracis, Brucella melitensis, and Francisella tularensis) when released as aerosols in the suburb of a major city. The model shows that the economic imp...

2011
A. K. JAIN M. N. MURTY Leonid Portnoy Salvatore Stolfo K. N. Levitt B. Mukherjee S. E. Smaha T. Grance

The intrusion detection systems focus on low-level attacks, and only generate isolated alerts. They can’t find logical relations among alerts. In addition, IDS’s accuracy is low; a lot of alerts are false alerts. So it is difficult for human users or intrusion response systems to understand the alerts and take appropriate actions. To solve this problem different intrusion scenario detection met...

2003
Barry M. Horowitz Yacov Y. Haimes

Disruption of a terrorist attack depends on having information facilitating the identification and location of those involved in supporting, planning, and carrying out the attack. Such information arises from myriad sources, such as human or instrument surveillance by intelligence or law enforcement agencies, a variety of documents concerning transactions, and tips from a wide range of occasion...

Journal: :IACR Cryptology ePrint Archive 2017
Sanjay Bhattacherjee Palash Sarkar

This work shows that weighted majority voting games occur in cryptocurrencies. In particular, two such games are highlighted. The first game, which we call the Rule Game, pertains to the scenario where the entities in the system engage in a voting procedure to accept or reject a change of rules. The second game, which we call the Attack Game, refers to the scenario where a group of entities in ...

2006
Erez Sabbag

An information–theoretic approach is proposed to watermark embedding and detection under limited detector resources. First, we consider the attack-free scenario under which asymptotically optimal decision regions in the Neyman-Pearson sense are proposed, along with the optimal embedding rule. Later, we explore the case of zero-mean i.i.d. Gaussian covertext distribution with unknown variance un...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید