نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

1998
Joseph H. Silverman

RSA and Bell Labs 2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem t...

Journal: :Computer Communications 2006
Rolf Oppliger Ralf Hauser David A. Basin

Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed user authentication mechanisms fail to provide protection against this type of attack, even when they run on top of SSL/TLS. As a possible countermeasure, we introduce the notion of SSL/TLS session-aware user authentication, and p...

2013
Haixia Zhao Yaowei Li Jincheng Shen Mingchuan Zhang Ruijuan Zheng Qingtao Wu

Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in wireless sensor networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus routing information, sybil attack and selective forwarding. Aimed at this problem, this paper present a location pairwise keys bootstrap scheme based secure geographical and energy aware routing pr...

2008
Georgios Loukas Gulay Oke Erol Gelenbe

In recent years, Denial of Service attacks have evolved into a predominant network security threat. Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS attacks are not as difficult to launch as one would expect. Protection against them is, however, disproportionately difficult. Recognising the fact that the networks of the near future...

Journal: :Arquivos de neuro-psiquiatria 1995
D F Silva E Zanoteli M M Lima R Anghinah J G Lima

The subclinical rhythmic electrographic discharge in adults (SREDA) has been rarely reported. We describe the case of a 71 year-old man with transient ischemic attack, whose EEG showed an atypical evolution of this uncommon pattern. The computed tomography scan and cerebrospinal fluid were normal. We are not aware of any other report in the literature with this atypical evolution of SREDA.

Journal: :Chiropractic & Osteopathy 2007
Craig L Jacobs Paula J Stern

BACKGROUND Gouty arthritis of the wrist is uncommon although gout itself is the most common inflammatory arthritis in older patients. Some known risk factors for the development of gout include trauma, alcohol use, obesity, hyperuricaemia, hypertension and diabetes mellitus. As well, certain medications have been shown to promote the development of gout. These include thiazide diuretics, low do...

2016
Karthikeyan Thyagarajan Arunkumar Thangavelu

Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...

Journal: :IEEE Transactions on Intelligent Transportation Systems 2022

Privacy risk assessment is a crucial issue in any privacy-aware analysis process. Traditional frameworks for privacy systematically generate the assumed knowledge potential adversary, evaluating without realistically modelling collection of background used by adversary when performing attack. In this work, we propose Simulated Annealing (SPA), new adversarial behavior model mobility data. We an...

Journal: :Annals of the rheumatic diseases 1970
R Grahame A B Mitchell J T Scott

Case 1,* a married woman, a former nurse, aged 66 years, was admitted to the West London Hospital on November 12, 1967, after a syncopal attack provoked by climbing a long flight of stairs. On regaining consciousness she had had a small haematemesis. There was no history of dyspepsia and she had not taken any drugs. She had suffered from a severe and prolonged attack of rheumatic fever 40 years...

2014
SEPIDE MORADI MINA ZOLFY LIGHVAN

Sensor nodes used in enemy environments are disposed to capture and Compromise. An adversary may obtain secret information from sensors, such attack is named as clone attack. The clone attack, Replicate nodes and arrange them in the network to launch a variety of other attacks. In recent years, mobile agents have been suggested for effective data broadcasting in sensor networks and a number of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید