نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
RSA and Bell Labs 2, 3] have recently announced a potential attack on certain public key protocols, along with several suggested countermeasures. The most secure of these countermeasures uses the concept of plaintext aware, which means that it should be infeasible to construct a valid ciphertext without knowing the corresponding plaintext. Failure to be plaintext aware may open a cryptosystem t...
Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed user authentication mechanisms fail to provide protection against this type of attack, even when they run on top of SSL/TLS. As a possible countermeasure, we introduce the notion of SSL/TLS session-aware user authentication, and p...
Geographical and Energy Aware Routing (GEAR) is an efficient routing protocol in wireless sensor networks (WSN). It behaves well in the face of routing attacks, but it is incapable of defending bogus routing information, sybil attack and selective forwarding. Aimed at this problem, this paper present a location pairwise keys bootstrap scheme based secure geographical and energy aware routing pr...
In recent years, Denial of Service attacks have evolved into a predominant network security threat. Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS attacks are not as difficult to launch as one would expect. Protection against them is, however, disproportionately difficult. Recognising the fact that the networks of the near future...
The subclinical rhythmic electrographic discharge in adults (SREDA) has been rarely reported. We describe the case of a 71 year-old man with transient ischemic attack, whose EEG showed an atypical evolution of this uncommon pattern. The computed tomography scan and cerebrospinal fluid were normal. We are not aware of any other report in the literature with this atypical evolution of SREDA.
BACKGROUND Gouty arthritis of the wrist is uncommon although gout itself is the most common inflammatory arthritis in older patients. Some known risk factors for the development of gout include trauma, alcohol use, obesity, hyperuricaemia, hypertension and diabetes mellitus. As well, certain medications have been shown to promote the development of gout. These include thiazide diuretics, low do...
Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...
Privacy risk assessment is a crucial issue in any privacy-aware analysis process. Traditional frameworks for privacy systematically generate the assumed knowledge potential adversary, evaluating without realistically modelling collection of background used by adversary when performing attack. In this work, we propose Simulated Annealing (SPA), new adversarial behavior model mobility data. We an...
Case 1,* a married woman, a former nurse, aged 66 years, was admitted to the West London Hospital on November 12, 1967, after a syncopal attack provoked by climbing a long flight of stairs. On regaining consciousness she had had a small haematemesis. There was no history of dyspepsia and she had not taken any drugs. She had suffered from a severe and prolonged attack of rheumatic fever 40 years...
Sensor nodes used in enemy environments are disposed to capture and Compromise. An adversary may obtain secret information from sensors, such attack is named as clone attack. The clone attack, Replicate nodes and arrange them in the network to launch a variety of other attacks. In recent years, mobile agents have been suggested for effective data broadcasting in sensor networks and a number of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید