نتایج جستجو برای: cost sensitive attack graph

تعداد نتایج: 915732  

Journal: :IEEE Transactions on Knowledge and Data Engineering 2022

Deep neural networks (DNNs) have been widely applied to various applications, including image classification, text generation, audio recognition, and graph data analysis. However, recent studies shown that DNNs are vulnerable adversarial attacks. Though there several works about attack defense strategies on domains such as images natural language processing, it is still difficult directly trans...

Journal: :Digital threats 2022

As an analytical tool in cyber-security, attack graph (AG) is capable of discovering multi-stage vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type network that not only contains computing devices but also integrates components operate the continuous domain, such as sensors and actuators. Using AGs CPSs requires system models exploit patterns capture both...

بقایی, علی , قربعلی, زهره , میری لواسانی, سید محمد رضا , نصیری, پروین ,

Introduction: Due to the presence of extreme hazard sources and high intrinsic risk in refineries and process industry sectors, different layers of protection are being used to reduce the risk and avoid the hazardous events. Determining Safety Integrity Levels (SILs) in Safety Instrumented Systems (SISs) helps to ensure the safety of the whole process. Risk Graph is one of the most popular and ...

Journal: :iranian journal of public health 0
atefeh daraei hodjat hamidi

background: myocardial infarction (mi) occurs due to heart muscle death that costs like human life, which is higher than the treatment costs. this study aimed to present an mi prediction model using classification data mining methods, which consider the imbalance nature of the problem. methods: we enrolled 455 healthy and 295 myocardial infarction cases of visitors to shahid madani specialized ...

Journal: :Inf. Process. Lett. 2012
Bart Mennink

Chosen-target-forced-prefix (CTFP) preimage resistance is a hash function security property guaranteeing the inability of an attacker to commit to a hash function outcome h without knowing the prefix of the message to be hashed in advance. At EUROCRYPT 2006, Kelsey and Kohno described the herding attack against the Merkle-Damg̊ard design that results in a CTFP-preimage of length about n/3 blocks...

2006
Vaibhav Mehta Constantinos Bartzis Haifeng Zhu Edmund M. Clarke Jeannette M. Wing

A majority of attacks on computer systems result from a combination of vulnerabilities exploited by an intruder to break into the system. An Attack Graph is a general formalism used to model security vulnerabilities of a system and all possible sequences of exploits which an intruder can use to achieve a specific goal. Attack Graphs can be constructed automatically using off-the-shelf model-che...

2008
Gianni Tedesco Uwe Aickelin

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which attacks can be combined. These algorithms can be classified in to two broad categories namely scenari...

2013
Jaideep Vaidya Basit Shafiq Xiaoqian Jiang Lucila Ohno-Machado

Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive inf...

1998
Markus G. Kuhn Ross J. Anderson

It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This can be used for both attack and defence. To attack a system, malicious code can encode stolen information in the machine’s RF emissions and optimise them for some combina...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید