Search Results - "Attacker"
-
1
Lifestyles and Migraine Attack
Published 2011“…Conclusion: The findings of this study suggested that engaging in physical activity and reduce the level of stress may reduce the risk of migraine attack.…”
Get full text
Get full text
-
2
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
Published 2015“…The current paper accentuates the potentials of game theory considering mutli-attacker collusion as the new enhancement that can effectively represent the various unpredictable actions of node cooperation, node declination, node attacks, as well as node reporting that can model the tactical profiling of various mobile nodes. …”
Get full text
Get full text
-
3
Modeling malicious multi-attacker node collusion in MANETs via game theory
Published 2017“…The proposed study highlights the ability of game theory for enhancing the multi-attacker collusion approach to represent the unpredictable behavior of nodes in cooperating, reporting, declining or attacking other nodes to achieve effective modelling of the range of mobile nodes in a mobile adhoc network.…”
Get full text
Get full text
-
4
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
Published 2020“…Distributed Denial of Service (DDoS) detection involves complex process which reduces the overall performance of the system, and consequently, it may incur inefficiency or failure to the network. In this paper, the attacks database is split into a set of groups by classifying the attack types in terms of the most dominant features that define the profile of each attack along with the sensitive network traffic features. …”
Get full text
Get full text
Get full text
-
5
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
Published 2019“…There have been several researches that discusses on multi-factor authentication scheme but most of these research do not entirely protect data against all types of attacks. Furthermore, most current research only focuses on improving the security part of authentication while neglecting other important parts such as the systems accuracy. …”
Get full text
Get full text
-
6
-
7
-
8
Tracing Technique for Blaster Attack
Published 2009“…This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. …”
Get full text
Get full text
-
9
A robust security framework with bit-flipping attack and timing attack for key derivation functions
Published 2020“…The result shows that none of the existing KDFs are secure in CAM for both the bit-flipping attack and timing attack. Hence, this research introduces an alternative KDF that is proven secure in CAM.…”
Get full text
Get full text
-
10
Review of SIP based DoS attacks
Published 2016“…Firstly, we present a brief overview about the SIP protocol. Then, security attacks related to SIP protocol. After that, detection techniques of SIP flooding attack and various exploited resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks…”
Get full text
Get full text
-
11
Attacks on SVD-Based watermarking schemes
Published 2008“…Our results are the first known attacks on these SVD-based watermarking schemes. …”
Get full text
-
12
Mitigating sulphate attacks in geotechnical engineering
Published 2017“…A magnesium sulphate attack is one of the main issues that challenge civil engineering projects, in particular in coastal, landfill, and mining areas. …”
Get full text
-
13
Expert System of Heart Attack Prediction
Published 2019“…Nowadays, heart attack become most common deadly disease in modern era. …”
Get full text
Get full text
-
14
Joux multicollisions attack in sponge construction
Published 2013“…Our attack is similar to Joux attack but specifically for sponge construction1. …”
Get full text
Get full text
-
15
State-of-the-art digital watermarking attacks
Published 2011“…Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks…”
Get full text
Get full text
-
16
State-of-the-art digital watermarking attacks
Published 2012“…Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. …”
Get full text
Get full text
-
17
Taxonomy of attacks on wireless sensor networks
Published 2005Subjects: Get full text
Get full text
-
18
An attack on undeniable partially blind signatures
Published 2005Subjects: Get full text
Get full text
-
19
-
20
Attack Intention Recognition: A Review
Published 2017“…A causal network approach is used to recognize attackers’ plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system.…”
Get full text
Get full text
Get full text