Showing 421 - 440 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 421
  2. 422
  3. 423
  4. 424
  5. 425
  6. 426

    Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments by Hanan Abbas Mohammad

    Published 2024-12-01
    Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
    Get full text
    Article
  7. 427
  8. 428
  9. 429
  10. 430
  11. 431
  12. 432
  13. 433

    Defending Against Advanced Persistent Threats Using Game-Theory. by Stefan Rass, Sandra König, Stefan Schauer

    Published 2017-01-01
    “…Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. …”
    Get full text
    Article
  14. 434

    Anonymous whistleblowers reply scheme based on secret sharing by HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing

    Published 2024-12-01
    “…Existing anonymous communication systems that resisted traffic analysis could hide the identities of the communicating parties from the attacker. However, the identities of the communicating parties couldn’t be hidden from each other, and thus these systems did not apply to the scenario of anonymous whistleblowing and replying, where it was necessary to protect the identity of the whistleblower. …”
    Get full text
    Article
  15. 435

    An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning by Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo

    Published 2022-05-01
    “…Abstract Defensive deception is emerging to reveal stealthy attackers by presenting intentionally falsified information. …”
    Get full text
    Article
  16. 436

    Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing by Fahmi Fachri

    Published 2023-02-01
    “…The opening of several ports that are still open and causes intruders to easily enter the system to carry out Brute Force attacks or others. The results of the simulation trial of the attack on the server were successfully carried out by obtaining a username and password, this is of course dangerous that the system can be taken over by intruders. …”
    Get full text
    Article
  17. 437

    Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora by Muhammad Fadhli Iman, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…In the known-plaintext-attack attack test, the attacker failed to find the original key used in the 128-bit Clefia algorithm, so the attacker failed to attack the system.   …”
    Get full text
    Article
  18. 438

    Vulnerability Analysis of CSP Based on Stochastic Game Theory by Jiajun Shen, Dongqin Feng

    Published 2016-01-01
    “…The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. …”
    Get full text
    Article
  19. 439

    Framework for Secure Wireless Communication in Wireless Sensor Networks by Muhammad Usama, Fahad T. Bin Muhaya

    Published 2013-12-01
    “…The restricted and constrained nature of sensors along with potentially dynamic behavior of WSNs demands the proper implementation of framework for secure communication in order to prevent attacker from illegally accessing or altering the transmission. …”
    Get full text
    Article
  20. 440

    Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme by Huixian Li, Liaojun Pang

    Published 2016-05-01
    “…The existing CP-ABPRE schemes were proven secure only in the selective security model, a limited model, which is an unnatural constraint on the attacker. The scheme proved in this model can only be called selectively secure one. …”
    Get full text
    Article