Search alternatives:
"providing attacks" » "promising attacks" (Expand Search)
Showing 1 - 2 results of 2 for search '"providing attacks"', query time: 0.05s Refine Results
  1. 1

    General Construction Method and Proof for a Class of Quadratic Chaotic Mappings by Wenxia Xu, Xiangkun Chen, Ziwei Zhou, Guodong Li, Xiaoming Song

    Published 2025-07-01
    “…The importance of chaotic systems as the main pseudo-random cryptographic generator of encryption algorithms in the field of communication secrecy cannot be overstated, but in practical applications, researchers often choose to build upon traditional chaotic maps, such as the logistic map, for study and application. This approach provides attackers with more opportunities to compromise the encryption scheme. …”
    Get full text
    Article
  2. 2

    Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees by Justinas Rastenis, Simona Ramanauskaitė, Antanas Čenys, Pavel Stefanovič, Asta Radzevičienė

    Published 2025-03-01
    “…Employees in the education system are highly affected by spear-phishing attacks and need less than one minute to provide attacker-requested data. This illustrates that automated e-mail filtering systems are a key element in the fight against these kinds of attacks.…”
    Get full text
    Article