Showing 1 - 20 results of 416 for search 'error attacks', query time: 0.11s Refine Results
  1. 1
  2. 2

    On the independence heuristic in the dual attack by Bashiri Kaveh, Wiemers Andreas

    Published 2025-07-01
    Subjects: “…dual attack…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    VLSI implementation of AES algorithm against differential power attack and differential fault attack by HAN Jun, ZENG Xiao-yang, ZHAO Jia

    Published 2010-01-01
    “…A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. …”
    Get full text
    Article
  10. 10

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article
  11. 11

    Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism by Shuhan Zhang, Kai Zhang, Zhijian Hu

    Published 2025-06-01
    “…The analytical results reveal that observer errors grow unbounded under DAs but converge to zero in attack-free scenarios, enabling effective attack identification. …”
    Get full text
    Article
  12. 12

    Attack Reconstruction and Attack-Resilient Consensus Control for Fuzzy Markovian Jump Multi-Agent Systems by Yunji Li, Yajun Wu, Yi Gao, Meng Wei, Ziyan Hua, Junjie Chen

    Published 2024-11-01
    “…Second, an adaptive fuzzy estimator is developed for the simultaneous reconstruction of states and attacks in MASs. The derived estimates are utilized to design an attack-resilient consensus control strategy that compensates for the effects of FDIAs on the closed-loop consensus error dynamics. …”
    Get full text
    Article
  13. 13
  14. 14

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…In video transmission, maintaining high visual quality under variable network conditions, including bandwidth and efficiency, is essential for optimal viewer experience. Channel errors or malicious attacks during transmission can cause degradation in video quality, affecting its secure transmission and putting its confidentiality and integrity at risk. …”
    Get full text
    Article
  15. 15

    Controlling user access with scripting to mitigate cyber-attacks by Owusu Nyarko-Boateng, Isaac Kofi Nti, Anastasia Akyamaa Mensah, Emmanuel Kojo Gyamfi

    Published 2024-12-01
    “…This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. …”
    Get full text
    Article
  16. 16

    Chosen-key extracting attack to random LSB steganography by CHEN Jia-yong1, ZHU Yue-fei1, ZHANG Wei-ming2, LIU Jiu-fen2

    Published 2010-01-01
    “…A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.…”
    Get full text
    Article
  17. 17

    Guaranteed False Data Injection Attack Without Physical Model by Chenhan Xiao, Napoleon Costilla-Enriquez, Yang Weng

    Published 2025-01-01
    “…The key innovation lies in the AE-GAN hybrid model’s ability to replicate the residual error distribution while maximizing attack efficacy, offering a performance guarantee that existing methods lack. …”
    Get full text
    Article
  18. 18

    Intercept-Resend Attack on SARG04 Protocol: An Extended Work by Ali H. Yousif, Omar S. Mustafa, Dana F. Abdulqadir, Farah S. Khoshaba

    Published 2020-06-01
    “…In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is investigated by bounding the information of an eavesdropper; then, the attack has been analyzed. …”
    Get full text
    Article
  19. 19
  20. 20