We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,450 results
  1. From Passive Defense to Proactive Defence: Strategies and Technologies

    The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures,...
    Chong Shi, Jiahao Peng, ... **aojun Ren in Artificial Intelligence Security and Privacy
    Conference paper 2024
  2. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile

    In recent years, Censorship and anti-censorship technology is develo** rapidly. The censorship and surveillance systems track traffic on the...

    Shaoyong Li, Xueshu Hong, Yao Feng in Cluster Computing
    Article 25 July 2023
  3. Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes

    While storing documents on the cloud can be attractive, the question remains whether cloud providers can be trusted with storing private documents....
    Marco Dijkslag, Marc Damie, ... Andreas Peter in Applied Cryptography and Network Security
    Conference paper 2022
  4. Sha** Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework

    Recent cyberattacks highlight the limitations of perimeter-based defenses and the need for a multi-layered approach to cybersecurity. Modern...
    Jennifer A. B. McKneely, Tara K. Sell, ... Daniel Thomas in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2022
  5. URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system

    RFID (Radio Frequency Identification) is a crucial application technology in the Internet of Things (IoT) technology. The IoT terminal device needs...

    Ming Gao, YuBin Lu in The Journal of Supercomputing
    Article 01 February 2022
  6. ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes

    Zigbee is an energy-efficient wireless IoT protocol that is increasingly being deployed in smart home settings. In this work, we analyze the privacy...
    Narmeen Shafqat, Daniel J. Dubois, ... Aanjhan Ranganathan in Applied Cryptography and Network Security
    Conference paper 2022
  7. Mutual authentication protocol for low cost passive tag in RFID system

    Internet of things (IoT) contains a massive number of “things” that are connected to the internet and communicates without human interaction. In...

    Atul Kumar, Ankit Kumar Jain in International Journal of Information Technology
    Article 06 March 2021
  8. Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition

    In this paper, we present two ambiguity attacks on a watermarking algorithm based on discrete wavelet transform (DWT) and singular value...

    Amar El Maadi, Khaled Loukhaoukha, ... Noureddine Mehallegue in Multimedia Tools and Applications
    Article 03 April 2024
  9. High-Performance Estimation of Jamming Covariance Matrix for IRS-Aided Directional Modulation Network with a Malicious Attacker

    In this chapter, we investigate the anti-jamming problem of a DM system with the aid of IRS. As an efficient tool to combat malicious jamming,...
    Chapter 2023
  10. Early Detection of Spam Domains with Passive DNS and SPF

    Spam domains are sources of unsolicited mails and one of the primary vehicles for fraud and malicious activities such as phishing campaigns or...
    Simon Fernandez, Maciej Korczyński, Andrzej Duda in Passive and Active Measurement
    Conference paper 2022
  11. Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training

    Federated learning is an emerging paradigm that enables multiple organizations to jointly train a model without revealing their private data. As an...

    Yilei Wang, Qingzhe Lv, ... Tao Li in World Wide Web
    Article 08 May 2023
  12. Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning

    Vertical federated learning (VFL) is an emerging paradigm that enables multiple companies to collaboratively train a global model without disclosing...
    Hongbin Chen, Chaohao Fu, Na Ruan in Applied Cryptography and Network Security
    Conference paper 2023
  13. C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks

    Supply chain attacks are potent cyber attacks for widespread ramifications by compromising supply chains. Supply chain attacks are difficult to...

    Raja Zeeshan Haider, Baber Aslam, ... Zafar Iqbal in International Journal of Information Security
    Article 29 April 2024
  14. Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC

    This paper presents an analysis on the state of the art of several proposals for algorithmic countermeasures to prevent passive side-channel attacks...

    Rodrigo Abarzúa, Claudio Valencia, Julio López in Journal of Cryptographic Engineering
    Article 16 March 2021
  15. Time sensitive networking security: issues of precision time protocol and its implementation

    Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588,...

    Davide Berardi, Nils O. Tippenhauer, ... Franco Callegati in Cybersecurity
    Article Open access 11 April 2023
  16. Automated Attacker Synthesis for Distributed Protocols

    Distributed protocols should be robust to both benign malfunction (e.g. packet loss or delay) and attacks (e.g. message replay). In this paper we...
    Max von Hippel, Cole Vick, ... Cristina Nita-Rotaru in Computer Safety, Reliability, and Security
    Conference paper 2020
  17. Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism

    Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored...

    El Mehdi Kandoussi, Adam Houmairi, ... Mostafa Bellafkih in Cluster Computing
    Article 14 June 2024
  18. DLP: towards active defense against backdoor attacks with decoupled learning process

    Deep learning models are well known to be susceptible to backdoor attack, where the attacker only needs to provide a tampered dataset on which the...

    Zonghao Ying, Bin Wu in Cybersecurity
    Article Open access 01 May 2023
Did you find what you were looking for? Share feedback.