Attack相关论文
Due to the limitations of energy,computation and storage for sensors etc,although the wireless sensor networks (WSNs) ha......
【Abstract】As the researches on offensive words focus more attention on people in the symmetric power context and ignor......
Since the Modbus RTU wired communication protocol of Siemens variable frequency motors is unstable and lacks a protectio......
Deep learning can train models from a dataset to solve tasks. Although deep learning has attracted much interest owing t......
Ransomware attacks have been spreading broadly in the last few years,where attackers deny users’access to their systems......
近日,SIXSIXONE公司向市场推出专为自行车车手设计的全新Attack系列自行车运动鞋。据悉,与原先堪称“顶级”的Flight系列运动鞋相......
Digital signature, as an important crypto-graphic primitive, has been widely used in many ap-plication scenarios, such a......
子宫内膜异位症(Endometriosis,EM)病因机制复杂,不同部位的EM其发病机制可能不同,细胞的黏附、侵袭,新生血管形成是被大部分学者......
This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure c......
In recent years, the Inteet has enabled access to widespread remote services in the distributed computing envi-ronment; ......
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret shar......
前缘钝化尺度是高超声速进气道设计中的关键参数。针对一种前体锥加弯曲压缩面的高超声速轴对称进气道,选取最大尺度为3.2mm(5%唇......
目的 探讨原发性闭角型青光眼急性发作不同时期行前房穿刺术的效果.方法 回顾性分析闭角型青光眼首次急性发作期60例(60眼)按手术......
In this paper, for physical-layer se-curity (PLS), a novel scheme of polar coding encryption is introduced in the wireta......
Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator
Recently,online rating systems are gaining popularity.Dealing with unfair ratings in such systems has been recognized as......
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity ......
Model-based quantitative techniques are not commonly used for web service behaviors security evaluation, which have typi......
IEEE802.11s是IEEE关于无线Mesh网络的规范。802.11s虽然沿用了IEEE802.11i的安全规范,但是对于路由协议的安全并没有做过多的定义......
Pickle漏洞是由于没有安全使用Python模块Pickle漏洞而产生的。由于Python语言的跨平台性,shellcode制作的简易性,使得漏洞的危害......
入侵检测系统可以检测到攻击,但不能预测攻击者下一步的攻击。本文分析了基于攻击为预测方法的不足,提出了一种基于网络弱点的攻击......
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
Newly developed Al2O3-Si3N4 composite refracto-ries used for blast furnace is introduced in this work.Al2O3-Si3N4 compos......
To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party pa......
This paper presents an algebraic method to attack the projected C*- cryptographic scheme. The attack applies the affine ......
赛博空间攻击关键技术是实施赛博行动和形成赛博威胁的重要因素和基础。按照网络电磁技术的组成和层次结构关系,解析了赛博空间攻击......
In this paper,denial of service(DoS)attack management for destroying the collaborative estimation in sensor networks and......
Multi-agent systems(MASs)are typically composed of multiple smart entities with independent sensing,communication,comput......
A side-channel attack(SCA)-resistant AES S-box implementation is proposed,which is an improvement from the power-aware h......
随着计算机网络技术及相应的网络应用的快速发展,计算机网络已渗透到人们生活的方方面面。计算机网络在极大地便利和丰富人们的日......
In Senegal, millet (<i><span style="font-family:Verdana;">Pennisetum</span></i><span style="font-family:Verdana;"> </spa......
先简述了WEB攻击的种类,然后着重从攻击者角度,分别从Web程序代码、文件目录权限、系统漏洞、web验证漏洞、CGI参数、SQL注入、跨站......
在以往战机空战攻击导引研究中,仅考虑如何导引载机使之与目标的相对距离达到武器发射射程,没有同时考虑拦截角度的需求;或只考虑......
IEEE802.11 CSMA/CA通过退避过程中随机选择的时隙来均衡网络流量,而时隙由各个通信节点自主随机选择。提出了一种RTS—CTS攻击:攻击者......
文中从计算机病毒在现代战争中的地位和作用谈起,介绍了计算机病毒的概念、种类,详述了计算机病毒对C4I系统的攻击方式,建立了计算......
入侵检测是保护系统安全的重要途径。给出了入侵和入侵检测的概念,说明了入侵检测的必要性,介绍了多种入侵检测方法和数据监测技术......
为了建立更安全的匿名通信系统,需要对现有匿名通信系统中的攻击进行分类研究。首先介绍了网络攻击的分类技术,然后通过分析匿名通......
为了满足电子政务对于信息安全的需求,在文章中介绍了一次性口令技术对电子政务的身份认证方案,详细的对一次性口令技术的认证原理和......
移动Ad Hoc网络是一种特殊的移动网络。目前的入侵检测技术不再适用于这种新的环境。本文在分析Ad Hoc网络的特点和当前的入侵检测......
本文主要讨论TCP/IP协议内容,以及TCP/IP协议的安全问题和几种常见的网络攻击手段。...
保证网络安全是网络技术正常发展和网络的正常运行的重要研究方向,通过讨论TCP三次握手的缺陷和TCP SYN Flood攻击的基本原理,探讨......
定义了一种基于双枝模糊逻辑和模糊着色Petri网的网络攻击模型,从对攻击起促进和抑制作用这两方面对网络攻击进行综合考虑与分析,同......
蜜网作为一种主动的安全防御技术被引入到网络安全领域.它的价值在于引发被攻击事件和侵入事件的发生,以便获得更多的黑客攻击技术......
由于常规偶格法颤振分析忽略了对T型尾翼颤振特性有影响的平尾静升力、平尾攻角等因素,因此不能精确预估T型尾翼的颤振特性。采用......
FOX是最近推出的系列分组密码,它的设计思想基于可证安全的研究结果,且在各种平台上的性能优良.本文利用碰撞攻击和积分攻击相结合......
DNS(Domain Name System,域名系统)是互联网上最为关键的基础设施,其安全性举足轻重。DNS从一开始就被认为是一个完全开放的协作体......
The deterioration mechanism of thaumasite towards cement or concrete structure and the deterioration pattern of in-situ ......
目的探讨超声生物显微镜(ultrasound biomicroscopy,UBM)在原发性闭角型青光眼(primary angle-closure glaucoma,PACG)急性发作手术治......