搜索资源列表
sensors-09-03958
- We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
shanote
- Collision Search Attacks on SHA1 Xiaoyun Wang∗ Yiqun Lisa Yin† Hongbo Yu‡ February 13, 2005-Collision Search Attacks on SHA1 Xiaoyun Wang∗ Yiqun Lisa Yin† Hongbo Yu‡ February 13, 2005
For-WSN-localization-algorithm
- 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
v46-112
- The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage
dos
- 关于DOS攻击早年写的一些文章,给各位做无线DOS攻击一个可行的参考。-DOS attack early years to write some articles for you to do wireless DOS attacks is a viable reference.
watermarking-pdf
- Abstract—A novel image watermarking algorithm against geometric attacks is proposed to solve watermarking synchronization problems. In watermark embedding, firstly, watermark is embedded into host image by a Single Value Decomposition (SVD) m
WSNSecurity
- this document describes the attacks on wsn
Detection-of-Syn-Flooding-Attacks-using-Linear-Pr
- This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
Prediction-of-past-unsolved-terrorist-attacks
- In this study, a novel model is proposed to predict perpetuators of some terrorist events which are remain unsolved. The CPM learns from similarities between terrorist attacks and their crime attributes then puts them in appropriate clusters.
Enhancing-Cloud-Storage-Security
- 本文介绍了加强云存储安全性对Roll-back攻击的fangfa-Enhancing Cloud Storage Security against Roll-back Attacks
Handling-Various-Attacks---Article-(1)
- Handling various attacks in watermarking-Handling various attacks in watermarking...
MITIGATION-OF-BYZANTINE-ATTACKS-USING-COHEN-KAPPA
- MITIGATION OF BYZANTINE ATTACKS USING COHEN KAPPA ALGORITHM
ajassp.2014.969.977
- Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to lar