Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,394,666 papers from all fields of science
Search
Sign In
Create Free Account
Attack model
Known as:
Attack type
In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Adaptive chosen-ciphertext attack
Chosen-ciphertext attack
Cipher
Ciphertext
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis
N. Hoque
,
D. Bhattacharyya
,
J. Kalita
International Conference on Communication Systems…
2016
Corpus ID: 8078302
Distributed Denial of Service (DDoS) attack is a major security threat for networks and Internet services. The complexity and…
Expand
2016
2016
A dual fragile watermarking scheme for speech authentication
Qing Qian
,
Hong-Xia Wang
,
Y. Hu
,
Lin-Na Zhou
,
Jin-Feng Li
Multimedia tools and applications
2016
Corpus ID: 5831834
In order to achieve the integrity authentication of speech files, a hash-based dual fragile watermarking algorithm is proposed…
Expand
2015
2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
S. H. Islam
,
Abhishek Singh
Wireless personal communications
2015
Corpus ID: 20967382
A novel one-round authenticated group key agreement (CL-AGKA) protocol is devised in this paper on certificateless public key…
Expand
2014
2014
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT
S. Ahmadi
,
Z. Ahmadian
,
J. Mohajeri
,
M. Aref
IEEE Transactions on Information Forensics and…
2014
Corpus ID: 6336569
In this paper, we present a framework for biclique cryptanalysis of block ciphers which extremely requires a low amount of data…
Expand
2013
2013
Real-time intrusion detection with fuzzy genetic algorithm
P. Jongsuebsuk
,
N. Wattanapongsakorn
,
C. Charnsripinyo
International Conference on Electrical…
2013
Corpus ID: 17276652
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule…
Expand
2012
2012
Genetic Algorithm Approach to Intrusion Detection System
K. Anand
,
B. Narsimha
,
S. Swaraj
,
T. Bharat
2012
Corpus ID: 6830133
This rapid growth of computer networks for the past decade, security has become a very important issue for computer systems. The…
Expand
2011
2011
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
K. Rahman
,
K. Balagani
,
V. Phoha
CVPR WORKSHOPS
2011
Corpus ID: 206597454
Previous efforts in continuous cyber-behavioral verification have considered only zero-effort impostor attacks. Taking continuous…
Expand
Highly Cited
2010
Highly Cited
2010
A scalable, efficient and informative approach for anomaly‐based intrusion detection systems: theory and practice
Osman Salem
,
Sandrine Vaton
,
A. Gravey
International Journal of Network Management
2010
Corpus ID: 18420297
In this paper, we present the design and implementation of a new approach for anomaly detection and classification over high…
Expand
2009
2009
The affect of fuzzification on neural networks intrusion detection system
Khattab M. Ali
,
V. Samawi
,
M. S. Al Rababaa
IEEE Conference on Industrial Electronics and…
2009
Corpus ID: 14571744
Intrusion detection (ID) is an interesting approach that could be used to improve the security of network systems. IDS detects…
Expand
2006
2006
Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps
L. DeLooze
The IEEE International Joint Conference on…
2006
Corpus ID: 10380737
Self-organized maps (SOM) use an unsupervised learning technique to independently organize a set of input patterns into various…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE