Skip to search formSkip to main contentSkip to account menu

Attack model

Known as: Attack type 
In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Distributed Denial of Service (DDoS) attack is a major security threat for networks and Internet services. The complexity and… 
2016
2016
In order to achieve the integrity authentication of speech files, a hash-based dual fragile watermarking algorithm is proposed… 
2015
2015
A novel one-round authenticated group key agreement (CL-AGKA) protocol is devised in this paper on certificateless public key… 
2014
2014
In this paper, we present a framework for biclique cryptanalysis of block ciphers which extremely requires a low amount of data… 
2013
2013
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule… 
2012
2012
This rapid growth of computer networks for the past decade, security has become a very important issue for computer systems. The… 
2011
2011
Previous efforts in continuous cyber-behavioral verification have considered only zero-effort impostor attacks. Taking continuous… 
Highly Cited
2010
Highly Cited
2010
In this paper, we present the design and implementation of a new approach for anomaly detection and classification over high… 
2009
2009
Intrusion detection (ID) is an interesting approach that could be used to improve the security of network systems. IDS detects… 
2006
2006
  • L. DeLooze
  • 2006
  • Corpus ID: 10380737
Self-organized maps (SOM) use an unsupervised learning technique to independently organize a set of input patterns into various…