Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Attack model

Known as: Attack type 
In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
In recent years, deep neural network approaches have been widely adopted for machine learning tasks, including classification… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2017
Highly Cited
2017
We quantitatively investigate how machine learning models leak information about the individual data records on which they were… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
An attacker model is proposed for Cyber Physical Systems (CPS). The attack models derived from the attacker model are used to… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
It has been shown in recent years that effective profile injection or shilling attacks can be mounted on standard recommendation… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and… Expand
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Publicly accessible adaptive systems such as collaborative recommender systems present a security problem. Attackers, who cannot… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Eichengreen, Barry; Rose, Andrew K.; Wyplosz, Charles; Dumas, Bernard ; Webero, Axel.October, 1995.Exchange market mayhem… Expand
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?