Attack model

Known as: Attack type 
In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1968-2018
020406019682018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2013
2013
In recent years, PUF-based schemes have not only been suggested for the basic security tasks of tamper sensitive key storage or… (More)
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks… (More)
  • figure 1
  • figure 2
  • table I
  • figure 5
  • figure 3
Is this relevant?
2013
2013
This paper investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Future power networks will be characterized by safe and reliable functionality against physical and cyber attacks. This paper… (More)
  • figure 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
Color Petri Net (CPN) based attack modeling approach is addressed. CPN based attack model is flexible enough to model Internet… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The 1998 DARPA intrusion detection evaluation created the first standard corpus for evaluating computer intrusion detection… (More)
  • figure 2-1
  • figure 3-1
  • figure 4-1
  • figure 4-2
  • figure 4-3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Mobile agents and other mobile code entities extend the potential of (stationary) distributed systems by the possibility of… (More)
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Abstract This paper uses graphical techniques and multinomial logit analysis to evaluate the causes and consequences of episodes… (More)
  • table I
  • table II
  • figure 1
  • figure 2
  • figure 3
Is this relevant?