„attack complexity“
Suchergebnisse
57 Treffer
-
On the Complexity of Attacking Elliptic Curve Based Authentication Chips
-
Imperceptible black-box waveform-level adversarial attack towards automatic speaker recognition
-
Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem
-
Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty
-
Empirical framework for identification of the most harmful malicious attacks on a smart grid
-
Effective strategies for targeted attacks to the network of Cosa Nostra affiliates
-
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
-
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
-
Adaptive output regulation for cyber-physical systems under time-delay attacks
-
Detection of stealthy single-source SSH password guessing attacks
-
Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks
-
Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker
-
Angle of attack prediction using recurrent neural networks in flight conditions with faulty sensors in the case of F-16 fighter jet
-
Modularity affects the robustness of scale-free model and real-world social networks under betweenness and degree-based node attack
-
A robust intelligent zero-day cyber-attack detection technique
-
Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge
-
Resilient sampled-data control of networked control systems against cyber attacks
-
Robustness of correlated networks against propagating attacks
-
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding : Towards Secure and Efficient Fresh Re-Keying
-
Identification and eradication of attacker node in a mobile ad-hoc network environment using prediction model on delay factor