„attack complexity“
Suchergebnisse
57 Treffer
-
CPAmap: on the complexity of secure FPGA virtualization, multi-tenancy, and physical design
-
Causative label flip attack detection with data complexity measures
-
Low-complexity hypersonic flight control with asymmetric angle of attack constraint
-
Multiple linear cryptanalysis using linear statistics
-
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
-
Non-Asymptotic Lower Bounds for the Data Complexity of Statistical Attacks on Symmetric Cryptosystems
-
Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical systems
-
Secure design for cloud control system against distributed denial of service attack
-
Lower bounds for the signature size of incremental schemes
-
Nodal vulnerability to targeted attacks in power grids
-
Accurate estimate of the advantage of impossible differential attacks
-
Algorithms for sensor systems – revised selected papers
-
Advances in cryptology
-
Advances in cryptology
-
Verification of the Shear-Stress Transfer Model and its Modifications in the Calculation of a Turbulent Flow Around a Semicircular Airfoil with a Zero Angle of Attack
-
Improved Generic Attacks Against Hash-Based MACs and HAIFA
-
Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming