Search results for "attack"

showing 10 items of 221 documents

Security Implications of Using Third-Party Resources in the World Wide Web

2018

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…

World Wide WebScripting languageComputer scienceCross-site scriptingWeb pageMalwareAttack surfaceContent Security Policycomputer.software_genreSecurity policycomputerVulnerability (computing)2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

2023

Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]5GBIoV[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Zero-day attacksSécurité5G V2X IoV Sécurité Attaques Détection Apprentissage Fédéré[INFO] Computer Science [cs]Intrusion DetectionDétectionAttaquesSecurityV2XApprentissage FédéréFederated Learning5GConnected and Automated Vehicles[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Aprūpes aspekti pacientiem pēc cerebrālas transitoras išēmiskas lēkmes

2018

Cerebrāla transitora išēmiska lēkme (TIL) ir pēkšņa lokāla smadzeņu disfunkcijas epizode, kam ir vaskulārs ir pirmie trīs mēneši pēc pārciestas TIL. Neiroloģijas māsas pienākums pēc TIL ir veikt pacientu veselības stāvokļa novērtēšanu, aprūpes plānošanu un realizāciju, kā arī pacientu izglītošanu. Māsa nodrošina plānotu un nepārtrauktu aprūpi, atbilstoši katra pacienta vajadzībām. Balstoties un iepriekš minēto tēmas aktualitāti un pieredzi, bakalaura darbam tika izvēlēta tēma: „Aprūpes aspekti pacientiem pēc cerebrālas transitoras išēmiskas lēkmes”. Bakalaura darbā pielietota kvalitatīvā pētniecības metode. Pētījuma mērķis bija noskaidrot svarīgākos aprūpes aspektus pacientiem pēc cerebrāla…

aspects of caretransient ischemic attacktransitora išēmiska lēkmeaprūpes aspektipsihoemocionālā aprūpeMedicīna
researchProduct

Nothing Left but the Core of Murmurs? : Attacks on Linking as Communication in Beckett’s The Unnamable

2022

Literary studies have usually interpreted Samuel Beckett’s The Unnamable (1959) to reflect an area void of meaning and inaccessible to representation. The present article, by contrast, argues that Beckett experientially communicates archaic psychic reality where certain contents develop in an interpersonal relationship. The article offers psychoanalytical close readings of a few key passages in the text, where the function that is integrated in the narrative voice and actively destroys connections manifests itself on different textual levels. Using the psychoanalyst Avner Bergstein’s interpretation of Wilfred Bion’s concept, “attacks on linking”, as a paradoxical form of communication, the …

attacks on linkingBion Wilfredpsykoanalyyttinen kirjallisuudentutkimusprojective identificationcommunicationpsykoanalyytikottulkintatransferencetransferenssiBeckett Samuelinterpretationviestintä
researchProduct

Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods

2022

Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that…

autoencodercyber physical systemsyväoppiminensupport vector machinefault tolerancetiedonlouhintakyberturvallisuusverkkohyökkäyksetsensor datacyber attacktietojärjestelmätInternational Conference on Cyber Warfare and Security
researchProduct

Tactical Analysis of the Winners' and Non-Winners' Performances in a Taekwondo University Championship

2014

The purpose of this study was to identify tactical characteristics of successful athletes who competed in a National University Championship. Results from the study allow taekwondo coaches and competitors to orient their training towards evidence-based practice to achieve success in competitions. Overall, taekwondo athletes performed more attacks than counterattacks. However, winners performed more counterattacks than non-winners. Moreover, winners performed more anticipatory counterattacks (ANC) and less indirect attacks (INA) than non-winners. Lastly, the order of the performance of the actions for non-winners was by decreasing frequency direct attack (DIA), INA, posterior counterattack …

biologyAthletesDirect attackApplied psychologyChampionshipbiology.organism_classificationPsychologyCounterattackSocial Sciences (miscellaneous)International Journal of Sports Science & Coaching
researchProduct

The Complement System: Activation and Control

1985

One of the hallmarks of immunology has been analysis and characterization of the C system in biological fluids. It is composed of 11 proteins of the “classical” pathway:1 C1q, C1r, C1s, C4, C2, C3, C5, C6, C7, C8, and C9. There are three proteins of the “alternative” pathway (IUIS-WHO Nomenclature Committee 1981) B, D, and P. Finally, there are four control proteins: C1 inhibitor (Cl¯ INH) and C4b binding protein (C4b-bp) for the classical pathway, I (C3b inactivator or C3b INA) and H (β1 or C3b INA accelerator) for the alternative pathway, and anaphylatoxin inactivator. Due to the dramatic advances in protein chemistry, these 19 distinct serum proteins have been highly purified and charact…

biologyC4b-binding proteinChemistrychemical and pharmacologic phenomenaBlood proteinsComplement systemC1-inhibitorClassical complement pathwayBiochemistryImmunologybiology.proteinAlternative complement pathwayLysine carboxypeptidaseComplement membrane attack complex
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct