Showing 121 - 140 results of 6,717 for search '(((ceers OR sheers) OR (cheer OR ((trackers OR attackers) OR checks))) OR peer)', query time: 0.18s Refine Results
  1. 121

    Analysis and identification of distributed denial of service attacks using intra-domain messaging schemes by Budiyanto, Setiyo, Silalahi, Lukman Medriavin, Simanjuntak, Imelda Uli Vistalina, Rochendi, Agus Dendi, Andryana, Septi, Hamid, Abdul, Mubarak, Mochamad Ikhsan

    Published 2024
    “…This research discusses security systems against Distributed Denial-of-Service (DDoS) attacks. The focus of domestic co-operation research is the resolution and identification of DDoS attacks using the Intra-Domain Messaging (I-DM) method. …”
    Get full text
    Conference or Workshop Item
  2. 122

    Attacks in Reality: The Limits of Concurrent Error Detection Codes against Laser Fault Injection by Breier, Jakub, He, Wei, Jap, Dirmanto, Bhasin, Shivam, Chattopadhyay, Anupam

    Published 2018
    “…As a prominent attack approach against the security modules of integrated circuits, fault injection attacks (FIA) are able to breach thecryptographic primitives by analyzing the intentionally induced computation errors by adversaries. …”
    Get full text
    Get full text
    Journal Article
  3. 123

    Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks by Zhang, Zhengyan, Xiao, Guangxuan, Li, Yongwei, Lv, Tian, Qi, Fanchao, Liu, Zhiyuan, Wang, Yasheng, Jiang, Xin, Sun, Maosong

    Published 2024
    “…Attackers can restrict the output representations (the values of output neurons) of trigger-embedded samples to arbitrary predefined values through additional training, namely neuron-level backdoor attack (NeuBA). …”
    Get full text
    Article
  4. 124

    Generation, Detection, and Evaluation of Role-play based Jailbreak attacks in Large Language Models by Johnson, Zachary D.

    Published 2024
    “…Companies such as OpenAI employ manual tactics like red-teaming in order to enhance a LLM’s robustness against these attacks, however these tactics may fail to defend against all role-play based jailbreak attacks due to their potentially limited ability to predict unseen attacks. …”
    Get full text
    Thesis
  5. 125

    Stealthy and robust glitch injection attack on deep learning accelerator for target with variational viewpoint by Liu, Wenye, Chang, Chip-Hong, Zhang, Fan

    Published 2021
    “…In this paper, we propose a new glitch injection attack on DNN accelerator that is capable of misclassifying a target under variational viewpoints. …”
    Get full text
    Journal Article
  6. 126

    DAPA : Differential Analysis Aided Power Attack on (non-) linear feedback shift registers by Sim, Siang Meng, Jap, Dirmanto, Bhasin, Shivam

    Published 2021
    “…In this work, we generalise their methodology and combine with differential analysis, we called it differential analysis aided power attack (DAPA), to uncover more bit relations and take into account the linear or non-linear functions that feedback to the shift registers (i.e. …”
    Get full text
    Journal Article
  7. 127

    Distributed control for voltage and current sharing islanded DC microgrids under cyber attacks by Lim, Hui Jing

    Published 2021
    “…As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure the security of MGs under these attacks, suitable control method must be designed to enhance the security of MG. …”
    Get full text
    Final Year Project (FYP)
  8. 128

    Cyber attacks and their impacts on the shipping industry : identify the risks and suggest ways to mitigate (port) by Ye, Xin

    Published 2021
    “…Besides the benefits of being more digitalized and connected, this transformation has also created a new ecosystem where cyber-attack poses as the top risk in port that result in catastrophic consequences. …”
    Get full text
    Final Year Project (FYP)
  9. 129

    Universal adversarial network attacks on traffic light recognition of Apollo autonomous driving system by Chia, Yi You

    Published 2022
    “…A black-box Universal Adversarial Network (UAN) is first trained to create a universal perturbation, which will be used to attack the machine learning model that recognises traffic light signals. …”
    Get full text
    Final Year Project (FYP)
  10. 130

    Secure cooperative event-triggered control of linear multiagent systems under DoS attacks by Feng, Zhi, Hu, Guoqiang

    Published 2022
    “…This paper studies secure cooperative event-triggered control of linear multiagent systems under denial-of-service (DoS) attacks. The DoS attacks refer to interruptions of communication channels carried out by an intelligent adversary. …”
    Get full text
    Journal Article
  11. 131

    Security protocol design against malicious attacks in neighborhood area network in smart grid by Li, Xiaochen

    Published 2016
    “…However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. …”
    Get full text
    Thesis
  12. 132

    SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers by Breier, Jakub, Jap, Dirmanto, Bhasin, Shivam

    Published 2018
    “…SCADPA is a chosen-plaintext attack, knowledge of the ciphertext is not required. …”
    Get full text
    Get full text
    Conference Paper
  13. 133

    Assault and battery: evaluating the security of power conversion systems against electromagnetic injection attacks by Szakály, M, Kohler, S, Strohmeier, M, Martinovic, I

    Published 2024
    “…We develop a novel multifrequency IEMI attack technique to effectively target devices with multiple sensors. …”
    Conference item
  14. 134

    When mobile phone use becomes problematic : the influence of self, parents and peers on adolescents' mobile phone behavior in Singapore and Malaysia by Chuah, Soo Fei

    Published 2018
    “…The second and third parts of this dissertation investigate the effects of adolescents’ personalities (such as self-esteem, extraversion, neuroticism, and self-control), parental influence (such as parental mobile phone use, parenting styles, and parental mediation), and peer influence (such as peer mediation, peer norms, and peer capital) on both mobile phone use and problematic mobile phone use among adolescents in Singapore and Malaysia. …”
    Get full text
    Thesis
  15. 135
  16. 136
  17. 137

    Isolation forest-based mechanism to defend against interest flooding attacks in named data networking by Huang, Chaoran

    Published 2020
    “…Interest flooding attacks (named as IFA) have been known as one of the most harmful security attacks in named data network (NDN), information-centric network and content-centric network. …”
    Get full text
    Thesis-Master by Coursework
  18. 138

    Cyber attacks and their impacts on the shipping industry. Identify the risks and suggest ways to mitigate. (maritime services) by Poh, Sze Ping

    Published 2021
    “…Hence, this paper aims to increase the maritime services sector’s awareness on cyber-attacks through the discussion of the potential impacts from the commonly used technologically – enabled solutions. …”
    Get full text
    Final Year Project (FYP)
  19. 139

    Development of a platform to educate, detect and mitigate a cyber security social engineering attack by Lin, Xin Jie

    Published 2022
    “…In recent years, social engineering attack (SEA) has been prevailing and more people fall victims to such scams. …”
    Get full text
    Final Year Project (FYP)
  20. 140

    How vulnerable is innovation-based remote state estimation: fundamental limits under linear attacks by Liu, Hanxiao, Ni, Yuqing, Xie, Lihua, Johansson, Karl Henrik

    Published 2022
    “…We also provide an explicit attack strategy that achieves this bound and compare this attack strategy with strategies previously proposed in the literature. …”
    Get full text
    Journal Article