Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "attacks" wg kryterium: Temat


Tytuł:
A Study on Denial of Service Attacks in Cluster Based Web Servers
Autorzy:
Poornima, A.
Maheshwari, D.
Powiązania:
https://bibliotekanauki.pl/articles/1193575.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DoS attacks
Flooding
Protocol
Opis:
In today’s computing world Network Security became vulnerable. As many types of attacks makes the system unsecure and reduces the performance of servers. One such attack is - Denial of Service (DoS) attacks. The drawbacks of this attacks end user application accessibility will be diminishing and the request handling capacity of the application server will drastically subsides.
Źródło:
World Scientific News; 2016, 41; 222-229
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an algorithm for detecting attacks in sensor wireless systems
Autorzy:
Belej, Olexander
Bokla, Natalia
Więckowski, Tadeusz
Powiązania:
https://bibliotekanauki.pl/chapters/32083874.pdf
Data publikacji:
2021
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
wireless networks
attacks
attack detection system
Opis:
Wireless networks have gained immense popularity. Their widespread distribution is due to undeniable advantages over traditional cable networks: ease of deployment, user mobility in the network coverage area, easy connection of new users. On the other hand, the security of such networks often limits their application. If an attacker needs to have a physical connection to the network when attacking a wired network, then in the case of wireless networks, he can be anywhere in the network coverage area. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed below. On the other hand, the low level of security of such networks often limits their application. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed.
Źródło:
Methods and tools in CAD – selected issues; 51-62
9788366391871
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards an Evaluation Model of Trust and Reputation Management Systems
Autorzy:
Janiszewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/226314.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
trust
reputation
attacks
trust and reputation management system
TRM
attacks on trust and reputation management systems
Opis:
The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 4; 411-416
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks
Autorzy:
Gharib, H
Belloulata, K
Powiązania:
https://bibliotekanauki.pl/articles/103196.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
authentication
attacks
Kerberos
MANET
threshold cryptography
Opis:
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 12-18
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Counter Terrorist Solutions in the Polish Police versus Contemporary Forms and Methods of Terrorist Organizations Activities
Autorzy:
Liedel, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2055861.pdf
Data publikacji:
2018-12-21
Wydawca:
Collegium Civitas
Tematy:
police
combating terrorism
counterterrorist sub-units
anti-terrorism system
terrorist attacks
forms and methods of attacks
Opis:
The security environment in the 21st century is dynamic. The tools that the state uses to ensure its own security, its and citizens’ interests must be adapted to the current challenges. Preparation of counter-terroristic sub-units of the Police, both in terms of their organization, their place in the wider structure of security and public order services, as well as and legal basis for action, is one of the most important among these tools. The article is devoted to the analysis of the preparation of counterterrorism subunits of the Polish Police to the challenges posed by tactics used by terrorist organizations, posing a threat to national and international security.
Źródło:
Securitologia; 2018, 1 (27); 94-106
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges for Ukraine’s cyber security: National dimensions
Autorzy:
Katerynchuk, Pavlo
Powiązania:
https://bibliotekanauki.pl/articles/1041594.pdf
Data publikacji:
2019-12-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
cyberspace
cyber security
hacker attacks
information security
Opis:
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
Źródło:
Eastern Review; 2019, 8; 137-147
1427-9657
2451-2567
Pojawia się w:
Eastern Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Women of Palestine Fighting for Independence
Autorzy:
Deja, Elżbieta
Powiązania:
https://bibliotekanauki.pl/articles/2053964.pdf
Data publikacji:
2017
Wydawca:
Collegium Civitas
Tematy:
female bombers
IDF
suicide attacks
suicide bombers
Opis:
The article is going to present the main reasons for which Palestinian women decide to take part in suicide bombing. The brief characteristic of Palestinian female bombers will allow answering the following questions: What makes women to conduct suicide attacks? Is this a kind of fight for emancipation or gender equality? To what extend participating in a terrorist attack is a sovereign decision of a woman and to what extent are they used as a new type of weapon and treated just like a tool?
Artykuł ma na celu przedstawienie powodów, dla których kobiety palestyńskie decydują się na udział w bombowych atakach samobójczych. Krótka charakterystyka palestyńskich kobiet-bomb pozwoli odpowiedzieć na pytania: Co popycha kobiety do przeprowadzenia ataków terrorystycznych? Czy to swoista walka o emancypację lub równość płci? Na ile udział w zamachu jest suwerenną decyzją samych kobiet, a na ile stanowią one nowy rodzaj broni i są traktowane instrumentalnie?
Źródło:
Securitologia; 2017, 1 (25); 109-118
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Overview of round one power attacks on SHA-3 Based MAC
Autorzy:
Millar, Kevin
Chu, Chun-Yi
Łukowiak, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/397819.pdf
Data publikacji:
2018
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
SHA-3
power attacks
FPGA
atak energetyczny
Opis:
Digital signatures and message authentication codes are the two most common applications of cryptographic hash functions. Others range from ensuring data integrity to randomization functions and key derivation. Because of there cent break of the SHA-1 hash function, it is expected that in the nearest future there will be an increasing interest in the new SHA-3 algorithm. SHA-3 implements a subset of the Keccak family and was released as the NIST standard in 2015.SHA-3 based MAC is a keyed-hash message authentication function, which can be used to verify both the data integrity of a message and its source. Though Keccak is cryptographically secure, implementations of the algorithm may be susceptible to power analysis attacks if not sufficiently protected. This work implements and analyzes two correlation power analysis (CPA)attacks targeting the round one operations of a SHA-3 based MAC implementation on an FPGA.
Źródło:
International Journal of Microelectronics and Computer Science; 2018, 9, 3; 114-122
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Autorzy:
Motupalli, Ravi Kanth
Prasad, Krishna K.
Powiązania:
https://bibliotekanauki.pl/articles/2086214.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
Hadoop network
data security
cyber attacks
Salsa20
Opis:
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 140--144
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Life-threatening laryngeal attacks in hereditary angioedema patients
Autorzy:
Piotrowicz-Wójcik, Katarzyna
Porebski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1397492.pdf
Data publikacji:
2020
Wydawca:
Index Copernicus International
Tematy:
C1 inhibitor
hereditary angioedema
icatibant
laryngeal attacks
Opis:
Background: Hereditary angioedema due to C1-inhibitor deficiency (HAE-C1INH) is a rare genetic disease that runs in the family. As a result of the disease, acute swellings of the subcutaneous tissue and mucous membranes of the digestive and respiratory systems, including the larynx, occur. Any attack of the disease involving the throat and larynx is particularly dangerous and requires knowledge of clinical determinants of the disease and its proper management.Materials and methods: The study included adult consecutive HAE-C1INH patients having follow-up visits in our centre. The group was examined with a structured clinical questionnaire, concerning the last 6 months and focusing particularly on laryngeal swelling attacks. Results: 55 subjects (F/M – 35/20, age range – 18–76) were included in the study. Laryngeal attacks occurred in 19 individuals (34.5%): 1–3, 4–6, and ≥7 attacks in 9, 8 and 2 patients, respectively, two of whom required intubation. In comparison to other patients, subjects with laryngeal attacks were characterised by significantly more frequent: (1) facial attacks, (2) severe disease activity, (3) the occurrence of female patients, (4) mental stress as a trigger of attacks. All patients with laryngeal attacks had a rescue medication at home and 15/19 (78%) patients could use it at home. Most of them used plasma-derived C1-inhibitor 17/19 (89.5%) and icatibant, 8/19 (42.1%). Discussion: HAE-C1INH patients with laryngeal attacks require particular attention. Proper training regarding the identifica-tion of these patients, adequate management, access to emergency services and emergency drugs are essential to ensure the safety of subjects with this localization of HAE-C1INH attacks
Źródło:
Polish Journal of Otolaryngology; 2020, 74, 2; 42-46
0030-6657
2300-8423
Pojawia się w:
Polish Journal of Otolaryngology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Performance and Efficiency of Hardware and Software Firewalls
Autorzy:
Konikiewicz, W.
Markowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/108760.pdf
Data publikacji:
2017
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
firewall
virtual firewall
network security
network performance
DoS attacks
Opis:
Firewalls are key elements of network security infrastructure. They should guarantee the proper level of security and, at the same time, the satisfying performance in order to not increase the packet delay in the network. In the paper, we present the comparative study on performance and security of a few firewall technologies including hardware, software and virtual solutions. Three important criteria are considered: the maximal throughput of firewall, the introduced delay and the ability to resist Denial of Service attacks. We report results of experiments, present analysis and formulate a few practical conclusions.
Źródło:
Journal of Applied Computer Science Methods; 2017, 9 No. 1; 49-63
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safeguarding critical infrastructures from cyber attacks : A case study for offshore natural gas Assets
Autorzy:
Hadjistassou, C.
Bratskas, R.
Koutras, N.
Kyriakides, A.
Charalambous, E.
Hadjiantonis, A. M.
Powiązania:
https://bibliotekanauki.pl/articles/2069216.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
cyber attacks
energy
natural gas
gas hydrates
Opis:
The majority of operations, as well as the physical and chemical processes, which take place on offshore Natural Gas installations are controlled by computer systems. These computer systems are vulnerable to cyber-attacks. If successful, such attacks can have disastrous and far-reaching consequences, including human casualties, large-scale pollution, and immense financial cost. In this paper we identify one possible way that an attacker can inflict material damage, by altering the parameters of the gas hydrate inhibition system. The formation of gas hydrates can completely halt operations for a prolonged period of time, could damage equipment, and directly endanger human lives. To raise the level of protection we propose the implementation of two lines of defense the second based on machine learning algorithms. Appreciating the sophistication of attacks, the inherent risks and complexity of multi-billion offshore energy assets we highlight the need for further research intended to address safety loopholes.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 1; 115--124
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Journalists under attack: self-censorship as an unperceived method for avoiding hostility
Autorzy:
Himma-Kadakas, Marju
Ivask, Signe
Powiązania:
https://bibliotekanauki.pl/articles/2176110.pdf
Data publikacji:
2023-02-24
Wydawca:
Polskie Towarzystwo Komunikacji Społecznej
Tematy:
self-censorship
journalistic role performance
journalism
attacks on journalism
Opis:
This study investigates journalists’ self-censorship and introduces a phenomenon of unperceived collective self-censorship that demands a combination of detection methods. We conducted a content analysis of media critique texts (N=156) that discuss attacks on Estonian journalism. These results were combined with the content analysis of journalistic roles in the news (N=2409) and a survey on journalists (N=99) and completed with semi-structured interviews (N=14). The findings showed that accusations against journalists were frequently related to discourses regarding journalists’ interventionist or watchdog roles. Juxtaposing these results with quantitative data, it became evident that when aspects of interventionist and watchdog roles were criticized in the media texts, the performance of these roles decreased in the news. However, journalists’ self-assessment does not show the perception of this change. We argue that self-censorship was created unknowingly within the newsroom. External pressures – such as politically motivated attacks on journalism – may promote unperceived self-censorship.
Źródło:
Central European Journal of Communication; 2022, 15, 3(32); 359-378
1899-5101
Pojawia się w:
Central European Journal of Communication
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
MoveSteg : A Method of Network Steganography Detection
Autorzy:
Szczypiorski, K.
Tyl, T.
Powiązania:
https://bibliotekanauki.pl/articles/226603.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
information
hiding network
detection of new attacks
Opis:
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream in network that is under our management.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 4; 335-341
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies