搜索结果: 1-15 共查到“工学 Attack”相关记录15条 . 查询时间(0.182 秒)
A Key Recovery Attack on Streamlined NTRU Prime
NTRU Prime key encapsulation mechanism IND-CCA security
2018/11/5
For years, researchers have been engaged in finding new cryptography schemes with high security and efficiency that can resist against the attacking from quantum computers. Lattice-based cryptography ...
Under Cyber Attack:UH Researchers Look at How to Catch a ‘Phisher’(图)
Under Cyber Attack UH Researchers Phisher
2017/7/20
As cybersecurity experts scramble to stop another wave of ransomware and malware scams that have infected computers around the world, computer science experts at the University of Houston are “phishin...
Attack Resistant Trust Metrics for Public Key Certification
Attack Resistant Trust Metrics Public Key Certification
2016/5/24
This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the effectiveness of trust metrics in resisting att...
Bounds on Service Quality for Networks Subject to Augmentation and Attack
Network Vulnerability Attack
2014/12/18
Assessing a network's vulnerability to attack and random failure is a difficult and important problem that changes with network application and representation. We furnish algorithms that bound the rob...
Attack vulnerability of self-organizing networks
Self-organizing networks Power grids Cascading failures Vulnerability
2012/4/14
There are several self-organizing networks in the real world, and these networks severely affect the development of the modern society. This paper investigates the vulnerability of self-organizing net...
Land Attack Standard Missile.
一篇拨动美国人“神经”的学术论文—— 大连理工大学博士生王建伟谈他的《Cascade-based attack vulnerability on the US power grid》(图)
大连理工大学 王建伟 US power grid
2010/3/30
大连理工大学管理学院系统工程研究所博士研究生王建伟,最近因为一篇刊载于SCI检索国际学术期刊《Safety Science》上的论文——《Cascade-based attack vulnerability on the US power grid》,成为包括美国《纽约时报》等各大媒体竟相追逐的“新闻人物”。
Information Warfare: using the viable system model as a framework to attack organisations
Information Warfare viable system model framework attack organisations
2009/12/8
Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to t...
Cycle Attack-Free Logical Topology Design in Optical Code Path Networks
Cycle Attack-Free Logical Topology Design Optical Code Path Networks
2015/7/15
A tree-based logical topology design approach is proposed to resolves the unintended cycle attack problem in optical code path networks, demonstrating 50% of reduction in connection setup delay in lar...
Evacuation Assessment of a Large Passenger Vessel due to Tsunami Attack
Evacuation Assessment Large Passenger Vessel Tsunami Attack
2009/4/21
Disaster mitigation management is considered a very important aspect in marine catastrophes,such as a tsunami,especially because drifting ships containing passengers and hazardous substances can cause...
Passengers Evacuation Simulation in a Cruise Ship due to Tsunami Attack as Port Safety Management Consideration
Cruise Ship Tsunami Attack Port Safety Management
2009/4/1
Tsunami is not only causing the raise of free sea surface but also strong horizontal water movement in a bay. Thus, an appropriate countermeasure is required for a passenger ship because the ship may ...
It is concerned about the occurrence of huge earthquake on Nankai Trugh off the coast of Shikoku such as Tokai, Tou-Nankai and Nankai earthquake. Tsunami attack by the earthquake will generate not onl...
This work shows that the cryptanalysis of the shrinking generator requires fewer intercepted bits than that indicated by the linear complexity. Indeed, whereas the linear complexity of shrunken sequen...
Treated and Terminated: Sulphuric Acid Attack
Treated and Terminated Sulphuric Acid Attack
2010/8/11
Mineral coatings protect waste-water treatment plants from the destruction of biogenous sulphuric acid corrosion ”The stench is unbearable!”. As residential areas are built up and populated more and m...
MINING INFORMATION OF ATTACK-DEFENSE STATUS FROM SOCCER VIDEO BASED ON SCENE ANALYSIS
MINING INFORMATION ATTACK-DEFENSE STATUS SOCCER VIDEO SCENE ANALYSIS
2010/12/17
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection,
structure analysis and event det...