Search Results - (( java implementation cell algorithm ) OR ( attack reduction function algorithm ))
Search alternatives:
- java implementation »
- implementation cell »
- reduction function »
- function algorithm »
- attack reduction »
- cell algorithm »
-
1
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017“…Several studies have shown a theoretical attack exploiting the AES key expansion algorithm which allows significant reduction in the complexity time to break the cipher, compared to the brute force attack. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
3
-
4
A hybrid cryptosystem for biometric authentication and template protection
Published 2017“…Stolen and compromised biometric information can be used to carry out replay, template reconstruction attacks, and other unscrupulous activities such as function creep, profiling, template sharing, and data matching, resulting in catastrophic incidents of security attack, privacy violation and loss of identity, as well as a significant loss of users' confidence in the authentication system. …”
Get full text
Get full text
Thesis -
5
Machine learning-based anomaly detection in NFV: a comprehensive survey
Published 2023“…Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. …”
Get full text
Get full text
Get full text
Get full text
Article
