Filters








5,452 Hits in 6.1 sec

Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge [article]

Jianhua Li, Ximeng Liu, Jiong JIn, Shui Yu
2021 arXiv   pre-print
We further propose a joint defense framework to defeat attackers by incurring a significant increment of required bots and enlarging attack expenses.  ...  The skyrocket of expenses leads to heavy loss to the cracker, which prevents further attacks.  ...  In this case, the attack expense is at least λ j times according to Equation (11) . V. JOINT DEFENSE FRAMEWORK We elaborate the joint defense framework as follows. A.  ... 
arXiv:2107.01382v1 fatcat:lswm5ev2p5gkvguibpaywqocdq

Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid [article]

Jianhua Li, Ximeng Liu, Jiong Jin, Shui Yu
2021 arXiv   pre-print
Under this circumstance, we revisit the DDoS attack and defense in terms of attacking cost and populations of both parties, proposing a joint defense framework to incur higher attacking expense in a grid  ...  The distributed denial of service (DDoS) attack is detrimental to businesses and individuals as we are heavily relying on the Internet.  ...  Compared with individual defense, the joint defense approach sets the front line to the attacking source, potentially captures the zombies and the attack masters, and mitigates attacks at the IoT edge.  ... 
arXiv:2104.00236v1 fatcat:jcngyfdrvnfs7lq4i4bdvrujnq

Revisiting a game theoretic framework for the robust railway network design against intentional attacks

Federico Perea, Justo Puerto
2013 European Journal of Operational Research  
Due to the importance of the order of play and the information available to the players at the moment of their decisions, we here extend those previous models by proposing a formulation of this situation  ...  The paper also proposes a model to distribute security resources over an already existing railway network in order to minimize the negative effects of an intentional attack.  ...  Special thanks are due to two anonymous referees for their valuable comments and suggestions.  ... 
doi:10.1016/j.ejor.2012.11.015 fatcat:k6cyh3ifcfal7nstmoewfjtv5u

GRAPHITE: A Practical Framework for Generating Automatic Physical Adversarial Machine Learning Attacks [article]

Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash
2021 arXiv   pre-print
GRAPHITE is also able to find successful attacks using perturbations that modify small areas of the input image against PatchGuard, a recently proposed defense against patch-based attacks.  ...  ., robustness of a attack to environmental physical variations such as viewpoint and lighting changes, and 3) supporting attacks in both white-box and black-box hard-label scenarios, so that the adversary  ...  We generate our attack on images of height 500. The perturbation was generated at a height of 250 and enlarged to fit over the whole image.  ... 
arXiv:2002.07088v5 fatcat:3m7zsu47m5c2fplpr6zc74rhne

Problems of Preparedness: U.S. Readiness for a Domestic Terrorist Attack

Richard A. Falkenrath
2001 International Security  
Carter, "Keeping the Edge: Managing Defense for the Future," in Carter and White, Keeping the Edge, pp. 14-19. fusingly across multiple bureaucracies spanning several levels of government.  ...  White, eds., Keeping the Edge: Managing Defense for the Future (Cambridge, Mass.: MIT Press, 2001), pp. 119-128. 21 .  ... 
doi:10.1162/01622880151091925 fatcat:cgf37gzl25h7bdovkitdwubcgy

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT [article]

J. Li, L. Lyu, X. Liu, X. Zhang, X. Lyu
2021 arXiv   pre-print
Thus, we propose the federated learning empowered mitigation architecture (FLEAM) to advocate joint defense, incurring a higher hacking expense.  ...  Our comprehensive evaluations showcase that the attacking expense incurred is 2.5 times higher, the mitigation delay is about 72% lower, and the accuracy is 47% greater on average than classic solutions  ...  On top of the protocol, FLEAM enables the mitigation at the source end, reducing the mitigation delay and enlarging the attacking expense. The user experience is also improved.  ... 
arXiv:2012.06150v2 fatcat:jzfv2jxglje7bcsddqep6tem5m

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
The first paper, "Extensive Design for Attack's Recognition and Resistance of Survivable Network" by Hui Xu and Xiang Gu, gives a solution of attack defense of survivable network based on extentics.  ...  Through such combination, the advantages of AP in time costs and the advantages of NC in accuracy have been adopted.  ...  The ability to retain customers through advanced comments and recommendation systems cannot be too be extended. IIV.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

The United States and Canadian Responses to the Feminist Attack on Pornography: A Perspective from the History of Obscenity

Kevin W. Saunders
1998 Indiana International & Comparative Law Review  
"The Refonnation attacked Catholic sex theory as too severe and Catholic sex practice as too lax." Id.  ...  set our teeth on edge."  ...  While this runs counter to the position that, if a woman is harmed, the other value of the work should not matter, 259 the concession is necessary to adapt obscenity to address the issue.  ... 
doi:10.18060/17455 fatcat:yvdt3ewyjbfnzkgs5vcfxnducq

New Birth Certificate

G E Abbott
1905 California state journal of medicine  
At the same time the writer feels that there are few men really interested in their profession who would refuse to accept the additional trouble and slight expense incurred when they see the increased  ...  Not only did this attack occur insolated in the small joints, but it involved 20 end joints simultaneously, the disappearance of the disease occurring in the same way as its appearance.  ... 
pmid:18733626 pmcid:PMC1650951 fatcat:23w4mr6em5eypm7l4aaiorlhhe

Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model

William Steingartner, Darko Galinec, Andrija Kozina
2021 Symmetry  
Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network.  ...  These reactive defenses are designed to detect once they are attacked yet often fail.  ...  The Defender's Edge A critical advantage of deception-based defenses is that they give defenders an edge, a home-field advantage.  ... 
doi:10.3390/sym13040597 fatcat:6thxnfbz4zf7jhi4lnenghqiqq

The Proposed Canal Enlargements

1863 Scientific American  
Where the edges meet there are no projections to offend the sight.  ...  � would open the door to expensive litigation and con�sion.  ... 
doi:10.1038/scientificamerican04251863-265c fatcat:p7ywjeovejep5n4rsv7s3qqfn4

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
at Terahertz bands and attacks against pervasive intelligence.  ...  top promising techniques to mitigate the attack magnitude and personal data breaches substantially.  ...  /defense systems at the right time.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Dual GNNs: Graph Neural Network Learning with Limited Supervision [article]

Abdullah Alchihabi, Yuhong Guo
2021 arXiv   pre-print
The performance of GNNs can degrade significantly as the number of labeled nodes decreases or the graph connectivity structure is corrupted by adversarial attacks or due to noises in data measurement /  ...  The primary module uses the input graph structure to induce regular node embeddings and predictions with a regular GNN baseline, while the auxiliary module constructs a new graph structure through fine-grained  ...  Within such a joint learning framework, the two modules can interactively impact each other through the shared encoder f Θ .  ... 
arXiv:2106.15755v1 fatcat:st4boznnercl5jh6dqoqqinaqy

Long‐range nuclear cruise missiles and stability

George N. Lewis, Theodore A. Postol
1992 Science and Global Security  
Such an attack could destroy the other country's entire strategic bomber force on the ground and severely damage its strategic command and control system, perhaps to the point of endangering the ability  ...  of its ICBM force to be launched on warning.  ...  ACKNOWLEDGEMENTS The authors thank Sidney Drell, Lisbeth Gronlund, David Wright, and two anonymous reviewers for useful discussions and comments. NOTES AND REFERENCES  ... 
doi:10.1080/08929889208426379 fatcat:zchdt6imwjbapgvizsoou2rs7e

Page 462 of Youth's Companion Vol. 85, Issue 36 [page]

1911 Youth's Companion  
As the joint is to be tightened by screwing up the nut, it will be easier to work if the mouth of the side hole is enlarged to give room for the play of the wrench.  ...  Eaeh joint is made by boring a continuous hole through the two pieces making the joint.  ... 
« Previous Showing results 1 — 15 out of 5,452 results