Showing 1 - 20 results of 62 for search '"time attack"', query time: 1.09s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    by Shi Erying, Wang Zheng
    Published 2018-03-01
    ... and applicable, a real-time attacks blind detection and analysis algorithm of mobile internet network is proposed...
    Get full text
    Article
  5. 5
    by Lilian Bossuet, El Mehdi Benhani
    Published 2021-07-01
    ... mechanism of a complex heterogeneous SoC-FPGA. We provide proof of two cache timing attacks <i>Flush+Reload...
    Get full text
    Article
  6. 6
    by Tibouchi Mehdi, Wallet Alexandre
    Published 2020-11-01
    ..., we present an even simpler timing attack against it. The bimodal Gaussian distribution that BLISS...
    Get full text
    Article
  7. 7
  8. 8
    by Tianhui Meng, Xiaofan Li, Sha Zhang, Yubin Zhao
    Published 2016-09-01
    ... channel with potentially unknown threats. Among possible security issues are timing attacks, which...
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
    by Sergey Zhurid
    Published 2017-02-01
    Subjects: ...indicators for the first and second times attacking and defensive actions of the team...
    Get full text
    Article
  14. 14
  15. 15
    ... that the performance of attacks by degree is bounded away from optimality.Finally we present a polynomial time attack...
    Get full text
    Article
  16. 16
    ...Network security defenses evolve, responding to real-time attack incidents, modifying...
    Get full text
    Article
  17. 17
    by Yi Wang, Mahmoud M. Amin, Jian Fu, Heba B. Moussa
    Published 2017-01-01
    ... scenarios, playback attack and time attack, are investigated. Experimental results are compared...
    Get full text
    Article
  18. 18
    by Weijun Zhu, Qinglei Zhou, Weidong Yang, Haibin Zhang
    Published 2013-01-01
    ... logic—real-time attack signature logic (RASL). Based on such a new logic, we put forward a RASL model...
    Get full text
    Article
  19. 19
    ... of real-time attack detection algorithms are indeed highly needed. This paper investigates and proposes...
    Get full text
    Article
  20. 20
    ... systems algorithms. At first, linear temporal logic, interval temporal logic and real-time attack...
    Get full text
    Article