Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Alireza Sadighian"'
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Cryptology and Network Security ISBN: 9783319489643
CANS
CANS
TorrentLocker is a ransomware that encrypts sensitive data located on infected computer systems. Its creators aim to ransom the victims, if they want to retrieve their data. Unfortunately, antiviruses have difficulties to detect such polymorphic malw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77caa17302f0d19db5339f9e5818edae
https://doi.org/10.1007/978-3-319-48965-0_32
https://doi.org/10.1007/978-3-319-48965-0_32
Autor:
Alireza Shameli Sendi, Naser Ezzati Jivan, Alireza Sadighian, Michel Dagenais, Masoume Jabbarifar
Publikováno v:
Wireless Sensor Network. :910-918
L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of tw
Publikováno v:
CRiSIS
One of the fundamental challenges in real-world Intrusion Detection Systems (IDS) is the large number of redundant, non-relevant false positive alerts that they generate. In this paper, we propose an alert fusion approach that incorporates contextual
Autor:
Rasool Jalili, Alireza Sadighian
Publikováno v:
SECURWARE
In this paper we propose two mutual authentication protocols for RFID systems. Generally, in RFID systems, a reader can authenticate tags in the real-time and batch modes. This paper proposes the first authentication protocol for the real-time mode.
Autor:
Rasool Jalili, Alireza Sadighian
Publikováno v:
ICON
Numerous authentication protocols for RFID systems were proposed as attempt to prevent unauthorized tracking and monitoring, impersonation or cloning, and information leakage. Many of such attempts cannot establish essential requirements that one rob