Search

Your search keyword '"Brute-force attack"' showing total 887 results

Search Constraints

Start Over You searched for: Descriptor "Brute-force attack" Remove constraint Descriptor: "Brute-force attack"
887 results on '"Brute-force attack"'

Search Results

1. Research on techniques for detecting brute-force attacks on corporate email.

2. Distribution of Invalid Users on an SSH Server

3. Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack.

5. 中高連携を意識した情報セキュリティに関する授業の提案.

8. Analysis of Password Protected Documents Using Statistical Approaches on High Performance Computing

9. Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack

10. Honey Encryption: Fortification Beyond the Brute-Force Impediment

11. A Survey of Cryptographic Techniques to Secure Genomic Data

12. Detecting Brute-Force Attacks on Cryptocurrency Wallets

13. A Novel Approach for Detecting Cyberattacks in Embedded Systems Based on Anomalous Patterns of Resource Utilization-Part I

14. A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher

15. Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling

17. Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach

18. Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization.

19. Fast Software Encryption Attacks on AES

21. Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol

22. Research on AI security enhanced encryption algorithm of autonomous IoT systems

23. Mitigación de vulnerabilidades en la red central de un ISP: Un caso de estudio

24. A new scan pattern method for color image encryption based on 3D-Lorenzo chaotic map method

25. Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

26. Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption

27. ‏An Enhanced Approach to Improve the Security and Performance for Deduplication

28. Meningkatkan Keamanan Webserver Aplikasi Pelaporan Pajak Daerah Menggunakan Metode Penetration Testing Execution Standar

29. A novel biometric crypto system based on cryptographic key binding with user biometrics

30. Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems

31. A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical training: markov property using SHA 256

32. Texture maps and chaotic maps framework for secure medical image transmission

33. A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos

34. 6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates

35. A Novel Approach for Detecting Cyberattacks in Embedded Systems Based on Anomalous Patterns of Resource Utilization-Part I

36. Network Log-Based SSH Brute-Force Attack Detection Model

37. Alternative Codes and Phase Rotation Extensions for Alternating Space-Time Coding-Based Physical Layer Security

38. Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing

39. Password-based key derivation function as one of Blum-Blum-Shub pseudo-random generator applications.

40. A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps

41. Public key authentication scheme over quaternions

42. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography

43. Lightweight secure image encryption scheme based on chaotic differential equation

44. Analysis of traditional and modern image encryption algorithms under realistic ambience

45. Algebraic method to recover superpolies in cube attacks

46. Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2

47. A Novel Image Encryption Approach Using Polar Decomposition and Orthogonal Matrices

48. Pengembangan Aplikasi Sistem Informasi Smart Register Online Berbasis Android Menggunakan Algoritma BruteForce

49. Novel approach for multimodal feature fusion to generate cancelable biometric

50. A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation

Catalog

Books, media, physical & digital resources