Assessing Attack Threat by the Probability of Following Attacks.
Zhitang LiJie LeiLi WangDong LiPublished in: IEEE NAS (2007)
Keyphrases
- countermeasures
- power analysis
- information security
- ddos attacks
- cyber attacks
- attack detection
- malicious users
- differential power analysis
- distributed denial of service
- malicious attacks
- probability distribution
- security measures
- data corruption
- denial of service attacks
- network attacks
- injection attacks
- dos attacks
- java card
- network intrusions
- network intrusion
- fault injection
- attack scenarios
- security risks
- digital watermark
- information leakage
- privacy issues
- detecting malicious
- intrusion detection
- defense mechanisms