Correlation attack

Results: 76



#Item
11Linear feedback shift register / Self-shrinking generator / Py / ESTREAM / QUAD / Keystream / Grain / Stream ciphers / Cryptography / Correlation attack

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:22:24
12Alert correlation

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:34
    13Serge Vaudenay / Correlation attack / Technology / Correlation and dependence / Linear feedback shift register / Bluetooth / Computing / Cryptography / Pseudorandom number generators / Covariance and correlation

    The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2005-09-01 16:50:50
    14Alert messaging / Cluster analysis / Attack patterns / Computer cluster / Computing / Statistics / Alert correlation

    Alert Correlation through Triggering Events and Common Resources ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:25:57
    15Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

    Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:18
    16Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging

    Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:01
    17Cube attack / Tiny Encryption Algorithm / Correlation attack / Linear feedback shift register / Trivium / Key schedule / ICE / Differential cryptanalysis / NLFSR / Cryptography / Stream ciphers / Grain

    A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-15 10:23:44
    18Alert correlation / Graph isomorphism / Graph / Degree / Subgraph isomorphism problem / Graph theory / Mathematics / Theoretical computer science

    Learning Attack Strategies from Intrusion Alerts∗ Peng Ning and Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:01
    19Alert correlation

    Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:13
      20NP-complete problems / Morphisms / Alert correlation / Graph isomorphism / Subgraph isomorphism problem / Matching / Tree / Mathematics / Theoretical computer science / Graph theory

      Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:02
      UPDATE