A spatial and environmental analysis of shark attacks on Reunion Island (1980–2017)
Texte intégral
Documents relatifs
An attacker can then easily insert an RSTA that provides invalid ranging or position (LCI) information. The client has limited ability to distinguish the attacker’s from valid APs,
By simple definition of what it is, an anomaly may consist of either outliers or small-size clusters, depending on the aggregation level of flows in Y (cf table I). EA then uses
Traces are not la- beled, thus our analysis will be limited to show how the unsupervised approach can detect and characterize different network attacks without using signatures,
We present two practical mitigation strategies for timing inference based attacks with low implementation complexity: an online job randomization algorithm which is able to preserve
In selected-name attacks malicious agents choose their name to attack other agents, hence the veracity of security properties for these agents may be ignored, while in
Kim, Losing Control of the Internet: Using the Data Plane to Attack the Control Plane, in: Symposium on Network and Distributed System Security (NDSS), San Diego, CA, USA, 2011..
For instance, in the Dolev–Yao model it is not possible to take into account attacks based on algebraic properties of cryptographic operators, like exclusive or, in presence of
Our approach combines 3 analysis techniques: Principal Component Analysis to select the fea- tures to be extracted from the captured data; Spectral Clustering to cluster the