Computer Sciences

BlockPGP: A new blockchain-based PGP management framework

Pretty Good Privacy (PGP), one of the most widely used cryptographic standards, enables safe end-to-end encryption for emails, messages and other data sharing between users. Essentially, PGP works by implementing asymmetric ...

Security

A model to classify cyberattacks using swarm intelligence

In recent years, new technological advances have led to a growing number of devices, ranging from more conventional computers to other gadgets and smart home appliances, communicating and sharing data with one another. Despite ...

Computer Sciences

A model to determine the impact of DDoS attacks using Twitter data

Distributed denial of service (DDoS) attacks, which are designed to prevent legitimate users from accessing specific network systems, have become increasingly common over the past decade or so. These attacks make services ...

Security

Using game theory to model poisoning attack scenarios

Poisoning attacks are among the greatest security threats for machine learning (ML) models. In this type of attack, an adversary tries to control a fraction of the data used to train neural networks and injects malicious ...

Security

Maestro: a new attack that orchestrates malicious flows with BGP

Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed ...

page 1 from 40