
LEDAkem
 Referenced in 4 articles
[sw31287]
 uses ephemeral keys to foil known statistical attacks, and takes advantage of a new decoding...

EPCBC
 Referenced in 6 articles
[sw11640]
 powerful attacks on AES. Relatedkey attacks are especially relevant when a block cipher ... resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack...

RAPPOR
 Referenced in 33 articles
[sw42193]
 collected data. In particular, RAPPOR permits statistics to be collected on the population of client ... properties in the face of different attack models, and, finally, gives results of its application...

JESS
 Referenced in 1 article
[sw38849]
 architecture against DDoS attacks. In particular, our proposed model devises a statistical solution to detect ... relies on a statistical model, it mitigates not only known attacks but also unfamiliar types...

AMON
 Referenced in 3 articles
[sw35497]
 Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multigigabit Streams ... activity (e.g. distributed denial of serviceDDoSattacks). Network monitoring is essential to network engineering ... hitters as well as for visualization and statistical detection at the timeofonset ... allows operators to quickly visualize and diagnose attacks, and limit offline and time consuming post...

MaD2
 Referenced in 1 article
[sw19555]
 resists various known cryptanalytic attacks. Its keystream demonstrates good statistical properties and clears...

SCATTER
 Referenced in 1 article
[sw36685]
 statistics. This prerequisite turns out to be challenging in the practical realization of attacks...

HyRiM
 Referenced in 2 articles
[sw25200]
 losses in each scenario of defense vs. attack action. The distributions can be compiled directly ... HyRiM Package is implemented using the statistical sofware R . You can use, for example...

Ditto
 Referenced in 1 article
[sw41838]
 that robustness to data and model poisoning attacks and fairness, measured as the uniformity ... performance across devices, are competing constraints in statistically heterogeneous networks. To address these constraints...

Fortuna
 Referenced in 1 article
[sw26047]
 designed to be cryptographically secure from known attacks. This paper presents a software implementation ... entropy from commonly available sources, and statistical analysis of the results. Using an FPGA, which...

GPSYNO2
 Referenced in 1 article
[sw36906]
 still not been determined. Through a statistical functional comparison with the nitric oxide (NO) dependent ... nitrosylation, we observed that PTN prefers to attack certain fundamental biological processes and functions. These...

StegoStorage
 Referenced in 1 article
[sw33124]
 this contribution is to test the statistical LSB embedding model (modified weightedstego analysis ... implement a more appropriate type of steganalytic attack for Hamming codes and test...

XDist
 Referenced in 2 articles
[sw13582]
 cited TF*IDF and BM25. However, these statistic based ranking methods mostly consider term frequency ... searching system XDist is accordingly proposed to attack the problems aforementioned. In XDist, we firstly...

CyGraph
 Referenced in 1 article
[sw22314]
 best courses of action for responding to attacks. For postattack forensics, it shows vulnerable paths ... capabilities for synthesizing graph models with particular statistical properties...

CARRADS
 Referenced in 1 article
[sw00106]
 Routing behavior in ad hoc networks is highly...

GAP
 Referenced in 3221 articles
[sw00320]
 GAP is a system for computational discrete algebra...

Macaulay2
 Referenced in 1958 articles
[sw00537]
 Macaulay2 is a software system devoted to supporting...

Magma
 Referenced in 3363 articles
[sw00540]
 Computer algebra system (CAS). Magma is a large...

Maple
 Referenced in 5403 articles
[sw00545]
 The result of over 30 years of cutting...

Mathematica
 Referenced in 6445 articles
[sw00554]
 Almost any workflow involves computing results, and that...