• LEDAkem

  • Referenced in 4 articles [sw31287]
  • uses ephemeral keys to foil known statistical attacks, and takes advantage of a new decoding...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • powerful attacks on AES. Related-key attacks are especially relevant when a block cipher ... resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack...
  • RAPPOR

  • Referenced in 33 articles [sw42193]
  • collected data. In particular, RAPPOR permits statistics to be collected on the population of client ... properties in the face of different attack models, and, finally, gives results of its application...
  • JESS

  • Referenced in 1 article [sw38849]
  • architecture against DDoS attacks. In particular, our proposed model devises a statistical solution to detect ... relies on a statistical model, it mitigates not only known attacks but also unfamiliar types...
  • AMON

  • Referenced in 3 articles [sw35497]
  • Open Source Architecture for Online Monitoring, Statistical Analysis and Forensics of Multi-gigabit Streams ... activity (e.g. distributed denial of service--DDoS--attacks). Network monitoring is essential to network engineering ... hitters as well as for visualization and statistical detection at the time-of-onset ... allows operators to quickly visualize and diagnose attacks, and limit offline and time consuming post...
  • MaD2

  • Referenced in 1 article [sw19555]
  • resists various known cryptanalytic attacks. Its keystream demonstrates good statistical properties and clears...
  • SCATTER

  • Referenced in 1 article [sw36685]
  • statistics. This prerequisite turns out to be challenging in the practical realization of attacks...
  • HyRiM

  • Referenced in 2 articles [sw25200]
  • losses in each scenario of defense vs. attack action. The distributions can be compiled directly ... HyRiM Package is implemented using the statistical sofware R . You can use, for example...
  • Ditto

  • Referenced in 1 article [sw41838]
  • that robustness to data and model poisoning attacks and fairness, measured as the uniformity ... performance across devices, are competing constraints in statistically heterogeneous networks. To address these constraints...
  • Fortuna

  • Referenced in 1 article [sw26047]
  • designed to be cryptographically secure from known attacks. This paper presents a software implementation ... entropy from commonly available sources, and statistical analysis of the results. Using an FPGA, which...
  • GPS-YNO2

  • Referenced in 1 article [sw36906]
  • still not been determined. Through a statistical functional comparison with the nitric oxide (NO) dependent ... nitrosylation, we observed that PTN prefers to attack certain fundamental biological processes and functions. These...
  • StegoStorage

  • Referenced in 1 article [sw33124]
  • this contribution is to test the statistical LSB embedding model (modified weighted-stego analysis ... implement a more appropriate type of steganalytic attack for Hamming codes and test...
  • XDist

  • Referenced in 2 articles [sw13582]
  • cited TF*IDF and BM25. However, these statistic based ranking methods mostly consider term frequency ... searching system XDist is accordingly proposed to attack the problems aforementioned. In XDist, we firstly...
  • CyGraph

  • Referenced in 1 article [sw22314]
  • best courses of action for responding to attacks. For postattack forensics, it shows vulnerable paths ... capabilities for synthesizing graph models with particular statistical properties...
  • CARRADS

  • Referenced in 1 article [sw00106]
  • Routing behavior in ad hoc networks is highly...
  • GAP

  • Referenced in 3221 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Macaulay2

  • Referenced in 1958 articles [sw00537]
  • Macaulay2 is a software system devoted to supporting...
  • Magma

  • Referenced in 3363 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5403 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6445 articles [sw00554]
  • Almost any workflow involves computing results, and that...