- The unauthorized alteration of certain system files is one of the symptoms of an active attack, or compromise upon a system.
- The 3GPP authentication and key agreement has two security shortages. One is that it needs a strong secure channel assumption between the VLR and the HLR,and will easily suffer from the active attack after the adversary accesses the channel.
- The conclusion was that both A and B players got higher active attack than the passive one for the attack count and score successful rate, in other words, they belonged to the active attack players.
- Simulation for the Active Attack Mine's Hitting Probability
- Discussion about Active Attack Policy on Economic Crime