An Insect Attacking a Worm

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

eCAM: Attacking an Epidemic?

Diabetes 2, once reserved for those who are aging, is now rampant in adolescents in the USA. Obesity is the culprit brought on by poor eating habits, lack of exercise and a general malaise paradoxically due to wealth and not poverty (at least material). In our penultimate issue of eCAM supported by OUP, I aim to show certain advancements in evidence-based approaches. Diabetes is a condition in ...

متن کامل

Evolutionarily conserved elements in vertebrate, insect, worm, and yeast genomes.

We have conducted a comprehensive search for conserved elements in vertebrate genomes, using genome-wide multiple alignments of five vertebrate species (human, mouse, rat, chicken, and Fugu rubripes). Parallel searches have been performed with multiple alignments of four insect species (three species of Drosophila and Anopheles gambiae), two species of Caenorhabditis, and seven species of Sacch...

متن کامل

An Approach against a Computer Worm Attack

Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper, we reviewed the network defense systems from different perspectives for defini...

متن کامل

Attacking a Feedback Controller

We consider the problem of generating sensor spoofing attacks on feedback controllers. The attacker has the option of remaining in a stealth mode – wherein it spoofs some sensor but only by an amount that is indistinguishable from noise. Later, the attacker can launch a full attack and try to force the system to get into an unsafe region. Using bounded model checking on an example adaptive crui...

متن کامل

Attacking an OT-Based Blind Signature Scheme

—In this paper, we describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corru...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1882

ISSN: 0028-0836,1476-4687

DOI: 10.1038/026574b0