منابع مشابه
Vulnerability Analysis and Countermeasures for WiFi-based Location Services and Applications
Wireless LANs, or WiFi, are very common in any household or business today. Their wireless nature allows mobility and convenience for the user and that opens up a lot of new possibilities in mobile devices such as smartphones and tablets. One application that makes use of wireless LANs is positioning, which can be used in areas where Global Positioning Systems may have trouble functioning or no...
متن کاملPreventive Countermeasures For
A general transient stability control technique is applied to the design of preventive countermeasures consisting of rescheduling generators’ active power. The technique relies on SIME, a hybrid direct – time-domain method; and, like SIME, it preserves the accuracy of time-domain methods and their ability to handle any power system modeling, stability scenario and mode of instability. Its appli...
متن کاملBadUSB 2.0: Exploring USB Man-In-The-Middle Attacks
The uses and capabilities of rogue USB hardware implants for use in cyber espionage activities is still very much an unknown quantity in the industry. Security professionals would benefit from tools capable of exploring the threat landscape while increasing awareness and countermeasures in this area. BadUSB 2.0 or BadUSB2 is such an investigative tool capable of compromising USB fixed-line comm...
متن کاملPath Planning for Mine Countermeasures
We have developed path-planning techniques and tools to look for paths through minefields. Our techniques seek to balance the length and risk associated with different routes through a minefield. Our methods are intended to provide battlegroup commanders powerful new tools to evaluate alternative routes while searching for low risk paths. It is well known how to find the path of shortest distan...
متن کاملCountermeasures for mobile agent security
Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, counter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2015
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2015.25.3.559