Messages d’os

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages

Paging is an important mechanism for network bandwidth efficiency and mobile terminal battery life. It has been widely adopted by mobile networks, such as cellular networks, WiMax, and Mobile IP. Due to certain mechanisms for achieving paging efficiency and the convergence of wireless voice and data networks, the paging channel is vulnerable to inexpensive DoS attacks. To mitigate these attacks...

متن کامل

FVIII-VWF dos-à-dos.

In this issue of Blood, back-to-back (dos-à-dos) papers by Chiu et al and Yee et al present complementary findings of structural investigations into the interaction between factor VIII (FVIII) and von Willebrand factor (VWF). The binding of FVIII to VWF contributes in a major way to the regulation of hemostasis.

متن کامل

Stealth DoS

Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business...

متن کامل

Nonverbal Messages and Intercultural Communication

Intercultural communication takes place when individuals influenced by different cultural communities negotiate shared meanings in interaction. As every country has its own cultural value system; consequently, nonverbal communication is different from country to country. Therefore, having knowledge about the similarities and differences of nonverbal communication in different cultures increases...

متن کامل

DoS Attacks Flood Techniques

DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ArchéoSciences

سال: 2015

ISSN: 1960-1360,2104-3728

DOI: 10.4000/archeosciences.4546