نتایج جستجو برای: malicious user
تعداد نتایج: 253175 فیلتر نتایج به سال:
This paper studies cooperative spectrum sensing based on crowdsourcing in cognitive radio networks. Since intelligent mobile users such as smartphones and tablets can sense the wireless spectrum, channel sensing tasks can be assigned to these mobile users. This is referred to as the crowdsourcing method. However, there may be some malicious mobile users that send false sensing reports deliberat...
هدف ازاجرای این پروژه پیاده سازی واحد کنترل سیستم فرز emco cnc روی یک کامپیوتر at و اضافه کردن تسهیلات گرافیکی جهت سهولت کار user و داشتن اطلاعا کافی از شکل قطعه مطلوب و مسیر حرکت ابزار می باشد. دراین پروژه الگوریتم حرکت که متضمن حرکت محورها بر روی منحنی مورد نظر خواهد بود، الگوریتم dda که در پروژه طراحی و ساخت واحد کنترل ماشینهای cnc است بکار گرفته می شود و سعی می شود دقیقا بجای واحد کنترل این...
In this thesis, we propose a framework for designing decentralized pricing and centralized auction mechanisms in the presence and absence of malicious users. First, we design pricing mechanism for efficient power allocation in the uplink of a single cell Multi Carrier Code Division Multiple Access (MC-CDMA) system with strategic and price taking users. The mechanism is extended to sum power con...
The research described in this thesis aims to improve the techniques used to analyse volatile memory, in particular user space memory, such that more generic techniques to identify unknown code such as malware can be produced. Current analysis techniques of user space memory are limited to a focus on the location of specific kernel objects. This focus on the identification of specific artifacts...
Browser-based Single Sign-On (SSO) is replacing conventional solutions based on multiple, domain-specific credentials by offering an improved user experience: clients log on to their company system once and are then able to access all services offered by the company’s partners. By focusing on the emerging SAML standard, in this paper we show that the prototypical browser-based SSO use case suff...
This paper describes a software assessment method that is being implemented to quantitatively assess in formation system security and survivability Our ap proach which we call Adaptive Vulnerability Analysis exercises software in source code form by simulat ing incoming malicious and non malicious attacks that fall under various threat classes A quantitative met ric is computed by determining w...
Abstract. Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, we make initial steps towards understanding these properties by studying Proportional Fair (PF), the scheduling algorithm used on the downlinks of these networks. We find that the fairness-ensuring mechanism ...
In case that malicious or selfish user congests network, the traditional congestion control schemes such as ECN (Explicit Congestion Notification) in TCP protocol could not control the pernicious congestion so perfectly as they protect normal traffic. In this paper, we propose a strong congestion-making traffic control scheme, which is capable of preventing malicious or selfish user from conges...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید