نتایج جستجو برای: attack
تعداد نتایج: 80818 فیلتر نتایج به سال:
The six-degree equations of flight in their classic form do not provide a proper physical perception due to a number of interferences. Nor do they render visible the important role of attack angles. In this study, attempts have been made to develop a complete set of 3D acceleration equations from the equations of normal and tangential acceleration αN=vωv, αt=v ̇. For this purpose, a coordinate s...
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
On April 14, 2018, the United States, Britain and France launched missile attacks on specific targets in the Syrian Arab Republic, including the provinces of Damascus and Homs. According to coalition of three states, these attacks were followed by the Syrian government's use of chemical weapons and targeted solely against its chemical weapons facilities. What have in the days after the act been...
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
Background and Objective: Cardiovascular disease is the most common cause of death in developed countries and in the whole world, and according to the World Health Organization prediction, will be the major cause of morbidity throughout the world in 2020. According to the recent World Health Organization report from each 20 deaths, one is due to diabetes. Heart disease and heart attack are the ...
background: we aimed to study the curative effects of botulinum a toxin (btx-a) on the treatment of post-herpetic neuralgia (pnh). methods: we enrolled 58 pnh patients and treated them with hypodermic injection of btx-a in xiangyang no.1 people’s hospital, hubei university of medicine, hubei, china. we measured and compared the visual analog score (vas), neuropathy pain scale (nps), quality of ...
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to security chips. Instruction can enact same purpose at behavioral level, which produced by interfering with instruction system. Laser Injection (LFI) on program memory during instruction-fetching process, we refer as an attack, studied in this paper. This process bears ability produce controllable fault...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید