نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

Journal: :TIIS 2014
Seung Yeob Nam Sirojiddin Djuraev

We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identi...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

2012
Joseph Agassi Karl Popper William W. Bartley

Karl Popper discussed admirably the choice between faith and reason [Popper, 1945, Ch. 24]. He admitted that the basis of rationalism is a faith of sorts, a faith in reason. Later on his disciple William W. Bartley dissented from him [Bartley, 1962] and even called him a fideist [Radnitzky and Bartley, 1987, 205, 208, 210-11], much to his annoyance. All this caused bad blood between the two [La...

Journal: :CoRR 2017
Subhash Lakshminarayana Zhan-Teng Teo Rui Tan David K. Y. Yau

Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways...

Journal: :IACR Cryptology ePrint Archive 2017
Jiao Hu Ruilin Li Chaojing Tang

The GMR-2 cipher is a type of stream cipher currently being used in some Inmarsat satellite phones. It has been proven that such a cipher can be cracked using only one single-frame (15 bytes) known keystream but with a moderate executing times. In this paper, we present a new thorough security analysis of the GMR-2 cipher. We first study the inverse properties of the cipher’s components to reve...

2014
Mohammed O. Alrukban Badr O. Albadr Mohammed Almansour Waqas Sami Mussab Alshuil Abulrahman Aldebaib Tamim Algannam Faisal Alhafaf Abdulaziz Almohanna Tariq Alfifi Abdullah Alshehri Muhannad Alshahrani

BACKGROUND Breaking bad news is one of the most stressful and difficult things a physician has to do. Good communication skills are required in order to ensure that bad news is delivered in a humane but effective way. OBJECTIVES This study was designed to explore the preferences and attitude of the Saudi population toward receiving bad news. Second, it was to identify the associations between...

Journal: :CoRR 2015
Xuan Liu Zhiyi Li Zuyi Li

Today’s power systems become more prone to cyberattacks due to the high integration of information technologies. In this paper, we demonstrate that the outages of some lines can be masked by injecting false data into a set of measurements. The success of the topology attack can be guaranteed by making that: 1)the injected false data obeys KCL and KVL to avoid being detected by the bad data dete...

Journal: :Journal of Exposure Science & Environmental Epidemiology 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید