نتایج جستجو برای: bad mouthing attack
تعداد نتایج: 110943 فیلتر نتایج به سال:
We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identi...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
Karl Popper discussed admirably the choice between faith and reason [Popper, 1945, Ch. 24]. He admitted that the basis of rationalism is a faith of sorts, a faith in reason. Later on his disciple William W. Bartley dissented from him [Bartley, 1962] and even called him a fideist [Radnitzky and Bartley, 1987, 205, 208, 210-11], much to his annoyance. All this caused bad blood between the two [La...
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways...
The GMR-2 cipher is a type of stream cipher currently being used in some Inmarsat satellite phones. It has been proven that such a cipher can be cracked using only one single-frame (15 bytes) known keystream but with a moderate executing times. In this paper, we present a new thorough security analysis of the GMR-2 cipher. We first study the inverse properties of the cipher’s components to reve...
BACKGROUND Breaking bad news is one of the most stressful and difficult things a physician has to do. Good communication skills are required in order to ensure that bad news is delivered in a humane but effective way. OBJECTIVES This study was designed to explore the preferences and attitude of the Saudi population toward receiving bad news. Second, it was to identify the associations between...
Today’s power systems become more prone to cyberattacks due to the high integration of information technologies. In this paper, we demonstrate that the outages of some lines can be masked by injecting false data into a set of measurements. The success of the topology attack can be guaranteed by making that: 1)the injected false data obeys KCL and KVL to avoid being detected by the bad data dete...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید