نتایج جستجو برای: chemical attack

تعداد نتایج: 456207  

Journal: :Karbala international journal of modern science 2022

Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...

In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

Journal: :Hormones and behavior 2009
Michael E Fraker Fang Hu Vindhya Cuddapah S Andy McCollum Rick A Relyea John Hempel Robert J Denver

Many species assess predation risk through chemical cues, but the tissue source, chemical nature, and mechanisms of production or action of these cues are often unknown. Amphibian tadpoles show rapid and sustained behavioral inhibition when exposed to chemical cues of predation. Here we show that an alarm pheromone is produced by ranid tadpole skin cells, is released into the medium via an acti...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

Journal: :international journal of advanced design and manufacturing technology 0
saeed daneshmand

nowadays, we live in a world which quality, speed, accuracy and cost are the most important parameters in parts' design and manufacturing. due to the complexity of part manufacturing, traditional and nontraditional manufacturing techniques are used. aerodynamic tests usually requires one or several models for testing in wind tunnels and these models typically have particular complexities in whi...

Journal: :Prehospital and disaster medicine 2003
Howard W Levitin Henry J Siegelson Stanley Dickinson Pinchas Halpern Yoshikura Haraguchi Anthony Nocera David Turineck

The events of 11 September 2001 became the catalyst for many to shift their disaster preparedness efforts towards mass-casualty incidents. Emergency responders, healthcare workers, emergency managers, and public health officials worldwide are being tasked to improve their readiness by acquiring equipment, providing training and implementing policy, especially in the area of mass-casualty decont...

2007
R. F. Donnelly

Abstact: Historically, the skin was thought to be a simple homogenous barrier. However, it is now known to be a highly specialised organ, and plays a key role in homeostasis. The protective properties of the skin are provided by the outermost layer, the epidermis, which safeguards against chemical, microbial, and physical attack. The exceptional barrier properties of the skin result in it being...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید