نتایج جستجو برای: chemical attack
تعداد نتایج: 456207 فیلتر نتایج به سال:
Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
Many species assess predation risk through chemical cues, but the tissue source, chemical nature, and mechanisms of production or action of these cues are often unknown. Amphibian tadpoles show rapid and sustained behavioral inhibition when exposed to chemical cues of predation. Here we show that an alarm pheromone is produced by ranid tadpole skin cells, is released into the medium via an acti...
sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...
nowadays, we live in a world which quality, speed, accuracy and cost are the most important parameters in parts' design and manufacturing. due to the complexity of part manufacturing, traditional and nontraditional manufacturing techniques are used. aerodynamic tests usually requires one or several models for testing in wind tunnels and these models typically have particular complexities in whi...
The events of 11 September 2001 became the catalyst for many to shift their disaster preparedness efforts towards mass-casualty incidents. Emergency responders, healthcare workers, emergency managers, and public health officials worldwide are being tasked to improve their readiness by acquiring equipment, providing training and implementing policy, especially in the area of mass-casualty decont...
Abstact: Historically, the skin was thought to be a simple homogenous barrier. However, it is now known to be a highly specialised organ, and plays a key role in homeostasis. The protective properties of the skin are provided by the outermost layer, the epidermis, which safeguards against chemical, microbial, and physical attack. The exceptional barrier properties of the skin result in it being...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید