نتایج جستجو برای: ssdf attack

تعداد نتایج: 80839  

Journal: :Computer Communications 2012
Ruiliang Chen Jung-Min Park Kaigui Bian

Distributed spectrum sensing (DSS) enables a Cognitive Radio (CR) network to reliably detect licensed users and avoid causing interference to licensed communications. The data fusion technique is a key component of DSS. We discuss the Byzantine failure problem in the context of data fusion, which may be caused by either malfunctioning sensing terminals or Spectrum Sensing Data Falsification (SS...

2000
Bishnupriya Bhattacharya Shuvra S. Bhattacharyya

Dataflow has proven to be an attractive computation model for programming DSP applications. A restricted version of dataflow, termed synchronous dataflow (SDF), that offers strong compiletime predictability properties, but has limited expressive power, has been studied extensively in the DSP context [3]. Many extensions to synchronous dataflow have been proposed to increase its expressivity, wh...

Journal: :American Journal of Public Health and the Nations Health 1951

Journal: :Journal of Security and Safety Technology 2018

Numerical investigation was performed on NACA 0015 which is a symmetric airfoil. Pressure distribution and then lift and drag forces are verified. Changing of ground clearance was a considerable point. Also the angle of attack was changed from 0° to 10°. Pressure coefficient reaches its higher amounts on the wing lower surface when the ground clearance diminishes. Increment of the angle of atta...

Abdollahimohammad, , MohammadPourhdki, , Rahnama, , Shaamsizadeh, , Shahraki vahed, ,

Background and Objectives: Anxiety is one of the most common psychological reactions in patients with acute myocardial infarction. This study aimed to compare the effect of training by peers and nurses on anxiety in patients with acute myocardial infarction. Materials and Methods: This study is a quasi-experimental intervention. Samples included 60 patients with myocardial infarction who wer...

and M. A. Masoumnia, H. Momeni, J. Heirani Nobari,

The six-degree equations of flight in their classic form do not provide a proper physical perception due to a number of interferences. Nor do they render visible the important role of attack angles. In this study, attempts have been made to develop a complete set of 3D acceleration equations from the equations of normal and tangential acceleration αN=vωv, αt=v ̇. For this purpose, a coordinate s...

A. Akbari A. Patooghy E. Aerabi M. Fazeli M. Kaykha

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

Journal: :isecure, the isc international journal of information security 0
e. aerabi m. kaykha m. fazeli a. patooghy a. akbari

embedded systems are becoming a suggestive target for code injection attacks in recent years. software protection mechanisms in general computers are not usually applicable in embedded systems as they come with limited resources like memory and processor. in this paper we investigate side channel characteristics of embedded systems and their usability in code injection attack detection. the arc...

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید