نتایج جستجو برای: attack

تعداد نتایج: 80818  

Journal: :EMBO reports 2003

Journal: :Plant Signaling & Behavior 2007

Journal: :Nature Reviews Cancer 2003

Journal: :Politics and the Life Sciences 2015

Manoel Francisco de Campos Neto Vidal Haddad Junior

This communication describes two attacks by domestic and wild carnivores in Caceres County, localized in the Pantanal area, an extensive flooded plain in Mato Grosso State, Midwest region of Brazil. The first attack took place in an urban area and was caused by a Rottweiler dog (Canis lupus familiaris) created by the family of the victim. Another attack occurred in a rural area, caused by a jag...

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

Details of pressure distributions, on a two dimensional airfoil oscillating in pitch through stall, in a 0.8 0.8 m low-speed wind tunnel are presented. Pitching occurred about the airfoils quarter-chord axis. Pitch rate, Reynolds number, and oscillation amplitudes were varied to determine the effects on pressure and lift distributions. It was found that mean angle of attack and pitching amplitu...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Journal: :acta medica iranica 0
m. h. harirchian m. ghaffarpour m. h. shahbazi

primary hypokalemic periodic paralysis is a familial channelopathy inherited as an autosomal dominant trait. the first attack of paralysis may be evolved at any age, but has been reported to be most common in the second decade, so that some authorities believe that an episodic weakness beginning after age 25 is almost never due to primary periodic paralysis. in this retrospective study, we revi...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید