نتایج جستجو برای: attack
تعداد نتایج: 80818 فیلتر نتایج به سال:
This communication describes two attacks by domestic and wild carnivores in Caceres County, localized in the Pantanal area, an extensive flooded plain in Mato Grosso State, Midwest region of Brazil. The first attack took place in an urban area and was caused by a Rottweiler dog (Canis lupus familiaris) created by the family of the victim. Another attack occurred in a rural area, caused by a jag...
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
Details of pressure distributions, on a two dimensional airfoil oscillating in pitch through stall, in a 0.8 0.8 m low-speed wind tunnel are presented. Pitching occurred about the airfoils quarter-chord axis. Pitch rate, Reynolds number, and oscillation amplitudes were varied to determine the effects on pressure and lift distributions. It was found that mean angle of attack and pitching amplitu...
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
primary hypokalemic periodic paralysis is a familial channelopathy inherited as an autosomal dominant trait. the first attack of paralysis may be evolved at any age, but has been reported to be most common in the second decade, so that some authorities believe that an episodic weakness beginning after age 25 is almost never due to primary periodic paralysis. in this retrospective study, we revi...
in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید