نتایج جستجو برای: emptive attack
تعداد نتایج: 82661 فیلتر نتایج به سال:
There is currently an unmet need in higher education for a structured, pre-emptive programme of support to help students enhance their resilience stress. This article presents mixed-methods ev...
We explore whether firms that are vulnerable to takeovers pre-emptively manage earnings in anticipation of such events. find a positive relationship between firms' vulnerability and their propensity earnings, mainly through the manipulation real activities. consider two motivations for pre-emptive management behavior; (1) deter future (2) optimize M&A outcomes. Concerning former, we document ev...
how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69. brucellosis is a multi-system infectious disease that presents with various manifestations and complication...
The recent worldwide spread of the swine-origin H1N1 2009 influenza outbreak has resulted in its designation as a pandemic by the World Health Organization. While it appears to result in mild symptoms, concern still exists that a more severe influenza pandemic with a high case fatality ratio might arise by reassortment or mutation of the currently circulating avian influenza (H5N1) virus. Given...
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید