نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the ...
The prospect of a terrorist attack against Australian interests is currently being debated across our society. The explosive blast attack is most favoured by terrorists. Blast injuries create unique patterns of multisystem injury with contaminated wounds and extensive devitalized tissue. Australian civilian surgeons are increasingly likely to be involved in the management of these injuries, eit...
With the rapid advancement of wireless network technology, usage of WSN in real time applications like military, forest monitoring etc. found increasing. Generally WSN operate in an unattended environment and handles critical data. Authenticating the user trying to access the sensor memory is one of the critical requirements. Many researchers have proposed remote user authentication schemes foc...
Wireless sensor networks are used for many different applications these days such as in environment applications, military applications, queue tracking, etc. In today’s scenario, security in WSN is one of the major issue.WSN are vulnerable to different types of attacks due to various constraints such as low battery power, less memory, and associated low energy. These attacks lead to decrease in...
An Ad hoc Network is a pool of wireless mobile nodes energetically forming a network without the use of any pre-accessible network infrastructure or centralized administrator. These nodes communicate with each other by hop-to-hop communication. This dynamic topology of mobile ad-hoc networks (MANETs) allows nodes to get attached and leave the network at any second of time. Thus MANET can be use...
for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....
Network security has become very important and foremost issue for the personal computer users, organizations, business and military. With the advent of internet, security has become the major concern. The main objective of this research is to simulate and analyze the effect of queuing algorithms RED and DROPTAIL with CPR on the TCP targeted LDDoS attack flows. LDDoS attack is more vulnerable to...
The Wireless Sensor Network has gained advancement in new era technology. Beside a small size, sensors have the feature of sensing and collecting the data and small and are used in many areas ranging from detecting temperature to providing security for the home. Other than these, sensors are also used for traffic management and military applications. To extend the network lifetime, sensor nodes...
Pre-information age military battleeelds are based on the traditional land, sea, air, and space paradigm. Global internetworking is causal to the creation of a dangerously real 5th Dimension of Warfare-Cyberspace. This paper describes an Internet based assault, commonly referred to as e-mail spam, on the Langley AFB internetwork-ing infrastructure. We discuss the cyber-attack, a framework for d...
Wireless sensor networks have been widely used in many applications such as military monitoring, target tracking and surveillance. Security issue is need to more concern. Routing protocol is the core technology of the network layer in wireless sensor networks. Many attackers disrupt the network with routing attack, which will do serious damage to wireless sensor networks. Consider the scare ene...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید