نتایج جستجو برای: bypassing

تعداد نتایج: 3464  

2012
Paul De Palma George Luger Caroline Smith Charles Wooters

Automatic speech recognition (ASR) is usually defined as the transformation of an acoustic signal to words. Though there are cases where the transformation to words is useful, the definition does not exhaust all contexts in which ASR could be used. Once the constraint that an ASR system outputs words is relaxed, modifications that reduce the search space become possible: 1) The use of syllables...

2011
Karl Kathuria

News organizations are often the targets of Internet censorship. This paper will look at two technical considerations for the BBC, based on its distribution of non-English content into countries such as Iran and China, where the news services are permanently unavailable from the official BBC websites: blocking detection and circumvention. This study examines an internal BBC prototype system bui...

Journal: :Computers & Security 2012
Jorge Blasco Alís Julio César Hernández Castro Juan E. Tapiador Arturo Ribagorda

Insider threats are an increasing concern for most modern organizations. Information leakage is one of the most important insider threats, particularly according to its potential financial impact. Data Leakage Protection (DLP) systems have been developed to tackle this issue and they constitute the main solution to protect information systems against leaks. They work by tracking sensitive infor...

Journal: :British journal of anaesthesia 2004
D Song F Chung M Ronayne B Ward S Yogendran C Sibbick

BACKGROUND Postoperative day-case patients are usually allowed to recover from anaesthesia in a postanaesthesia care unit (PACU) before transfer back to the day surgical unit (DSU). Bypassing the PACU can decrease recovery time after day surgery. Cost savings may result from a reduced nursing workload associated with the decreased recovery time. This study was designed to evaluate the effects o...

2006
Dan Wendlandt David G. Andersen Adrian Perrig

We describe the design and implementation of FastPass, a next-generation network architecture that thwarts bandwidth flooding attacks by providing destinations with finegrained control over their upstream network capacity. Prior attempts to achieve network flood resilience have required destinations to successfully receive an initial unprotected packet (capability-based designs) or have relied ...

Journal: :Inf. Process. Lett. 2000
Poul Frederick Williams Macha Nikolskaïa Antoine Rauzy

2018
Yash Sharma Pin-Yu Chen

Feature Squeezing is a recently proposed defense method which reduces the search space available to an adversary by coalescing samples that correspond to many different feature vectors in the original space into a single sample. It has been shown that feature squeezing defenses can be combined in a joint detection framework to achieve high detection rates against state-of-the-art attacks. Howev...

Journal: :International Journal of Quantum Information 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید