نتایج جستجو برای: chemical attack
تعداد نتایج: 456207 فیلتر نتایج به سال:
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
background and objectives: fast proteolysis of cheese in ripening process may lead to the premature attack of casein, release of the majority of enzymes into the whey, and loss of cheese composition from curd to whey. in this study, the effect of liposomal flavourzyme on proteolysis of iranian white brined cheese, as well as on the yield and composition of whey and curd was investigated. materi...
Deep neural networks are vulnerable to adversarial examples, even in the black-box setting where attacker is only accessible model output. Recent studies have devised effective attacks with high query efficiency. However, such performance often accompanied by compromises attack imperceptibility, hindering practical use of these approaches. In this article, we propose restrict perturbations a sm...
Considering the insulators ageing in a mixture of PVC and dye, set following operating conditions time to ensure proper operation perfect safety industrial installations using insulated conductors. The results showed that insulation carried out by L.C main office was good quality (on thermal aspect), because resistance is so high (i.e. 3940 Mega Ohms under normal conditions). lifespan 50 years ...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
Three properties of cell surface membranes of normal bladder epithelium and of two malignant urothelial lines transformed in vitro by Dr. Y. Hashimoto and Dr. H. S. Kitagawa were analyzed by means of morphological and chemical tools. Under scan electron microscopy, normal bladder epithelium displayed an appearance devoid of the pleomorphic, abundantly distributed, microvillous structures seen o...
for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....
Mechanistic insights into chemical and photochemical transformations of bismuth vanadate photoanodes
Artificial photosynthesis relies on the availability of semiconductors that are chemically stable and can efficiently capture solar energy. Although metal oxide semiconductors have been investigated for their promise to resist oxidative attack, materials in this class can suffer from chemical and photochemical instability. Here we present a methodology for evaluating corrosion mechanisms and ap...
One of the Army’s primary research aims is to improve the survivability of soldiers in combat zones. One area of concern is the possibility of attack by chemical warfare agents. Current protective gear, while providing excellent protection, is heavy, bulky, and reduces the combat effectiveness of the wearer. Ideally, the next generation of protective gear will be no more cumbersome than the sta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید