نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
During the last two years an extensive review of deer-vehicle crash (DVC) countermeasure documentation has been completed. Research and/or documents related to 16 different countermeasures were reviewed and are currently being summarized in a DVC Countermeasures Toolbox. An example of some of the countermeasure research reviewed includes documents related to deer whistles, warning signs and tec...
Cognitive radio (CR) has been an active research topic in wireless communications. In this dissertation, radio behavior and potential security threats in cognitive radio networks are investigated in order to successfully deploy CR networks and realize its benefits. We study complex CR misuse issues during its secondary access processes, including misbehavior, cheating, and attack. Different cou...
Fault sensitivity analysis (FSA) is a side-channel attack method that injects faults to cryptographic circuits through clock glitching and applies statistical analysis to deduce sensitive data such as the cryptographic key. It exploits the correlation between the circuit’s signal path delays and sensitive data. A countermeasure, in this case, is an alternative implementation of the circuit wher...
Vigilance tasks, from driving to surveillance to security remain important and frequent tasks for the US Army. Yet the difficulty users have sustaining vigilance is well known. Augmented cognition offers new methods for supporting sustained vigilance via a closed-loop attention management system (CLAM). A CLAM system monitors operators’ psychophysiology for signs of inattention and then trigger...
Whole body vibration with resistive exercise is a promising countermeasure against some weightlessness-induced dysfunctions. Our objective was to study whether the combination of low-magnitude whole body vibration with a resistive exercise can prevent the cardiovascular deconditioning induced by a nonstrict 60-day head-down bed rest (Earth Star International Bed Rest Experiment Project). Fourte...
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models
Inserting random delays in cryptographic implementations is often used as a countermeasure against side-channel attacks. Most previous works on the topic focus on improving the statistical distribution of these delays. For example, efficient random delay generation algorithms have been proposed at CHES 2009/2010. These solutions increase security against attacks that solve the lack of synchroni...
Recently, China has a more prominent trend of domestic price rise, which has obviously influenced public’s daily life and corporate production and operation. If we don’t take effective measures to deal with price trend, it will lead to further strengthened inflation expectation and deteriorate market economy order. Business community is actively seeking countermeasures to deal with the impact o...
Chen et al. in 2004 proposed a new hierarchy structure, called the enhanced pyramid network (EPM, for short), by replacing each mesh in a pyramid network (PM, for short) with a torus. Recently, some topological properties and communication on the EPMs have been investigated or derived. Their results have revealed that an EPM is an attractive alternative to a PM. This study investigates the node...
Phishing attacks are increasing and it becomes necessary to use appropriate response methods respond effectively phishing attacks. This paper aims uncover attack sites by analyzing a three-module set prevent damage reconsider the awareness of Based on analyzed content, countermeasure was proposed for each type using website features. These features will be classified in order determine effectiv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید