نتایج جستجو برای: countermeasure

تعداد نتایج: 4411  

2003
Keith K. Knapp

During the last two years an extensive review of deer-vehicle crash (DVC) countermeasure documentation has been completed. Research and/or documents related to 16 different countermeasures were reviewed and are currently being summarized in a DVC Countermeasures Toolbox. An example of some of the countermeasure research reviewed includes documents related to deer whistles, warning signs and tec...

2012
Nansai Hu

Cognitive radio (CR) has been an active research topic in wireless communications. In this dissertation, radio behavior and potential security threats in cognitive radio networks are investigated in order to successfully deploy CR networks and realize its benefits. We study complex CR misuse issues during its secondary access processes, including misbehavior, cheating, and attack. Different cou...

2016
Hassan Eldib Meng Wu Chao Wang

Fault sensitivity analysis (FSA) is a side-channel attack method that injects faults to cryptographic circuits through clock glitching and applies statistical analysis to deduce sensitive data such as the cryptographic key. It exploits the correlation between the circuit’s signal path delays and sensitive data. A countermeasure, in this case, is an alternative implementation of the circuit wher...

2009
Matthew R. Risser

Vigilance tasks, from driving to surveillance to security remain important and frequent tasks for the US Army. Yet the difficulty users have sustaining vigilance is well known. Augmented cognition offers new methods for supporting sustained vigilance via a closed-loop attention management system (CLAM). A CLAM system monitors operators’ psychophysiology for signs of inattention and then trigger...

Journal: :American journal of physiology. Regulatory, integrative and comparative physiology 2011
Mickael Coupé Ming Yuan Claire Demiot Yanqiang Q Bai Shizhong Z Jiang Yongzhi Z Li Philippe Arbeille Guillemette Gauquelin-Koch Thibaud Levrard Marc-Antoine Custaud Yinghui H Li

Whole body vibration with resistive exercise is a promising countermeasure against some weightlessness-induced dysfunctions. Our objective was to study whether the combination of low-magnitude whole body vibration with a resistive exercise can prevent the cardiovascular deconditioning induced by a nonstrict 60-day head-down bed rest (Earth Star International Bed Rest Experiment Project). Fourte...

2012
François Durvaux Mathieu Renauld François-Xavier Standaert Loïc van Oldeneel tot Oldenzeel Nicolas Veyrat-Charvillon

Inserting random delays in cryptographic implementations is often used as a countermeasure against side-channel attacks. Most previous works on the topic focus on improving the statistical distribution of these delays. For example, efficient random delay generation algorithms have been proposed at CHES 2009/2010. These solutions increase security against attacks that solve the lack of synchroni...

2011
Zhenghong Che Xianxue Li

Recently, China has a more prominent trend of domestic price rise, which has obviously influenced public’s daily life and corporate production and operation. If we don’t take effective measures to deal with price trend, it will lead to further strengthened inflation expectation and deteriorate market economy order. Business community is actively seeking countermeasures to deal with the impact o...

2006
Hsien-Jone Hsieh Dyi-Rong Duh

Chen et al. in 2004 proposed a new hierarchy structure, called the enhanced pyramid network (EPM, for short), by replacing each mesh in a pyramid network (PM, for short) with a torus. Recently, some topological properties and communication on the EPMs have been investigated or derived. Their results have revealed that an EPM is an attractive alternative to a PM. This study investigates the node...

Journal: :J. Sel. Topics Signal Processing 2017
Junichi Yamagishi Tomi Kinnunen Nicholas W. D. Evans Phillip L. De Leon Isabel Trancoso

Journal: :TEM Journal 2021

Phishing attacks are increasing and it becomes necessary to use appropriate response methods respond effectively phishing attacks. This paper aims uncover attack sites by analyzing a three-module set prevent damage reconsider the awareness of Based on analyzed content, countermeasure was proposed for each type using website features. These features will be classified in order determine effectiv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید