نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
Abstract The relative inaccessibility of a patient’s glioma throughout their disease course precludes individualized insights into tumor biology and responses thereof to therapeutic challenge. We propose that serial cerebrospinal fluid (CSF) samples can be used perform espionage in the form biomarker discovery for analytes are sensitive burden (for monitoring) candidate therapies biological imp...
One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...
This paper reports the first authorship attribution results based on the automatic computational methods for the Lithuanian language. Using supervised machine learning techniques we experimentally investigated the influence of different feature types (lexical, character, and syntactic) focusing on a few authors within three datasets, containing transcripts of the parliamentary speeches and deba...
Digital espionage has Cold War origins, but states are still determining how to respond when they found be its latest victims. In multilateral discussions about norms of responsible state behaviour in cyberspace, digital political is the elephant room. Like other aspects inter-state intelligence competition, ‘business as usual’ can also lead tensions, particularly operations become public. The ...
The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home. Many smart home devices have always-on sensors that capture users’ offline activities in their living spaces and transmit information about these activities on the Internet. In this paper, we demonstrate that an ISP or other network observ...
Working papers of the Max Planck Institute for Demographic Research receive only limited review. Views or opinions expressed in working papers are attributable to the authors and do not necessarily refl ect those of the Institute.
in this paper, the hyper - zagreb index of the cartesian product, composition and corona product of graphs are computed. these corrects some errors in g. h. shirdel et al.[11].
in this paper, multi-microgrids (mmg) are considered as future smart distribution grids, in which small scale energy resources (sser) are main power generation units with small scales. optimal operation of microgrids in defined intervals is carried out to achieve economic conditions in distribution systems. the defined operating problem is optimized using a heuristic algorithm considering uncer...
Since communication signals are publicly exposed while they transmit across space, Ad Hoc Networks (MANETs) where secured is most crucial. Unfortunately, these systems more open to intrusions that range from passive listening aggressive spying. A Hybrid Team centric Re-Key Control Framework (HT-RCF) suggests this research examines private group in Adhoc environments. Each selects a Group Manage...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید