نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
this article presents the key insights about the environment and security links in the context of the persian gulf region. this research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the persian gulf region. environmental security challenges are human security, sustainable development and regional cooperation in the persi...
Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...
The asymptotic minimax theorem for Bernoully twoarmed bandit problem states that the minimax risk has the order N as N → ∞, where N is the control horizon, and provides lower and upper estimates. It can be easily extended to normal two-armed bandit. For normal two-armed bandit, we generalize the asymptotic minimax theorem as follows: the minimax risk is approximately equal to 0.637N as N →∞. Ke...
‘Non-state armed groups’ refers to groups who retain the potential to deploy arms for political, economic and ideological objectives, which in practice are often translated into an open challenge to the authority of the state. In principle, non-state armed groups and political parties/movements are perceived as two opposite models of approach to democratic political processes. However, given th...
The objective of this study is to empirically test the effects of disasters which include natural as well as human made disasters such as armed conflict on women's reproductive health in developing countries. Data from 128 developing countries are used. It was found that average number of deaths from natural disasters and armed conflict in the East Asia and Pacific region was not significantly ...
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
We introduce a novel variant of the multi-armed bandit problem, in which bandits are streamed one at a time to the player, and at each point, the player can either choose to pull the current bandit or move on to the next bandit. Once a player has moved on from a bandit, they may never visit it again, which is a crucial difference between our problem and classic multi-armed bandit problems. In t...
Detection of adversarial examples has been a hot topic in the last years due to its importance for safely deploying machine learning algorithms critical applications. However, detection methods are generally validated by assuming single implicitly known attack strategy, which does not necessarily account real-life threats. Indeed, this can lead an overoptimistic assessment detectors’ performanc...
In standard models of experimentation, the costs of project development consist of (i) the direct cost of running trials as well as (ii) the implicit opportunity cost of leaving alternative projects idle. Another natural type of experimentation cost, the cost of holding on to the option of developing a currently inactive project, has not been studied. In a (multi-armed bandit) model of experime...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید