نتایج جستجو برای: attacker

تعداد نتایج: 5419  

Journal: :Advances in parallel computing 2022

This work’s main objective is to predict the attacker’s behavior pattern with high accuracy by using machine learning methods. According experimental and statical analysis, proposed model has improved accuracy. The study was performed two algorithms, K-Nearest Neighbor (KNN) Decision Tree (DTA). On a dataset of 19,864 items, algorithms were implemented, trained, assessed. Two iterations have ex...

G. H. Shirdel Shirdel

In the maximum flow network interdiction problem, an attacker attempts to minimize the maximum flow by interdicting flow on the arcs of network. In this paper, our focus is on the nodal interdiction for network instead of the arc interdiction. Two path inequalities for the node-only interdiction problem are represented. It has been proved that the integrality gap of relaxation of the maximum fl...

Journal: :journal of sciences, islamic republic of iran 2013
g. h. shirdel shirdel

in the maximum flow network interdiction problem, an attacker attempts to minimize the maximum flow by interdicting flow on the arcs of network. in this paper, our focus is on the nodal interdiction for network instead of the arc interdiction. two path inequalities for the node-only interdiction problem are represented. it has been proved that the integrality gap of relaxation of the maximum fl...

RoboCup competition as a great test-bed, has turned to a worldwide popular domains in recent years. The main object of such competitions is to deal with complex behavior of systems whichconsist of multiple autonomous agents. The rich experience of human soccer player can be used as a valuable reference for a robot soccer player. However, because of the differences between real and simulated soc...

Journal: :IEEE Transactions on Automatic Control 2023

In this paper, we consider the problem of synthesizing supremal covert damage-reachable attacker, in setup where model supervisor is unknown to adversary but has recorded a (prefix-closed) finite set observations runs closed-loop system. The synthesized attacker needs ensure both damage-reachability and covertness against all supervisors which are consistent with given observations. There gap b...

Journal: :Political Research Quarterly 2021

Research on the effectiveness of negative campaigning offers mixed results. Negative messages can sometimes work to depress candidate evaluations, but they also backfire against attacker. In this article, we examine how humor help mitigate unintended effects using data from three experimental studies in United States and Netherlands. Our results show that (1) political attacks combined with “ot...

Journal: :Games and Economic Behavior 2009
Robert Powell

The strategic allocation of resources across multiple fronts has long been studied in the context of Blotto games in which two players simultaneously select their allocations. But many allocation problems are sequential. For example, a state trying to defend against a terrorist attack generally allocates some or all of its resources before the attacker decides where to strike. This paper studie...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 2007
Martin Saint-Laurent

In multilevel interconnect structures, the interconnect layers are practically always perpendicular to each other. Because of the capacitive coupling between adjacent layers, the switching activity in one layer produces noise in the other. This paper analyses the interlevel coupling noise present at the far end of a victim line when a large number of perpendicular attackers are randomly switchi...

Journal: :International Journal of Distributed Sensor Networks 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید