نتایج جستجو برای: attacker
تعداد نتایج: 5419 فیلتر نتایج به سال:
This work’s main objective is to predict the attacker’s behavior pattern with high accuracy by using machine learning methods. According experimental and statical analysis, proposed model has improved accuracy. The study was performed two algorithms, K-Nearest Neighbor (KNN) Decision Tree (DTA). On a dataset of 19,864 items, algorithms were implemented, trained, assessed. Two iterations have ex...
In the maximum flow network interdiction problem, an attacker attempts to minimize the maximum flow by interdicting flow on the arcs of network. In this paper, our focus is on the nodal interdiction for network instead of the arc interdiction. Two path inequalities for the node-only interdiction problem are represented. It has been proved that the integrality gap of relaxation of the maximum fl...
in the maximum flow network interdiction problem, an attacker attempts to minimize the maximum flow by interdicting flow on the arcs of network. in this paper, our focus is on the nodal interdiction for network instead of the arc interdiction. two path inequalities for the node-only interdiction problem are represented. it has been proved that the integrality gap of relaxation of the maximum fl...
RoboCup competition as a great test-bed, has turned to a worldwide popular domains in recent years. The main object of such competitions is to deal with complex behavior of systems whichconsist of multiple autonomous agents. The rich experience of human soccer player can be used as a valuable reference for a robot soccer player. However, because of the differences between real and simulated soc...
In this paper, we consider the problem of synthesizing supremal covert damage-reachable attacker, in setup where model supervisor is unknown to adversary but has recorded a (prefix-closed) finite set observations runs closed-loop system. The synthesized attacker needs ensure both damage-reachability and covertness against all supervisors which are consistent with given observations. There gap b...
Research on the effectiveness of negative campaigning offers mixed results. Negative messages can sometimes work to depress candidate evaluations, but they also backfire against attacker. In this article, we examine how humor help mitigate unintended effects using data from three experimental studies in United States and Netherlands. Our results show that (1) political attacks combined with “ot...
The strategic allocation of resources across multiple fronts has long been studied in the context of Blotto games in which two players simultaneously select their allocations. But many allocation problems are sequential. For example, a state trying to defend against a terrorist attack generally allocates some or all of its resources before the attacker decides where to strike. This paper studie...
In multilevel interconnect structures, the interconnect layers are practically always perpendicular to each other. Because of the capacitive coupling between adjacent layers, the switching activity in one layer produces noise in the other. This paper analyses the interlevel coupling noise present at the far end of a victim line when a large number of perpendicular attackers are randomly switchi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید