نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

Journal: :Computers & Mathematics with Applications 2010
Sudip Misra P. Venkata Krishna Kiran Isaac Abraham Navin Sasikumar S. Fredun

A Wireless mesh network is a wireless communication between different nodes which are dynamically self-organized and self-configured. The nodes in the network automatically establishing an ad-hoc network and maintaining the mesh connectivity, nodes communicate with each other by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routi...

Journal: :journal of occupational health and epidemiology 0
a esmaeili nadimi school of medicine, rafsanjan university of medical sciences, rafsanjan, iran m hasani rafsanjan university of medical sciences, rafsanjan, iran m allahtavakoli pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran e hakimizadeh pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran h bakhshi

background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...

2004
Daniel R. Figueiredo Philippe Nain Don Towsley

Systems that allow users to communicate anonymously with a destination have received increasingly more attention since users of network applications became more concerned with their privacy. Unfortunately, anonymity systems are vulnerable to attacks that attempt to reveal the identity of nodes that communicate anonymously. Moreover, the distributed nature of such systems facilitates certain typ...

Journal: :medical journal of islamic republic of iran 0
salime goharinezhad school of health management and information sciences, iran university of medical sciences, tehran, iran, & research center for health services management, institute for futures studies in health, kerman university of medical sciences, kerman, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی کرمان (kerman university of medical sciences) mohammadreza maleki health management and economics research center, iran university of medical sciences, tehran, iran, & department of health services management, school of health management and information sciences, iran university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی ایران (iran university of medical sciences) hamid reza baradaran endocrine research center, institute of endocrinology and metabolism, iran university of medical sciences tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی ایران (iran university of medical sciences) hamid ravaghi health management and economics research center, iran university of medical sciences, tehran, iran, & department of health services management, school of health management and information sciences, iran university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی ایران (iran university of medical sciences)سازمان های دیگر: health management and economics research center

background: the number of people aged 60 and older is increasing faster than other age groups worldwide. iran will experience a sharp aging population increase in the next decades, and this will pose new challenges to the healthcare system. since providing high quality aged-care services would be the major concern of the policymakers, this question arises that what types of aged care services s...

Journal: :Knowledge Eng. Review 2003
Jeffrey Undercoffer Anupam Joshi Timothy W. Finin John Pinkston

We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4000 classes of computer intrusions and their corresponding attack strategies and is categorised according to system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack be ...

2013
Nagendra Kumar Shubham Omar Sandeep Saxena

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired networ...

Journal: :IACR Cryptology ePrint Archive 2015
Goutam Paul Souvik Ray

We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the mes...

2004
Jeffrey Undercoffer John Pinkston Anupam Joshi Timothy Finin

We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4,000 classes of computer intrusions and their corresponding attack strategies and is categorized according to: system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack b...

2016
Oliver Kunz Keith Martin

Mobile phones evolved from basic telecommunication devices to smartphones which are, in essence, pocket computers. With this technological evolution their usage also changed. Nowadays users do not just keep contact details and text messages but also e-mails, chat communications, documents, browsing history and other data stored on their mobiles. Different actors are interested in this data: cri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید