نتایج جستجو برای: attack scenario
تعداد نتایج: 169475 فیلتر نتایج به سال:
A Wireless mesh network is a wireless communication between different nodes which are dynamically self-organized and self-configured. The nodes in the network automatically establishing an ad-hoc network and maintaining the mesh connectivity, nodes communicate with each other by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routi...
background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...
Systems that allow users to communicate anonymously with a destination have received increasingly more attention since users of network applications became more concerned with their privacy. Unfortunately, anonymity systems are vulnerable to attacks that attempt to reveal the identity of nodes that communicate anonymously. Moreover, the distributed nature of such systems facilitates certain typ...
background: the number of people aged 60 and older is increasing faster than other age groups worldwide. iran will experience a sharp aging population increase in the next decades, and this will pose new challenges to the healthcare system. since providing high quality aged-care services would be the major concern of the policymakers, this question arises that what types of aged care services s...
We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4000 classes of computer intrusions and their corresponding attack strategies and is categorised according to system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack be ...
The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired networ...
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the mes...
We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4,000 classes of computer intrusions and their corresponding attack strategies and is categorized according to: system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack b...
Mobile phones evolved from basic telecommunication devices to smartphones which are, in essence, pocket computers. With this technological evolution their usage also changed. Nowadays users do not just keep contact details and text messages but also e-mails, chat communications, documents, browsing history and other data stored on their mobiles. Different actors are interested in this data: cri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید