نتایج جستجو برای: counter intelligence

تعداد نتایج: 147504  

Journal: :IACR Cryptology ePrint Archive 2013
Marc Stevens

We introduce counter-cryptanalysis as a new paradigm for strengthening weak cryptographic primitives against cryptanalytic attacks. Redesigning a weak primitive to more strongly resist cryptanalytic techniques will unavoidably break backwards compatibility. Instead, countercryptanalysis exploits unavoidable anomalies introduced by cryptanalytic attacks to detect and block cryptanalytic attacks ...

2015
Maria Fernanda Reis Gavazzoni Dias

“Folliculitis et perifolliculitis capitis abscedens et suffodiens is a rare disease of unknown etiology...The cause of scalp folliculitis is not well understood. It is generally considered to be an infl ammatory reaction to components of the hair follicle, particularly the micro-organisms. These include: bacteria (especially Propionibacterium acnes, but in severe cases, also Staphylococcus aure...

Journal: :international journal of mathematical modelling and computations 0
a. hussain school of chemical & materials engineering (scme) national university of sciences & technology (nust), islamabad, pakistan pakistan a. qayyum

a gas permeation model (coupling model) has been developed which has the flexibility to be used for different membrane module configurations. the aim of this work is to predict the performance of a single stage gas separation process using membranes and provide a comprehensive description of process parameters like flow rates, composition, stage cut and stream pressure. the significant feature ...

Journal: :Network Protocols & Algorithms 2011
Radhika Priya Ankala D. Kavitha D. Haritha

A Mobile Adhoc Network (Manet) is a highly challenging environment due to its dynamic topology, limited processing capability, limited storage, band width constraints, high bit error rate and lack of central control. In this dynamic network, each node is considered as a mobile router. A malicious node can easily disrupt the proper functioning of the routing by refusing to forward routing messag...

2000
Sunny Bains Jeffrey Johnson

It has been proven that recurrent neural networks with analog weights can solve problems that are insoluble using Turing machines. However, the prevailing view of those involved in computing research is that a) nonTuring computation is unnecessary for intelligence and b) machines with non-Turing abilities cannot be built in practice. Two reasons are commonly cited for this. First, the effects o...

2013
Samuel H. Huddleston Matthew S. Gerber Donald E. Brown

In the course of counter-insurgency campaigns, military forces expend considerable resources and time conducting cordon and search operations in an effort to interdict and suppress criminal groups. However, these operations have a low success rate, with most operations yielding little intelligence or marginal tactical gains while simultaneously angering the local populace. This paper demonstrat...

2012
Marlos C. Machado Gisele L. Pappa Luiz Chaimowicz

A promising approach in digital games is the possibility of customizing the game according to different demands. Artificial Intelligence algorithms play an important role in this direction, allowing the implementation of different behaviors for game agents. To accomplish this, it is necessary to model these agents in such way their behavior can be easily tunned to address different game feature...

2012
Michael Fire Rami Puzis Yuval Elovici

Extremist organizations all over the world increasingly use online social networks as a communication media for recruitment and planning. As such, online social networks are also a source of information utilized by intelligence and counter terror organizations investigating the relationships between suspected individuals. Unfortunately, the data mined from open sources is usually far from being...

Journal: :IEEE Security & Privacy 2010
Gary McGraw

R ichard A. Clarke is an internationally recognized expert on national security, counter terrorism, and cybersecurity. He’s an on-air consultant for ABC news and teaches at the Kennedy School of Government. Clarke served for 11 consecutive years in the White House for three diff erent presidents, including a stint as special advisor to the president for cybersecurity. Before his work in the Whi...

2016
A. E. Roberts

rough-and-ready order of pathologists to assert the origin of vesical calculus in " salts in the drinking-water." The theory commends itself by its beautiful simplicity: the patient takes in " stone " at one end and passes it (or fails to do so) at the other, and makes as little demand upon the thoughtful intelligence of those who accept it as it received in the process of its conception. In th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید