نتایج جستجو برای: bad mouthing attack
تعداد نتایج: 110943 فیلتر نتایج به سال:
Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...
The California Site Mitigation Decision Tree Manual, 1985, was developed by the California Department of Health Services to provide a detailed technical basis for managing uncontrolled hazardous waste sites. The Decision Tree describes a process that relies on criteria, Applied Action Levels (AALs) to evaluate and, if necessary, mitigate the impact of uncontrolled hazardous waste sites on the p...
Breaking bad news is an unavoidable part of the medical profession, and doctors and patients stand at the two sides of this function. There are different views about how to break bad news in different cultures and societies. In this study we assessed the viewpoints of hospitalized patients on how to break bad news. This cross sectional study was performed in 2011 at the Jahrom University of Me...
پلی اتیلن ایمین (pei) یک پلیمر پلی آمینی است که در مطالعات سلولی و بافتی به عنوان حامل غیر ویروسی کاربردهای موفقیت آمیزی داشته است. متاسفانه این ترکیب معایبی نیز دارد، از جمله اینکه منجر به سمیت سلولی می شود. اما مکانیسم های ایجاد سمیت آن هنوز به درستی شناخته نشده است. استفاده از تکنیک ترانسکریپتوم در شناسایی ژن های درگیر در فرایند آپوپتوزکمک شایانی به مشخص شدن مکانیسم سمیت این ترکیب می کند. ...
breaking bad news is quite often not done in an effective manner in clinical settings due to the medical staff lacking the skills necessary for speaking to patients and their families. bad news is faced with similar reactions on the part of the news receiver in all cultures and nations. the purpose of this study was to explore the perspectives of iranian nurses on breaking bad news to patients ...
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید