نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
Wireless Sensor Networks are a Collection of Sensor nodes.Wireless sensor network become so much popular in many fields due to its functionality i.e military, industrial area etc.Security is the important and critical issue in the Wireless networks due to the operating nature of WSNs. This Paper describe the security requirements as WSNs are easily prone more attacks than wired networks. This p...
Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e...
deccan was under the control of six muslim ruling dynasties, i.e. the bahmanîds and their successors from the second half of the eight century to the end of the eleventh century (a.h.). most of the ruling class, the aristocrats and courtiers in that period were muslims. but the state particularly villages and small towns were dominated practicing hindus and they still form the majority in decca...
the sanjâbi or senjâwi tribe was one of the kurdish tribes in west of iranthatsupportedthetransitionalgovernment of nizam al-saltana and its nationalist supporters and united with ottoman and german forces to express its opposition to the presence and activities of russian and britishtroopsduringtheworldwari. after the victory of russian and britisharmiesiniranianwestern regions, this tribe be...
One of the key methods of ensuring effectiveness and actionability of military intelligence is “Red Teaming”. Red Teaming involves questioning the conventional analyst-driven military intelligence constructs. This paper proposes a new Red teaming approach based on Neutrosophic Cognitive Mapping, that helps combine various multi-disciplinary intelligence inputs in a non-linear and complex manner...
Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions ...
On October 2016 the South Korean cyber military unit was the victim of a successful cyber attack that allowed access to internal networks. Per usual with large scale attacks against South Korean entities, the hack was immediately attributed to North Korea. Also, per other large-scale cyber security incidents, the same types of ‘evidence’ were used for attribution purposes. Disclosed methods of ...
This study appraises how the Nigerian military used social media platforms to provide a counter narrative and quell online firestorm regarding Defence Academy's (NDA’s) terrorists’ attack Nigerians reacted these strategic communication items or lack of about attack. The analysed 8,210 Facebook posts comments from Headquarters Nigeria users in Nigeria. Findings demonstrate that adopted silence a...
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets mali...
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید