نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

2004
Greg Hoglund Gary McGraw

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want ...

2006
Andreas Pashalidis Bernd Meyer

In this paper we study a particular attack that may be launched by cooperating organisations in order to link the transactions and the pseudonyms of the users of an anonymous credential system. The results of our analysis are both positive and negative. The good (resp. bad) news, from a privacy protection (resp. evidence gathering) viewpoint, is that the attack may be computationally intensive....

Journal: :Neuropsychologia 2010
Marc Sato Christian Cavé Lucie Ménard Annie Brasseur

The present study investigated whether manual tactile information from a speaker's face modulates the intelligibility of speech when audio-tactile perception is compared with audio-only perception. Since more elaborated auditory and tactile skills have been reported in the blind, two groups of congenitally blind and sighted adults were compared. Participants performed a forced-choice syllable d...

Journal: :Journal of Exposure Science & Environmental Epidemiology 2002

Journal: :IEEE Transactions on Dependable and Secure Computing 2023

The fifth generation (5G) of mobile telecommunications is characterized by massive growth in the number stakeholders, interconnected devices, and available services distributed under different administrative domains. Distributed marketplaces aim at facilitating stakeholders quest hiring third party resources services. Establishing trustworthiness such an open ecosystem a cornerstone for final d...

Journal: :Journal of neurology, neurosurgery, and psychiatry 1990
O Combarros A Gutiérrez J Pascual J Berciano

Involuntary mouthing movements indistinguishable from neuroleptic-induced tardive dyskinesia followed stroke in a woman whose computed tomographic (CT) scan showed bilateral thalamo-capsular infarction.

Journal: :IEEE Transactions on Emerging Topics in Computing 2021

In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, formulated as statistical regression problem which solved by employing random forest model. Additionally, the Fog-CPS could be deployed in open unprotected environments, CPS devices fog nodes are vuln...

2013
Zarinah K. Agnew Carolyn McGettigan B. Banks Sophie K. Scott

Production of actions is highly dependent on concurrent sensory information. In speech production, for example, movement of the articulators is guided by both auditory and somatosensory input. It has been demonstrated in non-human primates that self-produced vocalizations and those of others are differentially processed in the temporal cortex. The aim of the current study was to investigate how...

Journal: :Electronics 2022

Internet of Things (IoT) is bringing a revolution in today’s world where devices our surroundings become smart and perform daily-life activities operations with more precision. The architecture IoT heterogeneous, providing autonomy to nodes so that they can communicate other exchange information at any time. healthcare together provide notable facilities for patient monitoring. However, one the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید