نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

Journal: :FDA consumer 2003
Michelle Meadows

Bonnie Brown, 50, of Baltimore, says she also didn't change her life until she had a heart attack in 1997. "I used to smoke, ate cold-cut subs for breakfast, and had lots of fried foods, all the time, any time," Brown says. But her heart attack--which she initially mistook for a bad case of indigestion--led her to give up cigarettes, improve her diet, and sign up for weekly water aerobics and l...

Journal: :CoRR 2015
Rupesh Gunturu

This paper reviews the Sybil attack in social networks, which has the ability to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the whole network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. I...

Journal: :Journal of Exposure Science & Environmental Epidemiology 2021

Journal: :IEEE Internet of Things Journal 2023

A trust management system (TMS) is an integral component of any Internet Things (IoT) network. reliable TMS must guarantee the network security, data integrity, and act as a referee that promotes legitimate devices, punishes malicious activities. Trust scores assigned by TMSs reflect devices’ reputations, which can help predict future behaviors entities subsequently judge reliability different ...

Journal: :Pediatrics 1999
R G Barr S N Young J H Wright R Gravel R Alkawaf

BACKGROUND Colic is a behavioral syndrome of early infancy of unknown etiology whose core symptom is increased crying. Both clinical anecdotal descriptions and controlled observations converge in suggesting that a defining characteristic of the crying behavior is the longer duration of the crying bouts, especially during the second month of life when colic is at its peak. This implies that, onc...

Journal: :IEEE Computer 2004
Neal Leavitt

A recent Internet attack that exploited a powerful new assault technique has computer security officials worried that it could be a har-binger of worse things to come. The attack was based on a Trojan horse—a nonreplicating program that hides malicious code inside apparently harmless programming, data, or Web pages—dubbed JS.Scob.Trojan by antivirus experts. " We have validated a minimum of 630...

Journal: :Behavioral neuroscience 1997
J L Reilly S S Robertson B D MacLennan W P Smotherman

Rat fetuses exhibit intrinsic fluctuations in general motor activity and respond to an artificial nipple (AN) with mouthing and oral grasping behavior. The present study examined the relation between the organization of general activity and the expression of these specific responses to an AN on Embryonic Day 21. In Experiment 1, continuous exposure to the AN resulted in nonspecific behavioral a...

Journal: :Security and Communication Networks 2014
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

Journal: :IACR Cryptology ePrint Archive 2012
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید