نتایج جستجو برای: microbial attacks

تعداد نتایج: 169503  

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

Journal: :iranian journal of pharmaceutical research 0
m rahim h bano b naqvi

contact lens wearers are at great risk of developing microbial keratitis because of incorrect usages and unhygienic maintenance of contact lenses. therefore, the present study was planned to provide data that will be helpful in selecting the anti-microbial to cure microbial keratitis. one hundred bacterial isolates from conjunctiva of contact lenses wearer were isolated, identified and subjecte...

Journal: :journal of advances in computer engineering and technology 2015
bita amirshahi ali ahangari

abstract—today, botnets have become a serious threat to enterprise networks. by creation of network of bots, they launch several attacks, distributed denial of service attacks (ddos) on networks is a sample of such attacks. such attacks with the occupation of system resources, have proven to be an effective method of denying network services. botnets that launch http packet flood attacks agains...

Journal: :The American journal of psychiatry 2008
Christian Grillon Shmuel Lissek Stephanie Rabin Dana McDowell Sharone Dvir Daniel S Pine

OBJECTIVE Predictability is a fundamental modulator of anxiety in that the ability to predict aversive events mitigates anxious responses. In panic disorder, persistent symptoms of anxiety are caused by anticipation of the next uncued (unpredictable) panic attack. The authors tested the hypothesis that elevated anxious reactivity, specifically toward unpredictable aversive events, is a psychoph...

Journal: :Human psychopharmacology 2009
José Alexandre Crippa Antonio Waldo Zuardi Rocio Martín-Santos Sagnik Bhattacharyya Zerrin Atakan Philip McGuire Paolo Fusar-Poli

BACKGROUND Anxiety reactions and panic attacks are the acute symptoms most frequently associated with cannabis use. Understanding the relationship between cannabis and anxiety may clarify the mechanism of action of cannabis and the pathophysiology of anxiety. Aims of the present study were to review the nature of the relationship between cannabis use and anxiety, as well as the possible clinica...

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

Ali Khazaee, Usha Barahmand,

Panic attacks are discrete episodes of intense fear or discomfort accompanied by symptoms such as palpitations, shortness of breath, sweating, trembling, derealization and a fear of losing control or dying. Although panic attacks are required for a diagnosis of panic disorder, they also occur in association with a host of other disorders listed in the 5h version of the diagnostic and statistica...

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

Journal: :Annals of Mathematics and Artificial Intelligence 2020

2007
Cécile Favre Fadila Bentayeb Omar Boussaïd

Résumé. Dans cet article, nous proposons une approche d’évolution de schéma dans les entrepôts de données qui permet aux utilisateurs d’intégrer leurs propres connaissances du domaine afin d’enrichir les possibilités d’analyse de l’entrepôt. Nous représentons cette connaissance sous la forme de règles de type «si-alors». Ces règles sont utilisées pour créer de nouveaux axes d’analyse en généran...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید