نتایج جستجو برای: threats
تعداد نتایج: 31573 فیلتر نتایج به سال:
A game of threats on a finite set of players, N , is a function d that assigns a real number to any coalition, S ⊆ N , such that d(S) = −d(N \S). A game of threats is not necessarily a coalitional game as it may fail to satisfy the condition d(∅) = 0. We show that analogs of the classic Shapley axioms for coaltional games determine a unique value for games of threats. This value assigns to each...
Recent literature argues that economic sanction threats should be more successful because both sender and target have an incentive to resolve their dispute before entering into costly sanction. Testing this assertion is somewhat problematic because threats are essentially nonevents Fsanctions that were never deployed. This paper quantifies the U.S. threats to condition or revoke China’s most fa...
The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the insider threat is reasonable under those circumstances; if one cannot define a problem precisely, how c...
Cybercriminals today are organized, sophisticated and have powerful resources at their fingertips. In most cases, attacks are initiated with specific targets and objectives in mind. The aim is to infiltrate hosts in networks and steal valuable data. The data may be personal information, accounts or intellectual property. This information can be used for future attacks (second stage) to further ...
In this paper we explain the basics of Bitcoin protocol and the state of the art of the main attacks to it. We first present an overview of digital currencies, showing what they are and the social need they aim to satisfy. We then focus on the main digital currency up to date, Bitcoin. We treat the basics of the protocol showing what are addresses and transactions and how they are used in a dis...
The list of agents that could pose the greatest public health risk in the event of a bioterrorist attack is short. However, although short, the list includes agents that, if acquired and properly disseminated, could cause a difficult public health challenge in terms of our ability to limit the numbers of casualties and control the damage to our cities and nation. The use of biological weapons h...
Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have s...
The Indo-Myanmar (Indo-Burma) Hotspot is one of the most threatened hotspots globally: it ranks among the eight hotspots likely to lose most plants and vertebrates as a result of forest loss continuing at its current rate (Brooks et al. 2002). Throughout the hotspot, a combination of population growth, economic development, increasing consumption and integration into the global economy is placi...
According to a report from Prolexic, one of the first and largest companies offering DDoS mitigation services, attack traffic rose 66% over the course of a year (to Q3 2011). 1 Network-layer attacks accounted for 83%, the rest being application-layer attacks. The average duration was 1.4 days and the average bandwidth consumed was 1.5Gbps. The size of attacks is getting bigger, too. In July 2...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید