نتایج جستجو برای: bad mouthing attack
تعداد نتایج: 110943 فیلتر نتایج به سال:
It is critical to protect the network infrastructure (e.g., network routing and management protocols) against security intrusions, yet dealing with insider attacks are probably one of the most challenging research problems in network security. We study the security threats, especially internal/insider threats, for the standardized routing protocol OSPF. In OSPF, a group of routers collaborate, ...
Background: Olfaction is a highly salient sensory modality in early human life. Neonates show keen olfactory sensitivity and hedonic responsiveness. However, little is known about hedonic olfactory responsiveness between the neonatal period and 2 years of age. In an attempt to fill this gap, this longitudinal follow-up study aimed at investigating hedonic responses to food odours in infants dur...
Children's exposure assessment is a key input into epidemiology studies, risk assessment and source apportionment. The goals of this article are to describe a methodology for children's exposure assessment that can be used for these purposes and to apply the methodology to source apportionment for the case study chemical, diethylhexylphthalate (DEHP). A key feature is the comparison of total (a...
RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been propose...
This paper studies the security of ARIA against impossible differential cryptanalysis. Firstly an algorithm is given to find many new 4-round impossible differentials of ARIA. Followed by such impossible differentials, we improve the previous impossible differential attack on 5/6-round ARIA. We also point out that the existence of such impossible differentials are due to the bad properties of t...
Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices communicate without relying on dedicated PC services. implicitly uses mesh networks. connectivity cloud and edge computing is in vogue. A Wireless Network (WMN) a multi-hop distributed wireless network with routers clients. Data originating from clients forwarded destinations through routers. In networks, dev...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید