نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

2005
Maria-Luisa Alegre Ping Zhou Samuel J. Balin Mona Mashayekhi Kwang Woo Kwang Woo Hwang David A. Palucki

1997
Brian Vetter Feiyi Wang Shyhtsun Felix Wu

It is critical to protect the network infrastructure (e.g., network routing and management protocols) against security intrusions, yet dealing with insider attacks are probably one of the most challenging research problems in network security. We study the security threats, especially internal/insider threats, for the standardized routing protocol OSPF. In OSPF, a group of routers collaborate, ...

2013
Sandra Wagner Sylvie Issanchou Claire Chabanet Luc Marlier Benoist Schaal Sandrine Monnery-Patris

Background: Olfaction is a highly salient sensory modality in early human life. Neonates show keen olfactory sensitivity and hedonic responsiveness. However, little is known about hedonic olfactory responsiveness between the neonatal period and 2 years of age. In an attempt to fill this gap, this longitudinal follow-up study aimed at investigating hedonic responses to food odours in infants dur...

2016
Gary Ginsberg Justine Ginsberg Brenda Foos

Children's exposure assessment is a key input into epidemiology studies, risk assessment and source apportionment. The goals of this article are to describe a methodology for children's exposure assessment that can be used for these purposes and to apply the methodology to source apportionment for the case study chemical, diethylhexylphthalate (DEHP). A key feature is the comparison of total (a...

2012
Junsong Zhang Wendong Wang Jian Ma Xiong Li

RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been propose...

Journal: :IACR Cryptology ePrint Archive 2008
Ruilin Li Bing Sun Peng Zhang Chao Li

This paper studies the security of ARIA against impossible differential cryptanalysis. Firstly an algorithm is given to find many new 4-round impossible differentials of ARIA. Followed by such impossible differentials, we improve the previous impossible differential attack on 5/6-round ARIA. We also point out that the existence of such impossible differentials are due to the bad properties of t...

Journal: :IEEE Access 2022

Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices communicate without relying on dedicated PC services. implicitly uses mesh networks. connectivity cloud and edge computing is in vogue. A Wireless Network (WMN) a multi-hop distributed wireless network with routers clients. Data originating from clients forwarded destinations through routers. In networks, dev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید