نتایج جستجو برای: rice chaff
تعداد نتایج: 72227 فیلتر نتایج به سال:
Network attackers frequently use a chain of compromised intermediate nodes to attack a target machine and maintain anonymity. This chain of nodes between the attacker and the target is called a stepping stone chain. Various algorithms have been proposed to detect stepping stones, timing correlation based algorithms being one of them. However, the existing timing based algorithms are susceptible...
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
In this paper, we develop an algorithm that may be used as a stepping-stone detection tool. Our approach is based on analyzing correlations between the cumulative number of packets sent in outgoing connections and that of the incoming connections. We present a study of our method’s effectiveness with actual connections as well as simulations of time-jittering (introduction of inter-packet delay...
Fructification and yield of the edible mushrooms Pleurotus pulmonarius and Stropharia rugosoannulata are clearly enhanced when wheat straw is supplemented with 30% Lolium perenne grass chaff. The bioactive compound in the methanol extract of grass chaff was identified as beta-adenosine. In vitro biological activity tests showed that 0.012 mg of beta-adenosine per ml of medium stimulated earlier...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید