نتایج جستجو برای: sniffing
تعداد نتایج: 1077 فیلتر نتایج به سال:
Among various types of attacks on an Ethernet network, “sniffing attack” is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host’s Network Interface Card (NIC) into the promiscuous mode. When a host’s NIC is in the normal mode, it captures only the packets sent to the host. Since many bas...
objective(s) while the nucleus accumbens and the striatum have received much attention regarding their roles in stereotyped behaviors, the role of the medial prefrontal cortex (mpfc) has not been investigated to the same degree. few studies have reported the role of the mpfc in dopaminergic induction of locomotor hyperactivity. the mpfc is a heterogeneous area (the anterior cingulated, prelimbi...
Our previous study in male rats demonstrated that bilateral administration of flutamide, an androgen receptor (AR) antagonist, into the posterodorsal medial amygdala (MePD) increased the time sniffing male odors to as high as that sniffing estrous odors, eliminating the preference for estrous odors over male odors. This made us speculate that under blockade of AR in the MePD, testosterone-deriv...
In Old World monkeys (OWM), the olfactory sense is thought to be less important than in other primate taxa. However, during the last decade experimental studies have shown that OWM possess much better olfactory capabilities than suspected. Here, we investigate for the very first time sniffing behaviours in three guenon species (Diana, de Brazza's and owl-faced monkeys) held in the Leipzig Zoo, ...
Unlike current chemical trace detection technology, dogs actively sniff to acquire an odor sample. Flow visualization experiments with an anatomically-similar 3D printed dog's nose revealed the external aerodynamics during canine sniffing, where ventral-laterally expired air jets entrain odorant-laden air toward the nose, thereby extending the "aerodynamic reach" for inspiration of otherwise in...
The Man-in-the-Middle (MiM ) attack is used by attackers to perform sniffing activities in switched LAN networks. The potential damage to a network from sniffing activities can be very significant. This paper proposes a mechanism for detecting malicious hosts performing MiM attack in switched LAN networks. The proposed mechanism consists of sending trap and spoofed packets to the network’s host...
Portable computing devices have transformed mobility into a serious concern to network researchers. Existing mobility measurement data have been very useful to the community, but achieve their limitations because they apply only to specific contexts (e.g. university campuses and conference venues). This paper advocates using Wi-Fi sniffing to study mobility in other environments. This approach ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید