نتایج جستجو برای: attacked khorram
تعداد نتایج: 4890 فیلتر نتایج به سال:
This paper examines the denial of service attacks of February 2000 to determine the impact of an exogenous website shutdown on user behavior. The attacks had a lasting negative impact on six of the seven websites attacked (CNN, Yahoo, ZDNet, Amazon, Buy.com, and EBay, but not E*Trade). Using a new method to identify switching costs, the paper shows that, for Yahoo and the other free websites, t...
Pigeons were conditioned to peck a response key under a procedure that alternated periods of food reinforcement with periods of extinction. The pigeons attacked a nearby pigeon at the onset of extinction. Some also attacked a stuffed model of a pigeon. The duration of attack was an inverse function of the time since the last food reinforcement and a direct function of the number of reinforcemen...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We propose a model based approach that selects countermeasures through multiple simulations of the behaviors of an ICT system and of intelligent attackers that implement sequences of attacks. The simulations return information on the attacker sequences and the goals they reach we use to compute the...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if...
Toxocariasis is a parasitic zoonose caused by the infection of larval nematode Toxocara species. A total of 285 soil samples from January to March 2009 in 18 public parks were collected to test for soil contamination with Toxocara eggs. Soil samples were investigated for the present of Toxocara eggs using sucrose flotation method. Distribution of Toxocara spp. eggs in samples collected from pub...
Red-backed shrikes (Lanius collurio) behave quite differently towards two common nest predators. While the European jay (Garrulus glandarius) is commonly attacked, in the presence of the Eurasian magpie (Pica pica), shrikes stay fully passive. We tested the hypotheses that this passive response to the magpie is an alternative defense strategy. Nesting shrikes were exposed to the commonly attack...
DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...
Secure facial identification systems compare an input face to a protected list of subjects. If this list were to be made public, there would be a severe privacy/confidentiality breach. A common approach to protect these lists of faces is to store a representation (descriptor or vector) of the face that is not directly mappable to its original form. In this thesis, we consider a recently develop...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید