نتایج جستجو برای: attacked khorram

تعداد نتایج: 4890  

2005
Avi Goldfarb

This paper examines the denial of service attacks of February 2000 to determine the impact of an exogenous website shutdown on user behavior. The attacks had a lasting negative impact on six of the seven websites attacked (CNN, Yahoo, ZDNet, Amazon, Buy.com, and EBay, but not E*Trade). Using a new method to identify switching costs, the paper shows that, for Yahoo and the other free websites, t...

2005
N. H. AZRIN R. R. HUTCHINSON D. F. HAKE ANNA STATE HOSPITAL

Pigeons were conditioned to peck a response key under a procedure that alternated periods of food reinforcement with periods of extinction. The pigeons attacked a nearby pigeon at the onset of extinction. Some also attacked a stuffed model of a pigeon. The duration of attack was an inverse function of the time since the last food reinforcement and a direct function of the number of reinforcemen...

Journal: :JoWUA 2015
Fabrizio Baiardi Federico Tonelli Alessandro Bertolini Roberto Bertolotti

A countermeasure is any change to a system to reduce the probability it is successfully attacked. We propose a model based approach that selects countermeasures through multiple simulations of the behaviors of an ICT system and of intelligent attackers that implement sequences of attacks. The simulations return information on the attacker sequences and the goals they reach we use to compute the...

2017
Dae-Kyo Jeong Jung-Hwa Wui Dongwoo Kim

In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if...

Journal: :Nepal Medical College journal : NMCJ 2010
M Zibaei F Abdollahpour M Birjandi F Firoozeh

Toxocariasis is a parasitic zoonose caused by the infection of larval nematode Toxocara species. A total of 285 soil samples from January to March 2009 in 18 public parks were collected to test for soil contamination with Toxocara eggs. Soil samples were investigated for the present of Toxocara eggs using sucrose flotation method. Distribution of Toxocara spp. eggs in samples collected from pub...

2016
Michaela Syrová Michal Němec Petr Veselý Eva Landová Roman Fuchs

Red-backed shrikes (Lanius collurio) behave quite differently towards two common nest predators. While the European jay (Garrulus glandarius) is commonly attacked, in the presence of the Eurasian magpie (Pica pica), shrikes stay fully passive. We tested the hypotheses that this passive response to the magpie is an alternative defense strategy. Nesting shrikes were exposed to the commonly attack...

2010
Anjali Sardana Ramesh C. Joshi

DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...

2011
Andy Luong Kristen Grauman

Secure facial identification systems compare an input face to a protected list of subjects. If this list were to be made public, there would be a severe privacy/confidentiality breach. A common approach to protect these lists of faces is to store a representation (descriptor or vector) of the face that is not directly mappable to its original form. In this thesis, we consider a recently develop...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید