نتایج جستجو برای: attacking afghanistan

تعداد نتایج: 9950  

2006
Levent Ertaul Jayalalitha Panda

Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. Threats to mobile agent security generally fall into three main classes: disclosure of information, denial of service, and corruption of information. Four threat categories are identified: threats stem...

2013
NID SNID SIAD

Since 2012, transmission of indigenous wild poliovirus (WPV) has been limited to three countries: Afghanistan, Pakistan, and Nigeria. This report describes polio eradication activities and progress in Afghanistan during January 2012-September 2013 and updates previous reports. During 2012, 37 WPV type 1 (WPV1) cases were confirmed in Afghanistan, compared with 80 cases in 2011; nine WPV1 cases ...

Journal: :International maritime health 2014
Krzysztof Korzeniewski Robert Gregulski

BACKGROUND The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. MATERIALS AND METHODS The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for ba...

2012
Gregory A. Engel Agustin Fuentes Benjamin P.Y.-H. Lee Michael A. Schillaci Lisa Jones-Engel Luke E. Mease Katheryn A. Baker

Bites from Macaca mulatta monkeys, native to Afghanistan, can cause serious infections. To determine risk for US military members in Afghanistan, we reviewed records for September-December 2011. Among 126 animal bites and exposures, 10 were monkey bites. Command emphasis is vital for preventing monkey bites; provider training and bite reporting promote postexposure treatment.

2018

Submit Manuscript | http://medcraveonline.com Tullgrenius afghanicus Beier, 1959 and Oratemnus afghanicus Beier, 1959 from Afghanistan, Mesatemnus cyprianus (Beier and Turk, 1952) from Cyprus, Paratemnoides insularis (Banks, 1902) from Ecuador and Turkey, Diplotemnus egregius Beier, 1959 from Afghanistan and Tajikistan, Diplotemnus insolitus Chamberlin, 1933 from Afghanistan, Azerbaijan, Iran, ...

2010
Karsten Nohl

GSM’s encryption function for call and SMS privacy, A5/1, can be broken in seconds with 2TB of fast storage and two graphics cards. The attack combines several time-memory trade-off techniques and exploits the relatively small effective key size of 61 bits.

1998
Stefan Lucks

The standard technique to attack triple encryption is the meet-in-the-middle attack. In this paper, more eecient attacks are presented. Compared to meet-in-the-middle, our attacks either greatly reduce the number of single encryptions to be done, or somewhat reduce the overall number of steps. Especially, about 2 108 steps of computation are suucient to break three-key triple DES. If one concen...

2016
J. Kevin Baird

Discussions beginning in 2012 ultimately led to a landmark document from the World Health Organization (WHO) titled, Control and Elimination of Plasmodium vivax: A Technical Brief, published in July 2015. That body of work represents multiple expert consultations coordinated by the WHO Global Malaria Program, along with technical consensus gathering from national malaria control programs via th...

Journal: :CoRR 2017
Angus Galloway Graham W. Taylor Medhat A. Moussa

Neural networks with low-precision weights and activations offer compelling efficiency advantages over their full-precision equivalents. The two most frequently discussed benefits of quantization are reduced memory consumption, and a faster forward pass when implemented with efficient bitwise operations. We propose a third benefit of very low-precision neural networks: improved robustness again...

2005
Marco Slaviero Jaco Kroon Martin S. Olivier

The digital verification of binaries at the kernel level has been proposed as a method to prevent trojaned programs and unauthorised execution. However, the nature of attacks which various signed binary schemes seek to prevent vary quite considerably. Further, unrealistic assumptions are often made as to the security of the environment in which the verification takes place. In this paper, the a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید