نتایج جستجو برای: chemical attack

تعداد نتایج: 456207  

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...

Journal: :Journal of comparative and physiological psychology 1968
G M Burghardt E H Hess

Attack behavior of inexperienced garter snakes to water extracts of normally eaten prey was investigated. Since eliminating vision and olfaction in newborn snakes did not alter response to chemical cues, Jacobson's organ is considered to be the receptor most involved. Slight variations in age and concentration did not affect potency of an extract, but, over a wider range of concentration, the r...

Journal: :Journal of hazardous materials 2003
Calvin D Jaeger

Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal att...

Journal: :Human and Ecological Risk Assessment: An International Journal 2011

Alaleh Zoghi, Aliakbar Saboury, Kianoush Khosravi-Darani, Kourosh Egbaltab, Mahshid Jahadi, Mohammad-Reza Ehsani, Mohammad-Reza Mozafari, Rooh alla Ferdwosi,

Background and Objectives: Fast proteolysis of cheese in ripening process may lead to the premature attack of casein, release of the majority of enzymes into the whey, and loss of cheese composition from curd to whey. In this study, the effect of liposomal Flavourzyme on proteolysis of Iranian white brined cheese, as well as on the yield and composition of whey and curd was investigated. Mater...

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

and A. Bakhshalipour, M. R. Soltani, M. Seddighi,

The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید