نتایج جستجو برای: ssdf attack
تعداد نتایج: 80839 فیلتر نتایج به سال:
The exponential growth of Internet connected systems has generated numerous challenges, such as spectrum shortage issues, which require efficient sharing (SS) solutions. Complicated and dynamic SS can be exposed to different potential security privacy requiring protection mechanisms adaptive, reliable, scalable. Machine learning (ML) based methods have frequently been proposed address those iss...
by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate...
background: life-threatening and stressful events, such as myocardial infarction (mi) can lead to an actual crisis, which affects the patients spiritually as well as physically, psychologically, and socially. however, the focus of health care providers is on physical needs. furthermore, the spirituality of the patients experiencing heart attack in the light of our cultural context is not well a...
This study aims to evaluate the effectiveness of selected color filter film for demultiplexer construction where only signals with certain wavelengths are allowed to pass through the demultiplexer while the other signal that carrying different wavelengths are absorbed. Characterization testing and analysis is done based on recorded data. Demultiplexer components are characterized by the Same So...
Simulation of an underwater glider to investigate the effect of angle of attack on the hydrodynamic coefficients such as lift, drag, and torque. Due to the vital role of these coefficients in designing the controllers of a glider and to obtain an accurate result, this simulation has been studied at a range of operating velocities. The total length of the underwater glider with two wings is 900 ...
In recent years, there has been an increase in the number of phishing attacks targeting people fields defense, security, and diplomacy around world. particular, hacking attack group Kimsuky conducting to collect key information from public institutions since 2013. The main feature techniques used by are conceal malicious code e-mails disguised as normal spread a document file that is vulnerable...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید