نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

Journal: :J. Internet Serv. Inf. Secur. 2013
Shigeyoshi Shima Ayako Komatsu

Information security incidents involving internal improprieties that threaten the very business of Japanese organizations have drawn attention. Internal improprieties are one of problems to be solved in Japanese organizations. However, it is difficult to share information about internal impropriety incidents and to consider the causes of and effective countermeasures for internal improprieties ...

2015
Vijay K Singh Harvey B Pollard

Acute radiation exposure induces apoptosis of tissues in the hematopoietic, digestive, cutaneous, cardiovascular and nervous systems; extensive apoptosis of these tissues ultimately leads to acute radiation syndrome. A novel strategy for developing radiation countermeasures has been to imitate the genetic mechanisms acquired by radiation-resistant tumors. Two mechanisms that underlie this abili...

Journal: :Lakartidningen 2001
T Akerstedt P O Haraldsson

Recently there has been a sizeable increase in research on fatigue and accidents in transportation. Therefore a meeting was convened last year to discuss prevalence, mechanisms and countermeasures, with the intention to produce an international consensus document. It was concluded that official statistics strongly underestimate prevalence, and that a reasonable estimate, based on research, lies...

1994
Dieter Kreuer Ansgar Radermacher Sven Martin Thomas Frach

Ka band, the 20/30 GHz frequency band for satellite communications, has gained much interest in recent times. It is well suited for applications with small sized earth stations. The major disadvantage of Ka band, however, is its sensitivity to rain fading. Several satellite experiments are being carried out at the moment studying so called adaptive fade countermeasures, the purpose of which is ...

2003
Chris Karlof David A. Wagner

We present HMM attacks, a new type of cryptanalysis based on modeling randomized side channel countermeasures as Hidden Markov Models (HMM’s). We also introduce Input Driven Hidden Markov Models (IDHMM’s), a generalization of HMM’s that provides a powerful and unified cryptanalytic framework for analyzing countermeasures whose operational behavior can be modeled by a probabilistic finite state ...

Journal: :I. J. Network Security 2010
Antonio San Martino Xavier Perramon

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

2006
Wei Yu Nan Zhang Wei Zhao

In this paper, we address issues related to defending against widespreading worms on the Internet. We study a new class of worms called the selfadaptive worms. These worms dynamically adapt their propagation patterns to defensive countermeasures, in order to avoid or postpone detection, and to eventually infect more computers. We show that existing worm detection schemes cannot effectively defe...

Journal: :IACR Cryptology ePrint Archive 2011
Andrew Moss Elisabeth Oswald Dan Page Michael Tunstall

Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the computation. Randomization of intermediate values breaks statistical dependence and thus prevents such attacks. The current state of the art in countermeasures involves manual manipulation of low-level assembly language to insert ran...

2017
Tomi Kinnunen Md. Sahidullah Héctor Delgado Massimiliano Todisco Nicholas W. D. Evans Junichi Yamagishi Kong-Aik Lee

The ASVspoof initiative was created to promote the development of countermeasures which aim to protect automatic speaker verification (ASV) from spoofing attacks. The first community-led, common evaluation held in 2015 focused on countermeasures for speech synthesis and voice conversion spoofing attacks. Arguably, however, it is replay attacks which pose the greatest threat. Such attacks involv...

Journal: :Human factors 2011
Frédéric Dehais Mickaël Causse Sébastien Tremblay

OBJECTIVE The aim of this study was to empirically assess the efficacy of cognitive countermeasures based on the technique of information removal to enhance human operator attentional disengagement abilities when facing attentional tunneling. BACKGROUND Lessons learned from human factors studies suggest that conflict with automation leads to the degradation of operators' performance by promot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید