نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2003
Xinwen Fu Bryan Graham Riccardo Bettati Wei Zhao

Traffic analysis attacks aim at deriving mission critical information from the analysis of the traffic transmitted over a network. Countermeasures for such attacks are usually realized by properly “padding” the payload traffic so that the statistics of the overall traffic become significantly different from that of the payload traffic. In this paper, we propose a analytical framework for traffi...

2016
Vijay K. Singh Patricia L.P. Romaine Victoria L. Newman Thomas M. Seed

INTRODUCTION The global threat of a chemical, biological, radiological, or nuclear (CBRN) disaster is an important priority for all government agencies involved in domestic security and public health preparedness. Radiological/nuclear (RN) attacks or accidents have become a larger focus of the United States Food and Drug administration (US FDA) over time because of their increased likeliness. C...

Journal: :Musculoskeletal science & practice 2017
Andrew Winnard Mona Nasser Dorothee Debuse Maria Stokes Simon Evetts Mick Wilkinson Julie Hides Nick Caplan

BACKGROUND No studies have been published on an astronaut population to assess the effectiveness of countermeasures for limiting physiological changes in the lumbopelvic region caused by microgravity exposure during spaceflight. However, several studies in this area have been done using spaceflight simulation via bed-rest. The purpose of this systematic review was to evaluate the effectiveness ...

2004
Stephen M. Specht Ruby B. Lee

Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. As new countermeasures are developed to prevent or mitigate DDoS attacks, attackers are constantly developing new methods to circumvent ...

Journal: :Biosecurity and bioterrorism : biodefense strategy, practice, and science 2005
Luciana L Borio Gigi Kwik Gronvall

The U.S. government does not yet have the range of medical countermeasures needed to protect its citizens from anthrax and other potential bioweapons. In the event of an anthrax attack, treatment interventions in addition to antibiotics would be needed so that very ill patients can be treated and clean-up crews can be better protected, especially if an engineered strain is used. This article de...

2012
Janine L. Spears

During a lawsuit, an organization is required to discover and produce relevant electronic data. In many cases, relevant data includes confidential data, such as personal information or trade secrets. During the course of a lawsuit, the discovered data may exchange many hands. This study analyzes data security threats and corresponding countermeasures within the eDiscovery process by constructin...

Journal: :J. Internet Serv. Inf. Secur. 2014
Tomoyuki Ishida Kazuhiro Takahagi Akira Sakuraba Noriki Uchida Yoshitaka Shibata

In this paper, we propose the Real-time Disaster Damage Information Sharing System for the disaster countermeasures headquarters at the time of large-scale natural disaster. This Real-time Disaster Damage Information Sharing System consists of the Post Damage Picture Smartphone Application, the Post Damage Picture Facebook Application, and the Web-GIS Disaster Information Management Site. The P...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Stefano Bistarelli Pamela Peretti Irina Trubitsyna

Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to stop all the vulnerabilities. In order to represent preferences among possible countermeasures of a given attack, defence trees are enriched with conditional preferences, obtaining a new structure called CP-defence tree....

Journal: :Wireless Networks 2015
Yu Seung Kim Patrick Tague Heejo Lee Hyogon Kim

Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi net...

1994
James W. Gray

We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید